Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/12/2024, 22:23

241214-2ay27axqcp 10

Analysis

  • max time kernel
    64s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/12/2024, 22:23

General

  • Target

    lonelyscreen-win-installer.exe

  • Size

    538KB

  • MD5

    64da00119c76c6e1d75f059ffc4a772d

  • SHA1

    ebaebff7db60430cad107d4efc45654d43f98075

  • SHA256

    039004b76a1bc5ac020958256bdcf97f1464398c13b0be2e0d0078f1aee8b3a7

  • SHA512

    d13544aa2ee6060510c0f906e3f174a4ec40878f36193a99d6c527b62fa6a379115e965e272069b0e3f0479df16e6899a096ede37fb0832262c72d3d24f824f3

  • SSDEEP

    12288:AS3yBV888888888888W88888888888pKfXGU69eTutORzK/AA9i6Zub02O9HtFbl:/3yLKfXG6wZ/D9kqtZaTq

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 18 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 31 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe
    "C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Users\Admin\AppData\Local\Temp\is-SBI8U.tmp\lonelyscreen-win-installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SBI8U.tmp\lonelyscreen-win-installer.tmp" /SL5="$70050,164153,114176,C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\setup.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4784
        • C:\Users\Admin\AppData\Local\Temp\is-95VRR.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-95VRR.tmp\setup.tmp" /SL5="$801D2,7573378,114176,C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\setup.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2972
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.lonelyscreen.com/installed.php?version=1.2.16
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3808
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe8,0x108,0x7ffe009046f8,0x7ffe00904708,0x7ffe00904718
              6⤵
                PID:3728
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
                6⤵
                  PID:2300
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:3
                  6⤵
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3224
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:8
                  6⤵
                    PID:4804
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                    6⤵
                      PID:3548
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
                      6⤵
                        PID:4984
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:1
                        6⤵
                          PID:392
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:8
                          6⤵
                            PID:1904
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,9960790463143836631,16698256021989230501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:8
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1504
                    • C:\Windows\SysWOW64\msiexec.exe
                      "msiexec.exe" /qn /i C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\bonjour.msi
                      3⤵
                      • Event Triggered Execution: Installer Packages
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1276
                    • C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe
                      "C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe"
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:5260
                • C:\Windows\system32\msiexec.exe
                  C:\Windows\system32\msiexec.exe /V
                  1⤵
                  • Blocklisted process makes network request
                  • Enumerates connected drives
                  • Drops file in System32 directory
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5084
                  • C:\Windows\System32\MsiExec.exe
                    C:\Windows\System32\MsiExec.exe -Embedding D98F54034EF534777F6742BB07E91E58
                    2⤵
                    • Loads dropped DLL
                    PID:4796
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding 41C3DA8AE0AA18E5C7FBF69626DD8ED6
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3636
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding AAC133C53EE07E4526AA00481C6F2488 E Global\MSI0000
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:4352
                  • C:\Windows\System32\MsiExec.exe
                    "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"
                    2⤵
                    • Loads dropped DLL
                    PID:3960
                  • C:\Windows\syswow64\MsiExec.exe
                    "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3208
                • C:\Windows\System32\CompPkgSrv.exe
                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                  1⤵
                    PID:3008
                  • C:\Windows\System32\CompPkgSrv.exe
                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                    1⤵
                      PID:3540
                    • C:\Program Files\Bonjour\mDNSResponder.exe
                      "C:\Program Files\Bonjour\mDNSResponder.exe"
                      1⤵
                      • Modifies firewall policy service
                      • Executes dropped EXE
                      PID:4328

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Config.Msi\e580250.rbs

                      Filesize

                      126KB

                      MD5

                      61dfd3fb7a35ae92dc48122fa337f519

                      SHA1

                      0ae025b632a33616446494abceea910bbeed266f

                      SHA256

                      c082fdd59e783fa2a76f04a9ac65cff80cf582cc6539095d45a447f20c16c1af

                      SHA512

                      84b9704257d0c377bea282042766cf2f8cbede8e40a6bdad4dba6942ac30c83471e67e760a6888a404230112fc32c094841f4ddc6dd8ea926c0787622e2c2391

                    • C:\Program Files (x86)\Bonjour\mDNSResponder.exe

                      Filesize

                      381KB

                      MD5

                      db5bea73edaf19ac68b2c0fad0f92b1a

                      SHA1

                      74bb0197763e386036751bf30c5bbf4c389fa24e

                      SHA256

                      10f21999ff6b1d410ebf280f7f27deaca5289739cf12f4293b614b8fc6c88dcc

                      SHA512

                      63b718288c266debf3f58ac1a62cdcca6f09350616d53a406271d8f4fe6144751eddf7b7ba2dbfe79cfda671ee5afbdbae5798204edaaf4f0391895b824ae7c5

                    • C:\Program Files (x86)\Bonjour\mdnsNSP.dll

                      Filesize

                      118KB

                      MD5

                      40947436a70e0034e41123df5a0a7702

                      SHA1

                      6c27e1dd1c1533feb6435190a5074300ac2a9822

                      SHA256

                      5d40fd92da5ca59c1badb58ad509db6a6d613f18660a9a270a53eca85d34c3a9

                      SHA512

                      ba5634cc82f306245f9f0350bfa0b91e2f5ffc6c355b1452a95483f47e6acdb42c4e063f6c15115faf0f0630005df4fe8ef0e01539c270031cbd07a34a929704

                    • C:\Program Files (x86)\LonelyScreen\LonelyScreen.exe

                      Filesize

                      22.3MB

                      MD5

                      a3ff7e328f41f4a6af82266bfe12036f

                      SHA1

                      79f0e44415ffe74b320dfb27c8988d326dc80b2e

                      SHA256

                      9f2a9f89adda3003c587e4a9bdf5decf3260beefb135180e44845aee7730f731

                      SHA512

                      472625b9ab26e83845a72423722e4b1286dce950597a52e95dff385bb33c1a1e4870755f273c8a02dea0793d04bdad7779cc05c786dff7ed624f5feb46d0a803

                    • C:\Program Files (x86)\LonelyScreen\unins000.dat

                      Filesize

                      6KB

                      MD5

                      bfc127a0515ef932e99991ecf2a3ea18

                      SHA1

                      c052f289dcd8b47ed3f9ee8fe3708146a712ff00

                      SHA256

                      e0d3b0e982796f23a2f62867bcfcca75769f3096b53849c4671b4ce58531d3f6

                      SHA512

                      7c24287bd790518dd121fa41bf49254f526ebd85ff962c368cb2d22ac528f4bb9a84320a6a9a6d41e5894f907b7f7b48a3ed300ad59c28e795b0726ced6be29d

                    • C:\Program Files (x86)\LonelyScreen\unins001.exe

                      Filesize

                      1.1MB

                      MD5

                      cc8b164c85cc68a2e6e0d10e452ef68b

                      SHA1

                      fed79b50a5f03c0e33071ff849ea19dfdaf3c464

                      SHA256

                      20590034969e110c4fba1d065da8ac53dad79f5b8a9bd68780164207a170c749

                      SHA512

                      bee540ceb2b1de587872cdb963d2c754ac4ba0f3cac8026c3d7c2882aae0bfeb31babae927361b2ef5484ab2085b4a19914cc99a504aafd3f08c34f9f626699d

                    • C:\Program Files\Bonjour\mDNSResponder.exe

                      Filesize

                      451KB

                      MD5

                      ebbcd5dfbb1de70e8f4af8fa59e401fd

                      SHA1

                      5ca966b9a5ff4ecd0e139e21b3e30f3ea48e1a88

                      SHA256

                      17bffc5df609ce3b2f0cab4bd6c118608c66a3ad86116a47e90b2bb7d8954122

                      SHA512

                      2fbfcff6bc25461e7c98aabdae0efb33f2df64140aaf4b2b0c253e34294e1606077ae47b000ebababb3600bd4d9154a945036c58e4e930da445a0dda765ac8a4

                    • C:\Program Files\Bonjour\mdnsNSP.dll

                      Filesize

                      129KB

                      MD5

                      f9d908de6b166dac9b89bf62fa291ce8

                      SHA1

                      938b53238291fc41ae852fdde51eed7a2bff0604

                      SHA256

                      d0a918ad60221623bb0278ea94cd6938744617fdbb2054968afafc2940648f02

                      SHA512

                      6643a7066974abfd5904df73ed225fd5eed4a84341b12199b6eb9a8a2ad234dba865d50f8ccff8a88002ce4c6ae2131745cf43aac88a3a0a66b596fb0d93e56e

                    • C:\Program Files\Java\jre-1.8\lib\ext\dns_sd.jar

                      Filesize

                      16KB

                      MD5

                      ca086bb31b598febd7e8d44daf14714a

                      SHA1

                      4838808e80df811cfb2bf7faf361b3cbc16f9f81

                      SHA256

                      3818abdee5b1d3d77ae4a5ace25a638b2d7d624605f8e8ce14dd6d4c6639c00c

                      SHA512

                      54188bf433a0da1b6b8f6f881af6d681a6bb629693191c7ee46f852953529cb94dfa894aca574e1cd7355985ea8d6187e7694c8144ea1db880922676f0dfe0c5

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                      Filesize

                      734B

                      MD5

                      e192462f281446b5d1500d474fbacc4b

                      SHA1

                      5ed0044ac937193b78f9878ad7bac5c9ff7534ff

                      SHA256

                      f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60

                      SHA512

                      cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E73DB4BC7EC7D53DAA55B0E346CCF24

                      Filesize

                      504B

                      MD5

                      6d7156f568dac461c6b6bb85c568132d

                      SHA1

                      748c85211bb93f33ee9fdfa91e768b3c753c3965

                      SHA256

                      8d5f5b5b6dafa8e98bf1494d23cfc649dcfe19a7f498c7650a4d6ee4c23e81ef

                      SHA512

                      2c9412c11dc2b52bfc640b462e1f6b1e2604ca647021504ff07b64ed72d2df69ac3d2711acba53f502443a2ab3052840a62707809d7bcf722e1646d6c434912d

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                      Filesize

                      192B

                      MD5

                      33afd4825e05921e10cd07ad3abb80e1

                      SHA1

                      0b9e3257996c1676feb7de5ca336748ce438d051

                      SHA256

                      080056343a3abdd237399e52f177dc0a9b4781bfbe1249a7de7f05f4bcffa3fb

                      SHA512

                      9a3e650687d19027980433663a79b0b37cbb54ff2ae587cc801d5efd00c2f08cb44c25c8ea62249637fb0d2bb40588d990713629b9bd760671dbf8c0696840b3

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E73DB4BC7EC7D53DAA55B0E346CCF24

                      Filesize

                      546B

                      MD5

                      b5484eb83c8ae7b5bfdf59d8f8deaab7

                      SHA1

                      3c838e3df85c7d6427db2c76fa4773b60033011f

                      SHA256

                      f745fa7b509d22a19ae2a9cb065d0fbd2851fe750fa4fd118e9646e1a2b7b5af

                      SHA512

                      c46eb19c1e2784018a56288792c8185a2426cdc087ee663e1cd9dd17faa032c229537bfcdec293a8731756c2d59f757e540e5a5011d7cee085a98f68c7e52862

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      7de1bbdc1f9cf1a58ae1de4951ce8cb9

                      SHA1

                      010da169e15457c25bd80ef02d76a940c1210301

                      SHA256

                      6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                      SHA512

                      e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                      Filesize

                      152B

                      MD5

                      85ba073d7015b6ce7da19235a275f6da

                      SHA1

                      a23c8c2125e45a0788bac14423ae1f3eab92cf00

                      SHA256

                      5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                      SHA512

                      eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                      Filesize

                      192B

                      MD5

                      bc11550a32d37178d642ba591407bda9

                      SHA1

                      161d0bd5cf74de42052156ce1d4649d475959485

                      SHA256

                      159acf4867b2d4a8a012afb334a8b0c906ebfadf630c5cb5cb092cb083aba485

                      SHA512

                      11ce56c5a00ea65098e9f5042b03ee450fa7bba7c6f9ab01f4fc90c38bec019a3607573340f3be2ffce09e377c0be3eaf3a75d17a9334bb438e05da990d714c9

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      5KB

                      MD5

                      732b43586eec97bb87afed651fc75899

                      SHA1

                      fddfc7568049b31d55143cd08fcecaa27a2b3838

                      SHA256

                      77f724b9fa45e9a886c9660cc20f4814933304544742f2a35b14e5509c884103

                      SHA512

                      4413df1bba0b9658e51addca01fe2743272e61ea2bdee2f6cfccbb89fbf1f2e6192cfc2cfbf3784d30d310df16d2b59d3134a78cff83f9480ee1c2a66d0499b3

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                      Filesize

                      6KB

                      MD5

                      703ede066d4b6c93cb6485aab947e1ac

                      SHA1

                      3bdb98139b7e8cf313a9ea4750359e750853dd35

                      SHA256

                      797cc58e5591f5859c4a1279933a43b3ee97a37ce95195c7b4c58da27305bfbb

                      SHA512

                      3b4738d6c5af857b2a74401ae7bf626e97e1c9a05c14abbf021644f0c7ab71c50c597f25c04b061c85cc9bea7899a007131d4cdc9c03b8c1502c41c6f804d540

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                      Filesize

                      16B

                      MD5

                      6752a1d65b201c13b62ea44016eb221f

                      SHA1

                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                      SHA256

                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                      SHA512

                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                      Filesize

                      10KB

                      MD5

                      6e1b6085738235723601e13658fb134b

                      SHA1

                      22f907dae66eea899c13c4d4f574a29b438cb520

                      SHA256

                      264c6a83ebcf75ae48d3a0e39a255b608622d0de9a92fab0933ecfd879b733c5

                      SHA512

                      2270d07be0eadf73b7aa4225ad737f5a81bab0d04f2354afd0817c76c4101918d7d2bc0778358a4a446c61cdfda1c50f833b95eaca4039ac8410413ca863825e

                    • C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\bonjour.msi

                      Filesize

                      2.6MB

                      MD5

                      8dcf5c9eaacdaf4568220d103f393dea

                      SHA1

                      27f68596398b68ba048f95752b4eeb4aa013c23f

                      SHA256

                      53be81cc6e2dc95a1041e8f3d8f500fad4259ab20a1aac151b5fc7a64d354a93

                      SHA512

                      10f8ffb6fa5e7163f0a83190ddf211479f12e16635389b49ac041eceafd7f04c040d830065adc89b1003f38d8381851c09150a5bc8edced6ecae8ee5ae801088

                    • C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\isxdl.dll

                      Filesize

                      131KB

                      MD5

                      16881920cbe9ddb46c3ef29ee405a857

                      SHA1

                      0f76cffc2e57cf5c481a8015d203b96638d36ef5

                      SHA256

                      59abe5f46020cb56e1079df8dc1145b2033e4b1459ae3d92f637064a6b618bc1

                      SHA512

                      f07d1f4133a2ba2bda92fa6f55360fae73e44b97756ee3044f31af5f9e01cda34e7efbb1520c0b5aa2a496edc03ed4fefdc4ad419c1028b1ce6457b69aabeba0

                    • C:\Users\Admin\AppData\Local\Temp\is-H835T.tmp\setup.exe

                      Filesize

                      7.6MB

                      MD5

                      7a2f16b1053362d8e8edae5e320dd4d9

                      SHA1

                      8cda4387a93287f38d2b48fb109bd54a77bcdcf9

                      SHA256

                      d2c7d87fad0c0fa94a4e2acdca4524cda696f2fd0c53ea9ddbe927da839707fa

                      SHA512

                      2277ee7ac98560093a652019bf3a2fb18f02718580ef6711532498aaa17b87705266ed83093ffd4cfc73ec608a76359336a1780586679838633ac403bf683bcd

                    • C:\Users\Admin\AppData\Local\Temp\is-SBI8U.tmp\lonelyscreen-win-installer.tmp

                      Filesize

                      1.1MB

                      MD5

                      f120c361b527a9d090782300aa8f1ce5

                      SHA1

                      ed82441da0dc7a5695ef96839fc2aea0f0c7e376

                      SHA256

                      9209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825

                      SHA512

                      60fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555

                    • C:\Users\Admin\AppData\Local\Temp\is-TKUCK.tmp\_isetup\_shfoldr.dll

                      Filesize

                      22KB

                      MD5

                      92dc6ef532fbb4a5c3201469a5b5eb63

                      SHA1

                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                      SHA256

                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                      SHA512

                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                    • C:\Windows\Installer\MSI589.tmp

                      Filesize

                      75KB

                      MD5

                      08c031fa82a09aae1079378669678fe6

                      SHA1

                      b109251d2fef08bd446be0c92369e6f11eb67093

                      SHA256

                      8764d060558a9d4ef24adb43201d5178033171a649ad497f79ce3b6cc8eda98a

                      SHA512

                      d133a7c02ee8e6e4a971ed4a6537c11cb58516a5ac0501672169805f7b97591d7cffd3a72133bd1df4b8d8a4f4965ddf324a83cd9be0d8af15e646a121e2ea4c

                    • C:\Windows\Installer\MSI714.tmp

                      Filesize

                      75KB

                      MD5

                      6f8e3e4f72620bddc633f0175f47161e

                      SHA1

                      53ed75a208cc84f1a065e9e4ece356371cac0341

                      SHA256

                      2adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e

                      SHA512

                      80187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869

                    • C:\Windows\SysWOW64\dnssd.dll

                      Filesize

                      71KB

                      MD5

                      062373995eae5f0eac9eaa9192136bfb

                      SHA1

                      b421e274da7d34aba8bf09ec2d3e7b4a01392b84

                      SHA256

                      0392d5656bd677c4c5cb74c96e7b85b0867f2535a37950aec7f5c4a1a70d19ae

                      SHA512

                      89c01c6c0abb7462a0dff6d9d03141f5dc42d08fcb22e44e532d8a87dd9d8c7db2fc272a1a52a147645e54d0116db94878fedc81f5fe4e5bf7d15292d95b2b88

                    • memory/2044-254-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2044-271-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2044-46-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2044-17-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2044-28-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2044-7-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2972-40-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/2972-64-0x0000000000400000-0x0000000000529000-memory.dmp

                      Filesize

                      1.2MB

                    • memory/4784-67-0x0000000000400000-0x0000000000425000-memory.dmp

                      Filesize

                      148KB

                    • memory/4784-33-0x0000000000400000-0x0000000000425000-memory.dmp

                      Filesize

                      148KB

                    • memory/4784-35-0x0000000000400000-0x0000000000425000-memory.dmp

                      Filesize

                      148KB

                    • memory/5064-24-0x0000000000400000-0x0000000000425000-memory.dmp

                      Filesize

                      148KB

                    • memory/5064-2-0x0000000000401000-0x0000000000410000-memory.dmp

                      Filesize

                      60KB

                    • memory/5064-272-0x0000000000400000-0x0000000000425000-memory.dmp

                      Filesize

                      148KB

                    • memory/5064-0-0x0000000000400000-0x0000000000425000-memory.dmp

                      Filesize

                      148KB