Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 07:01

General

  • Target

    lonelyscreen-win-installer.exe

  • Size

    538KB

  • MD5

    64da00119c76c6e1d75f059ffc4a772d

  • SHA1

    ebaebff7db60430cad107d4efc45654d43f98075

  • SHA256

    039004b76a1bc5ac020958256bdcf97f1464398c13b0be2e0d0078f1aee8b3a7

  • SHA512

    d13544aa2ee6060510c0f906e3f174a4ec40878f36193a99d6c527b62fa6a379115e965e272069b0e3f0479df16e6899a096ede37fb0832262c72d3d24f824f3

  • SSDEEP

    12288:AS3yBV888888888888W88888888888pKfXGU69eTutORzK/AA9i6Zub02O9HtFbl:/3yLKfXG6wZ/D9kqtZaTq

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 18 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe
    "C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\is-SN0AV.tmp\lonelyscreen-win-installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SN0AV.tmp\lonelyscreen-win-installer.tmp" /SL5="$70062,164153,114176,C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\setup.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Users\Admin\AppData\Local\Temp\is-U4AAI.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-U4AAI.tmp\setup.tmp" /SL5="$40210,7573378,114176,C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\setup.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.lonelyscreen.com/installed.php?version=1.2.16
            5⤵
            • Loads dropped DLL
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1016
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff9fdc846f8,0x7ff9fdc84708,0x7ff9fdc84718
              6⤵
                PID:5100
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
                6⤵
                  PID:8
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                  6⤵
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4100
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
                  6⤵
                    PID:2096
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                    6⤵
                      PID:4284
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
                      6⤵
                        PID:4300
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:1
                        6⤵
                          PID:4144
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:8
                          6⤵
                            PID:1668
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:8
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3500
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1
                            6⤵
                              PID:640
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                              6⤵
                                PID:2136
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
                                6⤵
                                  PID:3632
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                                  6⤵
                                    PID:1364
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,15230592439728876928,9942491603224453061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:2
                                    6⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5208
                            • C:\Windows\SysWOW64\msiexec.exe
                              "msiexec.exe" /qn /i C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\bonjour.msi
                              3⤵
                              • Event Triggered Execution: Installer Packages
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3196
                            • C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe
                              "C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:4424
                        • C:\Windows\system32\msiexec.exe
                          C:\Windows\system32\msiexec.exe /V
                          1⤵
                          • Blocklisted process makes network request
                          • Enumerates connected drives
                          • Drops file in System32 directory
                          • Drops file in Program Files directory
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1500
                          • C:\Windows\System32\MsiExec.exe
                            C:\Windows\System32\MsiExec.exe -Embedding B1B8844997DD4B9E5644B46D87534707
                            2⤵
                            • Loads dropped DLL
                            PID:644
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 76C6591DB928E02580C9A100533877DB
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2616
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 66B58EC7CCE24068CE5CC269A06FD58A E Global\MSI0000
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2840
                          • C:\Windows\System32\MsiExec.exe
                            "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"
                            2⤵
                            • Loads dropped DLL
                            PID:1984
                          • C:\Windows\syswow64\MsiExec.exe
                            "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:2724
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:2080
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1364
                            • C:\Program Files\Bonjour\mDNSResponder.exe
                              "C:\Program Files\Bonjour\mDNSResponder.exe"
                              1⤵
                              • Modifies firewall policy service
                              • Executes dropped EXE
                              PID:3728

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Config.Msi\e57fb7a.rbs

                              Filesize

                              126KB

                              MD5

                              9af6c523a5c0b8d90c9a0892847f9371

                              SHA1

                              3de6956edcf5c38843afba4c40be3c8e91026c34

                              SHA256

                              6c38a4d879972b1350ce0dcfa6fc0cc166eff8eae652a47e7346a96e0c91122c

                              SHA512

                              52be79610b40e44d2a0d9e4eb783263c9103d707abe05b9786c28cb0d47c04308eddf8ee7a6b1dd265c485b1a4880ad3dbaf199cfcc82aee259b26c9360f7c5c

                            • C:\Program Files (x86)\Bonjour\mDNSResponder.exe

                              Filesize

                              381KB

                              MD5

                              db5bea73edaf19ac68b2c0fad0f92b1a

                              SHA1

                              74bb0197763e386036751bf30c5bbf4c389fa24e

                              SHA256

                              10f21999ff6b1d410ebf280f7f27deaca5289739cf12f4293b614b8fc6c88dcc

                              SHA512

                              63b718288c266debf3f58ac1a62cdcca6f09350616d53a406271d8f4fe6144751eddf7b7ba2dbfe79cfda671ee5afbdbae5798204edaaf4f0391895b824ae7c5

                            • C:\Program Files (x86)\Bonjour\mdnsNSP.dll

                              Filesize

                              118KB

                              MD5

                              40947436a70e0034e41123df5a0a7702

                              SHA1

                              6c27e1dd1c1533feb6435190a5074300ac2a9822

                              SHA256

                              5d40fd92da5ca59c1badb58ad509db6a6d613f18660a9a270a53eca85d34c3a9

                              SHA512

                              ba5634cc82f306245f9f0350bfa0b91e2f5ffc6c355b1452a95483f47e6acdb42c4e063f6c15115faf0f0630005df4fe8ef0e01539c270031cbd07a34a929704

                            • C:\Program Files (x86)\LonelyScreen\LonelyScreen.exe

                              Filesize

                              22.3MB

                              MD5

                              a3ff7e328f41f4a6af82266bfe12036f

                              SHA1

                              79f0e44415ffe74b320dfb27c8988d326dc80b2e

                              SHA256

                              9f2a9f89adda3003c587e4a9bdf5decf3260beefb135180e44845aee7730f731

                              SHA512

                              472625b9ab26e83845a72423722e4b1286dce950597a52e95dff385bb33c1a1e4870755f273c8a02dea0793d04bdad7779cc05c786dff7ed624f5feb46d0a803

                            • C:\Program Files (x86)\LonelyScreen\is-9JRT8.tmp

                              Filesize

                              1.1MB

                              MD5

                              cc8b164c85cc68a2e6e0d10e452ef68b

                              SHA1

                              fed79b50a5f03c0e33071ff849ea19dfdaf3c464

                              SHA256

                              20590034969e110c4fba1d065da8ac53dad79f5b8a9bd68780164207a170c749

                              SHA512

                              bee540ceb2b1de587872cdb963d2c754ac4ba0f3cac8026c3d7c2882aae0bfeb31babae927361b2ef5484ab2085b4a19914cc99a504aafd3f08c34f9f626699d

                            • C:\Program Files (x86)\LonelyScreen\unins000.dat

                              Filesize

                              6KB

                              MD5

                              c0d675612eff73ea63d67a5a9ac2fa84

                              SHA1

                              18b129f900017b80a8db37ad908d5649c2449094

                              SHA256

                              599128a77f0f347df444c0a70d18be6c5e818ce925d0dbd6017f6cf049da4252

                              SHA512

                              86bb23846e3d28a700e631d8727be0e14b445ca2baa15e11ccce79feec5afe44ac5d63ebc06e19e97a4f6a9e05763a33434e15ed9e53feb569d4ffa0343b3656

                            • C:\Program Files\Bonjour\mDNSResponder.exe

                              Filesize

                              451KB

                              MD5

                              ebbcd5dfbb1de70e8f4af8fa59e401fd

                              SHA1

                              5ca966b9a5ff4ecd0e139e21b3e30f3ea48e1a88

                              SHA256

                              17bffc5df609ce3b2f0cab4bd6c118608c66a3ad86116a47e90b2bb7d8954122

                              SHA512

                              2fbfcff6bc25461e7c98aabdae0efb33f2df64140aaf4b2b0c253e34294e1606077ae47b000ebababb3600bd4d9154a945036c58e4e930da445a0dda765ac8a4

                            • C:\Program Files\Bonjour\mdnsNSP.dll

                              Filesize

                              129KB

                              MD5

                              f9d908de6b166dac9b89bf62fa291ce8

                              SHA1

                              938b53238291fc41ae852fdde51eed7a2bff0604

                              SHA256

                              d0a918ad60221623bb0278ea94cd6938744617fdbb2054968afafc2940648f02

                              SHA512

                              6643a7066974abfd5904df73ed225fd5eed4a84341b12199b6eb9a8a2ad234dba865d50f8ccff8a88002ce4c6ae2131745cf43aac88a3a0a66b596fb0d93e56e

                            • C:\Program Files\Java\jre-1.8\lib\ext\dns_sd.jar

                              Filesize

                              16KB

                              MD5

                              ca086bb31b598febd7e8d44daf14714a

                              SHA1

                              4838808e80df811cfb2bf7faf361b3cbc16f9f81

                              SHA256

                              3818abdee5b1d3d77ae4a5ace25a638b2d7d624605f8e8ce14dd6d4c6639c00c

                              SHA512

                              54188bf433a0da1b6b8f6f881af6d681a6bb629693191c7ee46f852953529cb94dfa894aca574e1cd7355985ea8d6187e7694c8144ea1db880922676f0dfe0c5

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                              Filesize

                              717B

                              MD5

                              822467b728b7a66b081c91795373789a

                              SHA1

                              d8f2f02e1eef62485a9feffd59ce837511749865

                              SHA256

                              af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                              SHA512

                              bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\121CC44D1A34A04F9EDE20EE325C4119

                              Filesize

                              504B

                              MD5

                              cd8c6e8844e6c516ae449e2c25e7f853

                              SHA1

                              606a41e1228e0599d1d2de94d24b3319faa225cd

                              SHA256

                              bf4ba4c255b9749ff94fd55806ac273f472910ea94cb0120bfb71f1e920c5eb4

                              SHA512

                              17cd178f6b77c50928ca27759615e5f324ada591f65b8ae2b541e7b2eb885cae0eb09ca8d03874fe2e801bfdefbcf07f1d2e0f6dd3414581f4b6bb1701c245ad

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                              Filesize

                              192B

                              MD5

                              5e314dbffc6d940210f8bcce9a50c581

                              SHA1

                              ec0ac21f901ed738d09f191185e09534842e6c96

                              SHA256

                              832468fc48b56d4256a663807dff8b1be75e6fb67ce04699a9603b56c61a3bbb

                              SHA512

                              63fdf12fd544ba4535124a1fb6e37b0277af90e36b80c5c134a5f0b85b32c3c5f9043a455618eccd3a83b56f78e1da292d68b7e9326a3d5e036678d010aeb047

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\121CC44D1A34A04F9EDE20EE325C4119

                              Filesize

                              550B

                              MD5

                              1edfbe30330ab0f7822a6dbaa15e54d4

                              SHA1

                              a3f44745cd48722564eea5524bf9470419c103c1

                              SHA256

                              c5ad68a7040dd4357c5239031e40aab91297c986f9cb687d33ed7cf4d7d3cbf8

                              SHA512

                              2df9b7b2050f790e5d668006289127efc3b1f8a06542a1243da0a62a812d076c3ebcb4d04ff7f85870288daf41838116e2525649d0ffd0784fdf7875ea4aff15

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              2dc1a9f2f3f8c3cfe51bb29b078166c5

                              SHA1

                              eaf3c3dad3c8dc6f18dc3e055b415da78b704402

                              SHA256

                              dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa

                              SHA512

                              682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              e4f80e7950cbd3bb11257d2000cb885e

                              SHA1

                              10ac643904d539042d8f7aa4a312b13ec2106035

                              SHA256

                              1184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124

                              SHA512

                              2b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              192B

                              MD5

                              ee6c137395c7798aba81f20bd3b002ef

                              SHA1

                              52da18a22b1c83b1beb0b84c34c2feb08c212e7b

                              SHA256

                              6858731558859732aad43d82be942b250c6c448364b874b97ff2981fcf43ed73

                              SHA512

                              487d1cc7879ec56326d3feea62aa8b6695283173197663b75f5701f00461778bc48463ba09ca80e977d411a4e6a7830f056766f50a1b4daeaec16410bcb3ed1e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              910B

                              MD5

                              460dae24b1241eadc77d6e2ff7154087

                              SHA1

                              f3c5a13783c32a3ff9f6096f9f80da77680cc32b

                              SHA256

                              d8083463f71d585b0e4abb237e521ef3b5f87fb4fd3156edb0b0324670b7f758

                              SHA512

                              402bc82e4628a94351ba72b5cb0557378a608696f6d16603986cc06c05322b59c6732700e74ef9a9d8e3c8e97b667f3fb428aa00c0370bb36625734956e29534

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              b0b35d068fd62fd9a6aabf6036792300

                              SHA1

                              6311b67b8b82c22546f5fe4aff5657a19e138f40

                              SHA256

                              e3640567e1a86643bb22d10d2caa30150ebf60f713684cdb890f5db5de9afacb

                              SHA512

                              03516f703d13182866f75a4d0f1e32b6d85af6a4ed01711af5ec33add96dc034262db9ebe83ee44c02224a3b2f7f1d823ed363b0e72abc37802af91081eec3f4

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              f545eb73bfffaca5aa841d86b4acca5d

                              SHA1

                              281cca7d4883b8ff5078e76e29b1c7db2c0d4095

                              SHA256

                              1ea453272916551795273cf407baa6516ff10c701d832b94b324ea1395e5ea28

                              SHA512

                              e159511fe4890834fc24e52d1c54e681324993e1f5381f8961ffc2e4860477a4aa69620080f1f0ea90015447dbf8b90082eae7fd49d377ca9cf1edd3e581481c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              e328445c1c93d19dbfbeacf2355bbfd9

                              SHA1

                              4c8f22010631957f5d4a433c7489b6666db8808b

                              SHA256

                              d2afa94fdbf9e340c189af0973aabde568b5f1dd664124a672708b59ed9fd44e

                              SHA512

                              5f96c30a099ad38d798362bb270b5a224e53bf91766cee2d6e2dccb95bc85253e82b7fed099d3c6e56be9bc00a2f45c2ed7c2f127453a246cfe2c3d070290c2f

                            • C:\Users\Admin\AppData\Local\Temp\is-8T7FS.tmp\_isetup\_shfoldr.dll

                              Filesize

                              22KB

                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\bonjour.msi

                              Filesize

                              2.6MB

                              MD5

                              8dcf5c9eaacdaf4568220d103f393dea

                              SHA1

                              27f68596398b68ba048f95752b4eeb4aa013c23f

                              SHA256

                              53be81cc6e2dc95a1041e8f3d8f500fad4259ab20a1aac151b5fc7a64d354a93

                              SHA512

                              10f8ffb6fa5e7163f0a83190ddf211479f12e16635389b49ac041eceafd7f04c040d830065adc89b1003f38d8381851c09150a5bc8edced6ecae8ee5ae801088

                            • C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\isxdl.dll

                              Filesize

                              131KB

                              MD5

                              16881920cbe9ddb46c3ef29ee405a857

                              SHA1

                              0f76cffc2e57cf5c481a8015d203b96638d36ef5

                              SHA256

                              59abe5f46020cb56e1079df8dc1145b2033e4b1459ae3d92f637064a6b618bc1

                              SHA512

                              f07d1f4133a2ba2bda92fa6f55360fae73e44b97756ee3044f31af5f9e01cda34e7efbb1520c0b5aa2a496edc03ed4fefdc4ad419c1028b1ce6457b69aabeba0

                            • C:\Users\Admin\AppData\Local\Temp\is-LC5JV.tmp\setup.exe

                              Filesize

                              7.6MB

                              MD5

                              7a2f16b1053362d8e8edae5e320dd4d9

                              SHA1

                              8cda4387a93287f38d2b48fb109bd54a77bcdcf9

                              SHA256

                              d2c7d87fad0c0fa94a4e2acdca4524cda696f2fd0c53ea9ddbe927da839707fa

                              SHA512

                              2277ee7ac98560093a652019bf3a2fb18f02718580ef6711532498aaa17b87705266ed83093ffd4cfc73ec608a76359336a1780586679838633ac403bf683bcd

                            • C:\Users\Admin\AppData\Local\Temp\is-SN0AV.tmp\lonelyscreen-win-installer.tmp

                              Filesize

                              1.1MB

                              MD5

                              f120c361b527a9d090782300aa8f1ce5

                              SHA1

                              ed82441da0dc7a5695ef96839fc2aea0f0c7e376

                              SHA256

                              9209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825

                              SHA512

                              60fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555

                            • C:\Windows\Installer\MSIBB.tmp

                              Filesize

                              75KB

                              MD5

                              6f8e3e4f72620bddc633f0175f47161e

                              SHA1

                              53ed75a208cc84f1a065e9e4ece356371cac0341

                              SHA256

                              2adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e

                              SHA512

                              80187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869

                            • C:\Windows\Installer\MSIFF30.tmp

                              Filesize

                              75KB

                              MD5

                              08c031fa82a09aae1079378669678fe6

                              SHA1

                              b109251d2fef08bd446be0c92369e6f11eb67093

                              SHA256

                              8764d060558a9d4ef24adb43201d5178033171a649ad497f79ce3b6cc8eda98a

                              SHA512

                              d133a7c02ee8e6e4a971ed4a6537c11cb58516a5ac0501672169805f7b97591d7cffd3a72133bd1df4b8d8a4f4965ddf324a83cd9be0d8af15e646a121e2ea4c

                            • C:\Windows\SysWOW64\dnssd.dll

                              Filesize

                              71KB

                              MD5

                              062373995eae5f0eac9eaa9192136bfb

                              SHA1

                              b421e274da7d34aba8bf09ec2d3e7b4a01392b84

                              SHA256

                              0392d5656bd677c4c5cb74c96e7b85b0867f2535a37950aec7f5c4a1a70d19ae

                              SHA512

                              89c01c6c0abb7462a0dff6d9d03141f5dc42d08fcb22e44e532d8a87dd9d8c7db2fc272a1a52a147645e54d0116db94878fedc81f5fe4e5bf7d15292d95b2b88

                            • memory/768-26-0x0000000000400000-0x0000000000425000-memory.dmp

                              Filesize

                              148KB

                            • memory/768-272-0x0000000000400000-0x0000000000425000-memory.dmp

                              Filesize

                              148KB

                            • memory/768-0-0x0000000000400000-0x0000000000425000-memory.dmp

                              Filesize

                              148KB

                            • memory/768-2-0x0000000000401000-0x0000000000410000-memory.dmp

                              Filesize

                              60KB

                            • memory/1780-34-0x0000000000400000-0x0000000000425000-memory.dmp

                              Filesize

                              148KB

                            • memory/1780-65-0x0000000000400000-0x0000000000425000-memory.dmp

                              Filesize

                              148KB

                            • memory/2888-39-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2888-62-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4844-25-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4844-17-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4844-7-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4844-271-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4844-66-0x0000000000400000-0x0000000000529000-memory.dmp

                              Filesize

                              1.2MB