Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 16:07

General

  • Target

    lantern.exe

  • Size

    39.9MB

  • MD5

    16cfc3c5f541a8c84aef99a8ba8b9d9d

  • SHA1

    db30b549f383e9c36fbb743db1222e3d7ccfd9f6

  • SHA256

    2504fdcc39c2f1fb58ccb09a2f858322aa653ff925b6e3bd5f397f2a2daa573e

  • SHA512

    9b6080b650f3afdaa88a2a3f9336b839260538cc586683e855888c474f27114c58114086c7db6a4f3cbb96ad9e6fc68540544f175a0dc8e8dd2c91bf2f986d39

  • SSDEEP

    393216:fsFhr1yDc/r3q+DMsuqtuYD4fxb9H5MHfN:GhByDc/rauSXfxbU/N

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lantern.exe
    "C:\Users\Admin\AppData\Local\Temp\lantern.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Windows\SysWOW64\cmd.exe
      cmd ver
      2⤵
      • System Location Discovery: System Language Discovery
      PID:888
    • C:\Users\Admin\AppData\Local\Temp\lantern.exe
      C:\Users\Admin\AppData\Local\Temp\lantern.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4452
      • C:\Windows\SysWOW64\cmd.exe
        cmd ver
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4924
      • C:\Windows\SysWOW64\cmd.exe
        cmd ver
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2816
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless https://localhost:62274
        3⤵
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe228f46f8,0x7ffe228f4708,0x7ffe228f4718
          4⤵
            PID:2948
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1512,11016268087984916507,13577097613630068557,131072 --disable-features=PaintHolding --headless --headless --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1528 /prefetch:2
            4⤵
              PID:3964
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,11016268087984916507,13577097613630068557,131072 --disable-features=PaintHolding --lang=en-US --service-sandbox-type=none --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1796 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2268
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --allow-pre-commit-input --field-trial-handle=1512,11016268087984916507,13577097613630068557,131072 --disable-features=PaintHolding --disable-databases --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1908 /prefetch:1
              4⤵
                PID:3128
            • C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe
              C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe on 127.0.0.1 52967
              3⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2020
            • C:\Windows\SysWOW64\cmd.exe
              cmd ver
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4424
            • C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe
              C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe show
              3⤵
              • Executes dropped EXE
              PID:3144
            • C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe
              C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe wait-and-cleanup 127.0.0.1 52967
              3⤵
              • Executes dropped EXE
              PID:3564
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler http://localhost:62275/f34a5d93ccdd9499850d7da51f933ae7/?utm_campaign=startup&utm_content=&utm_medium=lantern&utm_source=windows
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2272
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:62275/f34a5d93ccdd9499850d7da51f933ae7/?utm_campaign=startup&utm_content=&utm_medium=lantern&utm_source=windows
                4⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:1064
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe228f46f8,0x7ffe228f4708,0x7ffe228f4718
                  5⤵
                    PID:4900
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
                    5⤵
                      PID:1208
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4316
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:8
                      5⤵
                        PID:4968
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                        5⤵
                          PID:4612
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                          5⤵
                            PID:4852
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:8
                            5⤵
                              PID:5008
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:8
                              5⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5048
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1
                              5⤵
                                PID:3456
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                                5⤵
                                  PID:552
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:1
                                  5⤵
                                    PID:4592
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
                                    5⤵
                                      PID:4068
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1044 /prefetch:2
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2376
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:1464
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:1556
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3540

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    2783c40400a8912a79cfd383da731086

                                    SHA1

                                    001a131fe399c30973089e18358818090ca81789

                                    SHA256

                                    331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5

                                    SHA512

                                    b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    ff63763eedb406987ced076e36ec9acf

                                    SHA1

                                    16365aa97cd1a115412f8ae436d5d4e9be5f7b5d

                                    SHA256

                                    8f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c

                                    SHA512

                                    ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    120B

                                    MD5

                                    087b16eee12cf1193f413c0dab68a11f

                                    SHA1

                                    439962d6de06d2ed1b784734203b1ce2d6e6c87f

                                    SHA256

                                    3a7a8ea1a1c1a5b09f538e3ccc69498964dde531bdc7a3dca4fd3db383a49d2e

                                    SHA512

                                    045a6590a0577fb12e81388f37203098e0eb7069906491d8d9a02f423b63906d3f6d184e12ab92bf382eaffa11516fd5fc4eb1d43b17b276704a0261464e808b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    598B

                                    MD5

                                    5afe17c8f7c1df6bdd3d4e6e39bc5606

                                    SHA1

                                    f0d2d0569d8cab4c63786b3a7fbd2a73cb24c4d8

                                    SHA256

                                    4e675ee9201aa92ad82c88ed84a4568b0c3121dc08c960eed4a31aa7e6869421

                                    SHA512

                                    888ebbbb863b73ef1945b9188de0e1e2b3293e332bd98d9bc7febe4a01e107174cc0f38f8b3459ff8809f4c04bb0629e9e9a7bf192606636e4cdb2d1d20bbb05

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    5f90cc725331cbebd9ba3e12eb596b2e

                                    SHA1

                                    63f7cff2a856eb14e31424825be5b04de07d2479

                                    SHA256

                                    e3fc77d6805c364b7a3dd64e86de8dcf22a9edfe75042fe50a1235aaaef8de8e

                                    SHA512

                                    01f98adf88e64dc403eb3419e1e1a9e3f3f6bc11fc5f152dc2698db5d73c7f59aed32850181d76404227f5b213920a800f07139685a28dc3a968c6db2d44ea96

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    a29b263903ed243cd314d0abd5023186

                                    SHA1

                                    588b075ed3426fb94558d3fc1a22b455f3e8fa5b

                                    SHA256

                                    d53431a12316153025b7670406d93d9efb8884b06d00ee6d36f7e24099e66ea0

                                    SHA512

                                    54a2c273f7d9163cc070d52c4b3d9f6345920760c7c7280948f0d1788a9f4da7d7c6b5d2e9e148349c7b9181631811479bcf87a61f95e6f0570a45fc3ed30161

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    3f0db8fce4dfbe3a091973bee17266fc

                                    SHA1

                                    d3c489b020de4611b752e74064e210d05f061491

                                    SHA256

                                    c2c614855c16699676e05bd983cbb4d52a72862c1725537720632068e15af33c

                                    SHA512

                                    aed35bfb5ec6825a8e995c931e467cf00e39e1f5a5bd282ac7d4955fa17a9a486d7963e38f9201274499979b8991c4c2ec901dc4bc9a11dffa9ce033722ca5b0

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    ec57d743fed70c5c0d397d6fca610415

                                    SHA1

                                    bb9380d1d8ac12e42b380fe1cd5e915b4c053484

                                    SHA256

                                    270a9959de9ef71312e59e59454dee53f831da50b695d86cdc7ddcf19b612ace

                                    SHA512

                                    2ecd1e4ed29cec8030580533e6bb53d62b47e80d952935816b8708b7bc7782deae1e20d6a4ec45c19039b2c3cafc4599e6e9b752755ae1550a9e50101aad1bec

                                  • C:\Users\Admin\AppData\Roaming\Lantern\hello-cache.active-capture

                                    Filesize

                                    517B

                                    MD5

                                    45fc74ad5649a3ea786dfbf27d172bbf

                                    SHA1

                                    4c147eac3d91e399a94b7aafb5e4a7fa5eb625c4

                                    SHA256

                                    f9c1b03e5d47cc7a75bc7e4c8a1b65595093411c45e6033c9412fd70ee5c6452

                                    SHA512

                                    20a1d9c9f7e67c02278862d1bb3a12c046605cbf5458127ed4449286cf606bc6ae01d8e88d90db9e5ba8a3906aadb73e68cbd1e35b881b6722df5596a277c7ee

                                  • C:\Users\Admin\AppData\Roaming\Lantern\logs\lantern.log

                                    Filesize

                                    255KB

                                    MD5

                                    823faaf16ac4bab354c4ac8fc2eac7ce

                                    SHA1

                                    daa46e24bc4f4826618efd5ceb4145906dc12c65

                                    SHA256

                                    c8726168782c066fdf2cdb3056dd7b97f552e877b1b90e1a9ba2f96f46698ba2

                                    SHA512

                                    a3a24cec9f6be246a0eea8ff43794930b0dc00eb763d3b8da58cc008a213462aa7dc3d766c07cfc0018b5dca99b9b698a4c623685f9969fe4d87b02579f2e0d2

                                  • C:\Users\Admin\AppData\Roaming\Lantern\proxystats.csv.tmp

                                    Filesize

                                    665B

                                    MD5

                                    55f6a4bb80fcf67adf73e7e85165f7a9

                                    SHA1

                                    5de8ca501a6769640d05acb22d298a5aa69af3c6

                                    SHA256

                                    b0c66b842c579261f90dd117089654eab4d19d4e6a96b016fd79fe3ddf237749

                                    SHA512

                                    735f4ee6c6e95d29f2bd509a02297c4e64dbfa5a48791e92e2c998fa1a22653fe0e15027d8528250a909b39b1073b869f497762cfc82e744b64fef73101e9faf

                                  • C:\Users\Admin\AppData\Roaming\Lantern\settings.yaml

                                    Filesize

                                    176B

                                    MD5

                                    61aeac2c7f4bb30ae96d827ab9e6fa96

                                    SHA1

                                    2b74830eef1eabf9365f70244ec161e8a80572dd

                                    SHA256

                                    9cb1b1186a928e97ada95ff9cd28272e7f9b0844db37c1e599df4e50b3ee0a67

                                    SHA512

                                    5ed3408e79a4b2e1c8c20e2618022b5496d85ca0931a9d9a48553b7e1e40f2caf74bb9485f564c59444ba1de85e9e06945ccacba1c210f9b9b79403ce6a9167c

                                  • C:\Users\Admin\AppData\Roaming\byteexec\certimporter.exe

                                    Filesize

                                    166KB

                                    MD5

                                    66e52093b67d4dabb065375251cf12b7

                                    SHA1

                                    1767c633530199bd4fd203556bdab49e62ad103e

                                    SHA256

                                    b204588e2d6ba037797ebe7d6b435d9403b769648d9166e42270dbf56187f5cd

                                    SHA512

                                    f9f3b49a20e0ccfc8be4f1daf56e6b96eb84b5e98b5d1b55575e40ceef0dc4a3463d2de4f71d04c177235efdcb777971c68a8a2a19770d2d7f2ac7140e07141f

                                  • C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe

                                    Filesize

                                    59KB

                                    MD5

                                    380d58a33faf71547fb97c3fc12a38a9

                                    SHA1

                                    04aecccd33b25abcf6889c81ed8c49a56f17aaac

                                    SHA256

                                    a918aa182dd57a545b0416e406432a6d09d1232aa0c33a0969dcd39a432d0d6b

                                    SHA512

                                    9331b00af5579e01ce017ed07fe2955ba4daeed9ae69140b3fd42785256d5ac125365275d33acad744d3639fcbf487d7008a5a0d34e4fb4bf887eef7c6ffa997

                                  • memory/2020-18-0x0000000000400000-0x0000000000410000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3144-21-0x0000000000400000-0x0000000000410000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/3320-146-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-224-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-140-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-241-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-112-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-234-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-152-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-227-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-88-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-218-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-181-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3320-210-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/3564-90-0x0000000000400000-0x0000000000410000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/4452-214-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-225-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-89-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-166-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-219-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-182-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-113-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-211-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-153-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-228-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-147-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-235-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-141-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB

                                  • memory/4452-242-0x0000000000400000-0x00000000030E7000-memory.dmp

                                    Filesize

                                    44.9MB