Analysis

  • max time kernel
    43s
  • max time network
    44s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-11-2024 13:16

General

  • Target

    lonelyscreen-win-installer.exe

  • Size

    538KB

  • MD5

    64da00119c76c6e1d75f059ffc4a772d

  • SHA1

    ebaebff7db60430cad107d4efc45654d43f98075

  • SHA256

    039004b76a1bc5ac020958256bdcf97f1464398c13b0be2e0d0078f1aee8b3a7

  • SHA512

    d13544aa2ee6060510c0f906e3f174a4ec40878f36193a99d6c527b62fa6a379115e965e272069b0e3f0479df16e6899a096ede37fb0832262c72d3d24f824f3

  • SSDEEP

    12288:AS3yBV888888888888W88888888888pKfXGU69eTutORzK/AA9i6Zub02O9HtFbl:/3yLKfXG6wZ/D9kqtZaTq

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 18 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe
    "C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Users\Admin\AppData\Local\Temp\is-K36KT.tmp\lonelyscreen-win-installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-K36KT.tmp\lonelyscreen-win-installer.tmp" /SL5="$9021C,164153,114176,C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\setup.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3088
        • C:\Users\Admin\AppData\Local\Temp\is-629IB.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-629IB.tmp\setup.tmp" /SL5="$602BE,7573378,114176,C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\setup.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.lonelyscreen.com/installed.php?version=1.2.16
            5⤵
            • Loads dropped DLL
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0b4846f8,0x7ffd0b484708,0x7ffd0b484718
              6⤵
                PID:1392
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:2
                6⤵
                  PID:2008
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:3
                  6⤵
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2952
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8
                  6⤵
                    PID:1544
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                    6⤵
                      PID:1552
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                      6⤵
                        PID:4144
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:1
                        6⤵
                          PID:3192
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:8
                          6⤵
                            PID:2364
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:8
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5348
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:1
                            6⤵
                              PID:6132
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1948,15450849665981186278,17742290322108336841,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                              6⤵
                                PID:6140
                        • C:\Windows\SysWOW64\msiexec.exe
                          "msiexec.exe" /qn /i C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\bonjour.msi
                          3⤵
                          • Event Triggered Execution: Installer Packages
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1556
                        • C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe
                          "C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of SetWindowsHookEx
                          PID:5752
                    • C:\Windows\system32\msiexec.exe
                      C:\Windows\system32\msiexec.exe /V
                      1⤵
                      • Blocklisted process makes network request
                      • Enumerates connected drives
                      • Drops file in System32 directory
                      • Drops file in Program Files directory
                      • Drops file in Windows directory
                      • Modifies data under HKEY_USERS
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3036
                      • C:\Windows\System32\MsiExec.exe
                        C:\Windows\System32\MsiExec.exe -Embedding 71BD89A5E528696392D10FC8DCA04FAA
                        2⤵
                        • Loads dropped DLL
                        PID:3864
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding BA37278F035C7615168ACC7EE58A0601
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:2896
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 2D3921277C92F9CB20F67A6E86A876B4 E Global\MSI0000
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:4240
                      • C:\Windows\System32\MsiExec.exe
                        "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"
                        2⤵
                        • Loads dropped DLL
                        PID:5440
                      • C:\Windows\syswow64\MsiExec.exe
                        "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"
                        2⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:5500
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:4308
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:3744
                        • C:\Program Files\Bonjour\mDNSResponder.exe
                          "C:\Program Files\Bonjour\mDNSResponder.exe"
                          1⤵
                          • Modifies firewall policy service
                          • Executes dropped EXE
                          PID:5528

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Config.Msi\e5834f9.rbs

                          Filesize

                          126KB

                          MD5

                          938c64b994984c14b6c223bc5f195f2c

                          SHA1

                          7871fa89acfb43de6f473dc2baad03d497769a20

                          SHA256

                          1c4d69f8c88bc97ec1fded58cf410894e13257a55aae61e6e8085a6698f95935

                          SHA512

                          8bb0c3526948ea0817df7552baaa5ff35273b0b19ebad202db5987180d9a7d09ef7a762fd745eca7b73466f5bc3a14647c1557ad15f04ae7d9448f50c8ccf7c5

                        • C:\Program Files (x86)\Bonjour\mDNSResponder.exe

                          Filesize

                          381KB

                          MD5

                          db5bea73edaf19ac68b2c0fad0f92b1a

                          SHA1

                          74bb0197763e386036751bf30c5bbf4c389fa24e

                          SHA256

                          10f21999ff6b1d410ebf280f7f27deaca5289739cf12f4293b614b8fc6c88dcc

                          SHA512

                          63b718288c266debf3f58ac1a62cdcca6f09350616d53a406271d8f4fe6144751eddf7b7ba2dbfe79cfda671ee5afbdbae5798204edaaf4f0391895b824ae7c5

                        • C:\Program Files (x86)\Bonjour\mdnsNSP.dll

                          Filesize

                          118KB

                          MD5

                          40947436a70e0034e41123df5a0a7702

                          SHA1

                          6c27e1dd1c1533feb6435190a5074300ac2a9822

                          SHA256

                          5d40fd92da5ca59c1badb58ad509db6a6d613f18660a9a270a53eca85d34c3a9

                          SHA512

                          ba5634cc82f306245f9f0350bfa0b91e2f5ffc6c355b1452a95483f47e6acdb42c4e063f6c15115faf0f0630005df4fe8ef0e01539c270031cbd07a34a929704

                        • C:\Program Files (x86)\LonelyScreen\LonelyScreen.exe

                          Filesize

                          22.3MB

                          MD5

                          a3ff7e328f41f4a6af82266bfe12036f

                          SHA1

                          79f0e44415ffe74b320dfb27c8988d326dc80b2e

                          SHA256

                          9f2a9f89adda3003c587e4a9bdf5decf3260beefb135180e44845aee7730f731

                          SHA512

                          472625b9ab26e83845a72423722e4b1286dce950597a52e95dff385bb33c1a1e4870755f273c8a02dea0793d04bdad7779cc05c786dff7ed624f5feb46d0a803

                        • C:\Program Files (x86)\LonelyScreen\is-950A1.tmp

                          Filesize

                          1.1MB

                          MD5

                          cc8b164c85cc68a2e6e0d10e452ef68b

                          SHA1

                          fed79b50a5f03c0e33071ff849ea19dfdaf3c464

                          SHA256

                          20590034969e110c4fba1d065da8ac53dad79f5b8a9bd68780164207a170c749

                          SHA512

                          bee540ceb2b1de587872cdb963d2c754ac4ba0f3cac8026c3d7c2882aae0bfeb31babae927361b2ef5484ab2085b4a19914cc99a504aafd3f08c34f9f626699d

                        • C:\Program Files (x86)\LonelyScreen\unins000.dat

                          Filesize

                          6KB

                          MD5

                          23a5a3e40b746add46be332a5a4e7b7f

                          SHA1

                          1112b16c1705dd5e3b41de3ec4c6fdb60446f6d1

                          SHA256

                          8c59f8bda2b9198bac292efdbe0d83d86784e0180248e3571ed0facb23e08a44

                          SHA512

                          870fa50c795642ff46aa5b4fb5a990496792fe6415e28f27906f94b30beac2d268957124a2b5cd311efee5a28bfa1d39fa388f0e078c27176429ecbcb178e056

                        • C:\Program Files\Bonjour\mDNSResponder.exe

                          Filesize

                          451KB

                          MD5

                          ebbcd5dfbb1de70e8f4af8fa59e401fd

                          SHA1

                          5ca966b9a5ff4ecd0e139e21b3e30f3ea48e1a88

                          SHA256

                          17bffc5df609ce3b2f0cab4bd6c118608c66a3ad86116a47e90b2bb7d8954122

                          SHA512

                          2fbfcff6bc25461e7c98aabdae0efb33f2df64140aaf4b2b0c253e34294e1606077ae47b000ebababb3600bd4d9154a945036c58e4e930da445a0dda765ac8a4

                        • C:\Program Files\Bonjour\mdnsNSP.dll

                          Filesize

                          129KB

                          MD5

                          f9d908de6b166dac9b89bf62fa291ce8

                          SHA1

                          938b53238291fc41ae852fdde51eed7a2bff0604

                          SHA256

                          d0a918ad60221623bb0278ea94cd6938744617fdbb2054968afafc2940648f02

                          SHA512

                          6643a7066974abfd5904df73ed225fd5eed4a84341b12199b6eb9a8a2ad234dba865d50f8ccff8a88002ce4c6ae2131745cf43aac88a3a0a66b596fb0d93e56e

                        • C:\Program Files\Java\jre-1.8\lib\ext\dns_sd.jar

                          Filesize

                          16KB

                          MD5

                          ca086bb31b598febd7e8d44daf14714a

                          SHA1

                          4838808e80df811cfb2bf7faf361b3cbc16f9f81

                          SHA256

                          3818abdee5b1d3d77ae4a5ace25a638b2d7d624605f8e8ce14dd6d4c6639c00c

                          SHA512

                          54188bf433a0da1b6b8f6f881af6d681a6bb629693191c7ee46f852953529cb94dfa894aca574e1cd7355985ea8d6187e7694c8144ea1db880922676f0dfe0c5

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          822467b728b7a66b081c91795373789a

                          SHA1

                          d8f2f02e1eef62485a9feffd59ce837511749865

                          SHA256

                          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

                          SHA512

                          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6F06065BB83477089CB2AC4E4CE380C8

                          Filesize

                          504B

                          MD5

                          9bc0cab2765e360a50f22bbebb656501

                          SHA1

                          8bf0009bf4dfb23a7e4aea00db38d451c8ef61b2

                          SHA256

                          202c4b96677de63c750b4faa8ea126cec6bd7a07eee84f75d707da583af5ffc2

                          SHA512

                          fde674f858b81eaed33e3b179da560139682f271fb4cd04d6f80b59e809c3fe6f50ed23018371a27515f518ab822eb1bc72e4a26a2285f4af38ebd811d7320f7

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          f56634b493943632257b464bc5c01d6b

                          SHA1

                          c7b5a66b3660c07795134a5e0900ebae848821ae

                          SHA256

                          ad405a76a1d15d5cb5193a39b1045921567fbe2fe84bf91df1ee56e434ace199

                          SHA512

                          d5117e528fe8b5ed1080188205897e7d95984e6ee40f3061fbe26beaf3673bb6f11aacaa2e902b0eb4e9a7ea207e3edf062bb0dde75985f39f4a47c7a75a35ba

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6F06065BB83477089CB2AC4E4CE380C8

                          Filesize

                          546B

                          MD5

                          54256c980c46fd7675375730b712ba8d

                          SHA1

                          eae8072766fdbdf41fc3cfba5f51d8a5ffa31f99

                          SHA256

                          f8e88db60683cafca96295fc3a7ca567fa81d0a412e5b89ebdffa741606a65fa

                          SHA512

                          eb9c538e138a2500138c8e1a3bf4dda047edf975fe7c6c866b9cb9ca6cdd434923e99c0d3ba1b545cb98994e7926a26f54e7e743232b43596cdfa756d9bf5488

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          37f660dd4b6ddf23bc37f5c823d1c33a

                          SHA1

                          1c35538aa307a3e09d15519df6ace99674ae428b

                          SHA256

                          4e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8

                          SHA512

                          807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          d7cb450b1315c63b1d5d89d98ba22da5

                          SHA1

                          694005cd9e1a4c54e0b83d0598a8a0c089df1556

                          SHA256

                          38355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031

                          SHA512

                          df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          bc5d5498585207f5623af9675011e609

                          SHA1

                          08f9f4a98611a2719ef562b8b5221cdcb36f41d0

                          SHA256

                          a4ab9ebe87a6cd79766b1ccd4ca5f44ccddfa5a4065a7d9e64e332ca44550ec2

                          SHA512

                          f18774be24eee5a94a6f708f2980d9b01146431ebeb75358c2d1d568a87bb3bdb0132a95309f7a985be78353a5605f66ae4830a096957284759171080fa5e678

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          fca7f9178d25d0de1ce48c50730cea96

                          SHA1

                          859ed929989ad76efe8a5ec041b3eeeea2f733af

                          SHA256

                          779ca1972bfcc3e097ea99cd6a88088f112a48a6b3862b9bff1bf6101a751c0b

                          SHA512

                          daeb92f53de07afe141dac2d37de98eeeaf2b3aa1bb6a0708472a2183bfc2f6c25110283905915fc32130d7d47334eb2272a1e8943303d715c6407cdd2c5682b

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                          Filesize

                          16B

                          MD5

                          6752a1d65b201c13b62ea44016eb221f

                          SHA1

                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                          SHA256

                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                          SHA512

                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          10KB

                          MD5

                          081f0358757eefe97982f2a2faebb163

                          SHA1

                          b7c0246da894ebc67b6b770da3f23e96beae415a

                          SHA256

                          b3fc03fde4b50b1f5c738d0dc01b1c43299215ef72e60b0e3f6bfdbfc3a7e6e5

                          SHA512

                          71c82121c7317be0a75aa228b6f6a6ba953ff5ee6575212edab9ac31e8cf1d37aa3120402954bd2d8de2b45f2d078881e396bdf3f9344e5c7e6fe9d05e6483a5

                        • C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\bonjour.msi

                          Filesize

                          2.6MB

                          MD5

                          8dcf5c9eaacdaf4568220d103f393dea

                          SHA1

                          27f68596398b68ba048f95752b4eeb4aa013c23f

                          SHA256

                          53be81cc6e2dc95a1041e8f3d8f500fad4259ab20a1aac151b5fc7a64d354a93

                          SHA512

                          10f8ffb6fa5e7163f0a83190ddf211479f12e16635389b49ac041eceafd7f04c040d830065adc89b1003f38d8381851c09150a5bc8edced6ecae8ee5ae801088

                        • C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\isxdl.dll

                          Filesize

                          131KB

                          MD5

                          16881920cbe9ddb46c3ef29ee405a857

                          SHA1

                          0f76cffc2e57cf5c481a8015d203b96638d36ef5

                          SHA256

                          59abe5f46020cb56e1079df8dc1145b2033e4b1459ae3d92f637064a6b618bc1

                          SHA512

                          f07d1f4133a2ba2bda92fa6f55360fae73e44b97756ee3044f31af5f9e01cda34e7efbb1520c0b5aa2a496edc03ed4fefdc4ad419c1028b1ce6457b69aabeba0

                        • C:\Users\Admin\AppData\Local\Temp\is-DSV15.tmp\setup.exe

                          Filesize

                          7.6MB

                          MD5

                          7a2f16b1053362d8e8edae5e320dd4d9

                          SHA1

                          8cda4387a93287f38d2b48fb109bd54a77bcdcf9

                          SHA256

                          d2c7d87fad0c0fa94a4e2acdca4524cda696f2fd0c53ea9ddbe927da839707fa

                          SHA512

                          2277ee7ac98560093a652019bf3a2fb18f02718580ef6711532498aaa17b87705266ed83093ffd4cfc73ec608a76359336a1780586679838633ac403bf683bcd

                        • C:\Users\Admin\AppData\Local\Temp\is-H3GNA.tmp\_isetup\_shfoldr.dll

                          Filesize

                          22KB

                          MD5

                          92dc6ef532fbb4a5c3201469a5b5eb63

                          SHA1

                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                          SHA256

                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                          SHA512

                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                        • C:\Users\Admin\AppData\Local\Temp\is-K36KT.tmp\lonelyscreen-win-installer.tmp

                          Filesize

                          1.1MB

                          MD5

                          f120c361b527a9d090782300aa8f1ce5

                          SHA1

                          ed82441da0dc7a5695ef96839fc2aea0f0c7e376

                          SHA256

                          9209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825

                          SHA512

                          60fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555

                        • C:\Windows\Installer\MSI39B8.tmp

                          Filesize

                          75KB

                          MD5

                          08c031fa82a09aae1079378669678fe6

                          SHA1

                          b109251d2fef08bd446be0c92369e6f11eb67093

                          SHA256

                          8764d060558a9d4ef24adb43201d5178033171a649ad497f79ce3b6cc8eda98a

                          SHA512

                          d133a7c02ee8e6e4a971ed4a6537c11cb58516a5ac0501672169805f7b97591d7cffd3a72133bd1df4b8d8a4f4965ddf324a83cd9be0d8af15e646a121e2ea4c

                        • C:\Windows\Installer\MSI3C9B.tmp

                          Filesize

                          75KB

                          MD5

                          6f8e3e4f72620bddc633f0175f47161e

                          SHA1

                          53ed75a208cc84f1a065e9e4ece356371cac0341

                          SHA256

                          2adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e

                          SHA512

                          80187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869

                        • C:\Windows\SysWOW64\dnssd.dll

                          Filesize

                          71KB

                          MD5

                          062373995eae5f0eac9eaa9192136bfb

                          SHA1

                          b421e274da7d34aba8bf09ec2d3e7b4a01392b84

                          SHA256

                          0392d5656bd677c4c5cb74c96e7b85b0867f2535a37950aec7f5c4a1a70d19ae

                          SHA512

                          89c01c6c0abb7462a0dff6d9d03141f5dc42d08fcb22e44e532d8a87dd9d8c7db2fc272a1a52a147645e54d0116db94878fedc81f5fe4e5bf7d15292d95b2b88

                        • memory/2888-275-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2888-45-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2888-7-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2888-25-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2888-224-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2888-17-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2896-62-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2896-40-0x0000000000400000-0x0000000000529000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3088-35-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/3088-32-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/3088-65-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/4600-26-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/4600-0-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB

                        • memory/4600-2-0x0000000000401000-0x0000000000410000-memory.dmp

                          Filesize

                          60KB

                        • memory/4600-276-0x0000000000400000-0x0000000000425000-memory.dmp

                          Filesize

                          148KB