Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

14/12/2024, 22:23

241214-2ay27axqcp 10

Analysis

  • max time kernel
    125s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/12/2024, 22:23

General

  • Target

    lonelyscreen-win-installer.exe

  • Size

    538KB

  • MD5

    64da00119c76c6e1d75f059ffc4a772d

  • SHA1

    ebaebff7db60430cad107d4efc45654d43f98075

  • SHA256

    039004b76a1bc5ac020958256bdcf97f1464398c13b0be2e0d0078f1aee8b3a7

  • SHA512

    d13544aa2ee6060510c0f906e3f174a4ec40878f36193a99d6c527b62fa6a379115e965e272069b0e3f0479df16e6899a096ede37fb0832262c72d3d24f824f3

  • SSDEEP

    12288:AS3yBV888888888888W88888888888pKfXGU69eTutORzK/AA9i6Zub02O9HtFbl:/3yLKfXG6wZ/D9kqtZaTq

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 25 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 8 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Drops file in Windows directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe
    "C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Users\Admin\AppData\Local\Temp\is-E9EHB.tmp\lonelyscreen-win-installer.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-E9EHB.tmp\lonelyscreen-win-installer.tmp" /SL5="$40150,164153,114176,C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Users\Admin\AppData\Local\Temp\is-9TA3G.tmp\setup.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-9TA3G.tmp\setup.tmp" /SL5="$60194,7573378,114176,C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2124
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://www.lonelyscreen.com/installed.php?version=1.2.16
            5⤵
            • Loads dropped DLL
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:2
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:756
      • C:\Windows\SysWOW64\msiexec.exe
        "msiexec.exe" /qn /i C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\bonjour.msi
        3⤵
        • Event Triggered Execution: Installer Packages
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe
        "C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1544
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 91D0229FB6C0DE6EB7D0517EC481DCF8
      2⤵
      • Loads dropped DLL
      PID:2544
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding A5A45CDBB2032E24A7DDE98EF4E0E2F3
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:352
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding ABD9B2E985890074A0DF0E5E15D4DB59 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1592
    • C:\Windows\system32\MsiExec.exe
      "C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"
      2⤵
      • Loads dropped DLL
      PID:1952
    • C:\Windows\syswow64\MsiExec.exe
      "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2276
  • C:\Program Files\Bonjour\mDNSResponder.exe
    "C:\Program Files\Bonjour\mDNSResponder.exe"
    1⤵
    • Modifies firewall policy service
    • Executes dropped EXE
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f778338.rbs

    Filesize

    118KB

    MD5

    818f0eab56ac6fe004efeac587395d5a

    SHA1

    2974594b09bd254bdc6c0d347848001f97d7660e

    SHA256

    5d578e74772cb98f31102951048d56c0a1a41d399015c4dc4cfab092f0fcf60a

    SHA512

    55eb3bcb32da8b49bea11f4d5230acfa2dc36e75f5df101740a86ecc658934c5743fd6a6903ed09242710e885dd27aa85ff1bf4c466c5796c918f6df50ffc361

  • C:\Program Files (x86)\LonelyScreen\unins000.dat

    Filesize

    6KB

    MD5

    11495630a1d61bc810319b8953120d9f

    SHA1

    914207f3effa9deec285f92d0853497d02250e11

    SHA256

    45ee0a06bf30266b59c2e9e3b28076f986bb611799e7440d7b55714a2e3555ea

    SHA512

    7099cd8b342d11c3917a5f2e2c456d22286427971ac4e43861230135edff522ece263768f71fb9e83b3a663d65a50ece873f1f246f001590c0b90cdc4951a2ce

  • C:\Program Files\Bonjour\mDNSResponder.exe

    Filesize

    451KB

    MD5

    ebbcd5dfbb1de70e8f4af8fa59e401fd

    SHA1

    5ca966b9a5ff4ecd0e139e21b3e30f3ea48e1a88

    SHA256

    17bffc5df609ce3b2f0cab4bd6c118608c66a3ad86116a47e90b2bb7d8954122

    SHA512

    2fbfcff6bc25461e7c98aabdae0efb33f2df64140aaf4b2b0c253e34294e1606077ae47b000ebababb3600bd4d9154a945036c58e4e930da445a0dda765ac8a4

  • C:\Program Files\Bonjour\mdnsNSP.dll

    Filesize

    129KB

    MD5

    f9d908de6b166dac9b89bf62fa291ce8

    SHA1

    938b53238291fc41ae852fdde51eed7a2bff0604

    SHA256

    d0a918ad60221623bb0278ea94cd6938744617fdbb2054968afafc2940648f02

    SHA512

    6643a7066974abfd5904df73ed225fd5eed4a84341b12199b6eb9a8a2ad234dba865d50f8ccff8a88002ce4c6ae2131745cf43aac88a3a0a66b596fb0d93e56e

  • C:\Program Files\Java\jre7\lib\ext\dns_sd.jar

    Filesize

    16KB

    MD5

    ca086bb31b598febd7e8d44daf14714a

    SHA1

    4838808e80df811cfb2bf7faf361b3cbc16f9f81

    SHA256

    3818abdee5b1d3d77ae4a5ace25a638b2d7d624605f8e8ce14dd6d4c6639c00c

    SHA512

    54188bf433a0da1b6b8f6f881af6d681a6bb629693191c7ee46f852953529cb94dfa894aca574e1cd7355985ea8d6187e7694c8144ea1db880922676f0dfe0c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    734B

    MD5

    e192462f281446b5d1500d474fbacc4b

    SHA1

    5ed0044ac937193b78f9878ad7bac5c9ff7534ff

    SHA256

    f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60

    SHA512

    cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1E73DB4BC7EC7D53DAA55B0E346CCF24

    Filesize

    504B

    MD5

    6d7156f568dac461c6b6bb85c568132d

    SHA1

    748c85211bb93f33ee9fdfa91e768b3c753c3965

    SHA256

    8d5f5b5b6dafa8e98bf1494d23cfc649dcfe19a7f498c7650a4d6ee4c23e81ef

    SHA512

    2c9412c11dc2b52bfc640b462e1f6b1e2604ca647021504ff07b64ed72d2df69ac3d2711acba53f502443a2ab3052840a62707809d7bcf722e1646d6c434912d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    577de9f66f083dc619674a729cb23a8c

    SHA1

    917ac68d80d5854385f9b27472080b6fc2f1f469

    SHA256

    72c7df30f71199d36882f147dc424410217a5a24abe5e7d61d47cad001377cb7

    SHA512

    fc3ac0757dee16091121c709236fa4a60567914e6be1af0c3ce7536334fe72b8771b06b57ceddb1b9a821d2c5b3b3a7fd6fd607bc52067e4acfeaa141f6e320a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E73DB4BC7EC7D53DAA55B0E346CCF24

    Filesize

    546B

    MD5

    897ec7d6e03f8468f9ae145dee37f262

    SHA1

    d957dd8dd6a3ade34de205b4c33c7a410b3001ed

    SHA256

    8c3961bf91249b6a90571f998a195c2f41e494fb8466d06b08f7014f3e4ff3f4

    SHA512

    20018f04f839f296a40cc3a73a0ad5e32f2c160610dddc9c23c7d8e1bb31ae49620891bf2bf9e15c34600623c66899a9bc623a242044ddd368f8451caec46b6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    f0899abdeb8a467fec954c8b2db27ffa

    SHA1

    72a38d5cda5bff307cf75b2c2bde9d56d44743d4

    SHA256

    cc8e3eb90b03d5d4f37c01e9e5fbadd9c3331c7b4f58b7987ac9eefe3299bd8b

    SHA512

    b98d4f15811e790aad5381fc4f3c2737add7255418aa1f3b6c5424a1e588dc22a871605759d3bc5e1f81c87655cf5d9998eafbffb32db3cf96228bdc09634215

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8318be9050e9e710af833f50eb98dc13

    SHA1

    18eb8283d90bf37312025eec3ecb88bf79fec498

    SHA256

    7fd1599946a03dd7711ab127fbbefee24ce329334b8284c30524876d6090c501

    SHA512

    f11344cf594a735629d3d698a1fb308bd487b205efb7168e38747324102f09780cecd573786f6298787df0aa1e55eb195b291159d7596f2749e015097ad66267

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c75b9479728ec11f64a923d38e9957e4

    SHA1

    a679064fc7eaf3ce724637c2976c58f6a6d86d68

    SHA256

    5955d61c130879a3e99933bf6f28ef9f4fd15c4e071e201d044570ecfbfdaa39

    SHA512

    1216c186b6d08e39bf1ad07412ecb5f1132417bfbfcd4a9380420c66d68b571131dc31fc3741d504d469b6452f04e8fddf3f54510eb0b78860138609654d8ec8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    594552ce7fc2c39447c3ec4425c2eda5

    SHA1

    74aab3f6f1c9b41eeae16401b65129f9f74d312e

    SHA256

    4c15af69a2138745c2f25eb59c945c1831ecd3a7e2883bb1a62f987d72afb04b

    SHA512

    acb68ba6477b24c54717b93905ccd0817ea2d9b6d0e71f13319988890edc28700040a61dc861348c28ad9793cd1a017b8e81e2658334e2d88d7c4c82b7650465

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b27df01d1770d6d1f210804bcd298ea9

    SHA1

    da8aea3ac011bcdb589a7fe0d005714cf07ff3d6

    SHA256

    c7eaa47e97d3dd16d01a5b5d2169faef5a7eb2b13d942caf97890ef5078ad3e5

    SHA512

    408e95b6c71db3d56c9ebb826056bbd5f5256bca8576bec20e824e4792d487d5f11d2665d92d64793db6380982fc35b6eec282caf87314ed286a0a974cdaeab4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    768cd75d68b8eb3094e4003948fd85ed

    SHA1

    0ef634831022ec8661737f5d38f5453bf8cddd8b

    SHA256

    de774f78891399cbff1dca08faa02488635f263dd03e3e39fa0365f55de4f7e6

    SHA512

    aa53dd1aed2f18c7c89d8db0350bfd360abda29f4dba6be126da44a93d2abf5e534970604297efe7f1ff54e857898b0a96480df0b251fc969da594b0369bdd93

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    25a71d5a2b41212b4d6783f89a70e6a5

    SHA1

    9f61a9a15689b897dfdb39a42c06750e31df0a8d

    SHA256

    2de12029b8349fe13212d47c39c823e674c05d7d3b9bba089e8b12389a089326

    SHA512

    fd77fe2703365b809fd602b2a9d80ed124ca83e65f18f534ccf4a21125ea04904bfaf04056052593ec828c6df3cb9aee792d4fcec520bbae407c6b69cdab1dab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc64445ae8ee22c1907bc6cb3fdfb33d

    SHA1

    1c68e5e413f4aab084c5bd67368ea24f62da30f5

    SHA256

    0b41d98f2f70c8d4352acf5ccac43da597da9a7be52d27f3e537e6c1ca7a0d76

    SHA512

    86bafa7abfc12cc154ec136aaecd062c5ba5fe277439fffba9ba0b1c359fd89ef130cd335201a3636fec4252ea454199a043cc817e9eaa36209e04d1c4a2b4a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8360439c1338f885d386610da6e764c3

    SHA1

    a9d3091591ea07dbf160cfe192aee74791f1888f

    SHA256

    039fcc38317efd3b4d7b42b7e42d3d6972ec5d06d71f22bc17cf7997381d0bb9

    SHA512

    47df4edc9a491f24eed0d04df31406a83018b1ac69d4e6d8a8f7951238fac4bc06cfaabb593f135531e1d22339493b34fdc0dc285667ee4fc4f40670166d2bc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be607cd38131e5bbbdf108a862b5ca34

    SHA1

    b5c39f344a9a4506f23d821939db7bce892e1aed

    SHA256

    b9a77d9c8ffb319668202b30de026b663adcda2242934767320f6a39c3eebec0

    SHA512

    6d134fbf30ecbfff52282cb98dd94e82c2f75d1c51ac45c850dc357c4aeb8c7dfdcb0929048578a5bdad6b7690b39428fb0519dd2d1eaba18c1075f3105150a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e76c74962d78ebade3d62f981874f875

    SHA1

    8a2bdc24b8402e2f4cd5adb322b580507e9b37d5

    SHA256

    5f11161570a9c46610cf069b051ab1f70f2850f0cfa13d4899af2eff98e2ea81

    SHA512

    e5dd846b2cdae3acd11b3fd171cdcef469d1ffe832381309389400433f62d7b92c33536a692afe2e9d23f678cbe47aa1b9e173a9d363b9cf23378820f948ec6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e630d037805093da9b76c864f97f4dd3

    SHA1

    c0198dc111df07e284cf3ea29892bcf464fb49d4

    SHA256

    d781d248a69b3927211187f9602a244e8eb86faed40e4d5d121145571a9c0cde

    SHA512

    0af44f67a1f6aba25a6f779dcb55321bab1e2de32ea116fa61ac44ff32201ce99fb66b10f3db918fbb0f80e66807ecc870dddc615017d1917887ee3d4afb9e00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1038e0bf877bd4e9cde11cc312430a0b

    SHA1

    28b432cd2a42e4eae8b5eb73847ad81b25155438

    SHA256

    3b3e84ebcc7a3e4b7273b074e15eceb06757fa0d772805222c9ed66be4588021

    SHA512

    3c087207cf7e73df900c9b0888bbd351a6b583965be2421963a17fd9ae4563b1be7a7f939f89a4283f7b0af6f0c879bdf8745b1efa229e63e452e20d071b50a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af37028ee47d6de35ad2330c03d342b5

    SHA1

    455b5e9c4d80cc30512190564a2dd689c5982ab6

    SHA256

    230af9a6ea4c48b302c47fb1b3f78133158497317613ab4371a36dbfc80757f3

    SHA512

    8f9a30355f5ef17a06bb1a042fb5550813b8efa527f0fcc89ccd0c6b40885b526244445257020f7347e6a292c1e65e1ad3aa8eb440461bec945c8221efc62646

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    235ced9db5d8ddac73bbeba3e5ea1b3b

    SHA1

    fa8e76579137fc04fb96f7d5e4a44894ef09467e

    SHA256

    b907bf9859743155fcd9040813d0813b3c594054bcbc04cc24f5cfe3fa0ea7a9

    SHA512

    ee3a7c684e3a73a91484cc5b9e2c5db9fd3ae5680918c0ea7319ee3bd02e962b0521e8f6cbefb44edd13beb269c1720d362a083950d1da60f0219b9137c40a56

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2452af95b7f89ed6c4c54d2b1c04e3cb

    SHA1

    7a7be2938d59e32783cb453c8ab4444f5377ff01

    SHA256

    81460422e4bbfb9dd637bb7ddc51d519411f36fa9df27ecbaf70d66a539594e4

    SHA512

    467037de95a73f1022c2149977082f8607b9d2b0125c4916251efb410947da23e2cfd992a5b68a2ad0331bd20775ce2237faf3d660ad7486c8539ec9be929b1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e65d78f3794b6965865e4e3dc7fb83d6

    SHA1

    8267e45cfb692d333b97d2f789c2dadeaae5c287

    SHA256

    76f06a5a18234fbc4bc1b42685d1aabf92babc2df8d4abee6dd55678f6209ea5

    SHA512

    e6eb01956ab4d8423bb46eef4347fcdbf6c7451dbb7f6c832c19d71c9aa29dbcf6b536370b2fd772db906accc40750214f953c4af49dfa5a5418ee1c83822cfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb76d34395184865edce010fe7717540

    SHA1

    6972a5ab3e4ff392cead7495297197645198056f

    SHA256

    3660969587c99870b3430b51894e0119cb3a59156581b90dd2679a663c2d687a

    SHA512

    0c3820b625d67039a14ecbf1324fae8b58e1951c53514950be5a903b34eb1c5440a147c1b54297406706674a47bd5249a2d80107557b30d100b515fed636321c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c070e3ed182a444475dd265828c30ff

    SHA1

    1b9d6f12d8d0d3b428d1a7b1f3c38030dde2fcd7

    SHA256

    a66551901f022ff35623fb7fe8e768f9166de47cf4e43b9c048379659adf79fe

    SHA512

    6161bd38a05955704848c9ff1fa817ca3a11de72dad1091231cdc3ef91a44bac1c63de8d30c91ace45e3449b9400676158ba86f1280184e1661b533a54529174

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c6bf033f1d14dcf80fd21a874ad582b3

    SHA1

    90ce07f9ac26d5431113fbf31152ede460862fb5

    SHA256

    dc94ae882646e048347ebfb59fc366e42b77e0d6eb65a371046eaa477e483756

    SHA512

    e11866e0d082f94cd60c5334f5bfef22e505f6826939d98d190daebc3aa0b24c04904897cf87790afb94bf643119ce0e204d3b39017e58989db76b55b23115a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    071490f0ee858dd6d6f592438525e1b3

    SHA1

    4eeb500b3e184f19b59678f6033d7a07d04d6ac0

    SHA256

    64cd637f7e618b88abc429947f84d08cd6145bbbd2b308d1842966956920aae6

    SHA512

    3f9fd3cf1bce0ea15f6745caacfc3d1ac8aec342bbc168cdf028d10ecfcd968cb03d061dbec8f7149f3820b02bb7b6fbbf40f06c4d1da920928b517254f852a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebe66fc48607fca879916f92dee13d64

    SHA1

    89917b955ac386cdd35da06e2df69479c27f8d30

    SHA256

    caa52ec0f52d3994bd5ddddc2fa84c15647c302b0ae6206f0e7f7e1e281e2115

    SHA512

    94c069cd6a6665bc9d2f5ca3ee52a519c868ed1bf7208899a5a14010ad4e8f634686c76cf098ea67434cde1dc80f9fab6424fa6e270fe4702a90dcd8741f412e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ec9d3ef226447264bbf487d5d0d3778

    SHA1

    04d86b7ae9e4c1b97705ff7a214d61f90d3597fd

    SHA256

    5289d1d29739ff52f0866d9b67f2f14e4ec32c84bacf3974494fa9fbcef8c17d

    SHA512

    b3f39c6221e8e09e9f57c37fb7a533524b9dcc7da8b89f69d37eb9b1fc9ebbf3511c56496b6623588de69431cc079109a0f32add1c321a984388417fa36263cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49b3f5cbba64b409f16346bc427ade23

    SHA1

    bc3c3595423790dad067dea6a9d271f4c9e51d4d

    SHA256

    a127f05e73a2df66f2091da1b3e2863babfd6510b4abe5a90f6bbefd3aa8c8be

    SHA512

    ee5a36b716b83f7398a355507beb7f9b90f01acb30644fb1e05bc2d8e069ec1dec1f3c820037ce3ce844316f3382c08a055d4df79febc71626b24fc0f38ea9ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ba0eb9128a84992918790839bbab160a

    SHA1

    c7a5d00cce3582d484ea5d21ba0a0f6329444ffa

    SHA256

    4eebc4d30b8b242e0fdf27c73a49502dca232cc91b661e69335ee05aa3cb66e6

    SHA512

    11962df85cc7befac0bf8dd1e0e23de96abd3c8eab9baf9ddf26e0949fcd3d5c213e1e8cff5de836ba9e9b0daac4d6f28388c194fc9bbd78d86ae7fc13aee9b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    6a78857c7765ebcacc06d53ef8dc9616

    SHA1

    68322c91ed18d1b81cecb30d81281410c7ffd3c0

    SHA256

    99d31f25407954352d69052bec51c989ffd52a76fd74ff68c52d5879eef7117e

    SHA512

    c10d816783c045affd2444e1790c8cd64a926a6cb2583620f7ec4a426d6f4b4b3730b0fe8b43a419668193a870a6bf836218ed1a34c7ad312660abd2398ea2f2

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bl977i7\imagestore.dat

    Filesize

    99KB

    MD5

    20e34a1d059edb46d4913ff0aba74916

    SHA1

    ca894f5cda4e4bc11376f5a4bd0c20fffb7d2cea

    SHA256

    d4e4af3eb5418dc842ef8d0621f759872e266987ffa609990d8e49f68c799fd2

    SHA512

    b929dc891adf85317cbd96f1c6f6efd26bb9b7c5aec295c594d0bcedffb3bc10e9834240bb2f4b15942642fcebc94262cb1b3fbf201cd95389c04563ac5b7313

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\favicon[1].ico

    Filesize

    98KB

    MD5

    86a9f54e1e7e6911fc80f844c8a9ebf9

    SHA1

    383ee96826805cadd19909a0c9ee28f5414d129e

    SHA256

    cd51992107746615390ac94e62cf1ff312ae50793b5ca505a1fac0ee4130f861

    SHA512

    f6f41760895f5d7785ca7f40b26f467c838fc305d1a766575b3bf24466360b9612f8aa8cf3d88d23270973c0337ed20f48c13ea14b3601311ebb74733e80c8f6

  • C:\Users\Admin\AppData\Local\Temp\Cab8372.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar84AD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\bonjour.msi

    Filesize

    2.6MB

    MD5

    8dcf5c9eaacdaf4568220d103f393dea

    SHA1

    27f68596398b68ba048f95752b4eeb4aa013c23f

    SHA256

    53be81cc6e2dc95a1041e8f3d8f500fad4259ab20a1aac151b5fc7a64d354a93

    SHA512

    10f8ffb6fa5e7163f0a83190ddf211479f12e16635389b49ac041eceafd7f04c040d830065adc89b1003f38d8381851c09150a5bc8edced6ecae8ee5ae801088

  • C:\Windows\Installer\MSI8715.tmp

    Filesize

    75KB

    MD5

    08c031fa82a09aae1079378669678fe6

    SHA1

    b109251d2fef08bd446be0c92369e6f11eb67093

    SHA256

    8764d060558a9d4ef24adb43201d5178033171a649ad497f79ce3b6cc8eda98a

    SHA512

    d133a7c02ee8e6e4a971ed4a6537c11cb58516a5ac0501672169805f7b97591d7cffd3a72133bd1df4b8d8a4f4965ddf324a83cd9be0d8af15e646a121e2ea4c

  • C:\Windows\Installer\MSI888F.tmp

    Filesize

    75KB

    MD5

    6f8e3e4f72620bddc633f0175f47161e

    SHA1

    53ed75a208cc84f1a065e9e4ece356371cac0341

    SHA256

    2adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e

    SHA512

    80187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869

  • \Program Files (x86)\Bonjour\mdnsNSP.dll

    Filesize

    118KB

    MD5

    40947436a70e0034e41123df5a0a7702

    SHA1

    6c27e1dd1c1533feb6435190a5074300ac2a9822

    SHA256

    5d40fd92da5ca59c1badb58ad509db6a6d613f18660a9a270a53eca85d34c3a9

    SHA512

    ba5634cc82f306245f9f0350bfa0b91e2f5ffc6c355b1452a95483f47e6acdb42c4e063f6c15115faf0f0630005df4fe8ef0e01539c270031cbd07a34a929704

  • \Program Files (x86)\LonelyScreen\LonelyScreen.exe

    Filesize

    22.3MB

    MD5

    a3ff7e328f41f4a6af82266bfe12036f

    SHA1

    79f0e44415ffe74b320dfb27c8988d326dc80b2e

    SHA256

    9f2a9f89adda3003c587e4a9bdf5decf3260beefb135180e44845aee7730f731

    SHA512

    472625b9ab26e83845a72423722e4b1286dce950597a52e95dff385bb33c1a1e4870755f273c8a02dea0793d04bdad7779cc05c786dff7ed624f5feb46d0a803

  • \Program Files (x86)\LonelyScreen\unins000.exe

    Filesize

    1.1MB

    MD5

    ff44a037ca0ef8d88c768cb284098170

    SHA1

    39be03cb8e657a10b0e88c9a4608a4fb536a1187

    SHA256

    e94b86d8116aa6dbe60e8dc3891be64e2dcb4e4b4fd511eacac4c28af541d8dd

    SHA512

    28de42438577f40b22b306cd5a8f99c97ece757abbb114810e9134a6593611fbe1a9c3f6b50a207f01fecd218916e560705487708178121f77a28f3e71841359

  • \Program Files (x86)\LonelyScreen\unins001.exe

    Filesize

    1.1MB

    MD5

    cc8b164c85cc68a2e6e0d10e452ef68b

    SHA1

    fed79b50a5f03c0e33071ff849ea19dfdaf3c464

    SHA256

    20590034969e110c4fba1d065da8ac53dad79f5b8a9bd68780164207a170c749

    SHA512

    bee540ceb2b1de587872cdb963d2c754ac4ba0f3cac8026c3d7c2882aae0bfeb31babae927361b2ef5484ab2085b4a19914cc99a504aafd3f08c34f9f626699d

  • \Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\isxdl.dll

    Filesize

    131KB

    MD5

    16881920cbe9ddb46c3ef29ee405a857

    SHA1

    0f76cffc2e57cf5c481a8015d203b96638d36ef5

    SHA256

    59abe5f46020cb56e1079df8dc1145b2033e4b1459ae3d92f637064a6b618bc1

    SHA512

    f07d1f4133a2ba2bda92fa6f55360fae73e44b97756ee3044f31af5f9e01cda34e7efbb1520c0b5aa2a496edc03ed4fefdc4ad419c1028b1ce6457b69aabeba0

  • \Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe

    Filesize

    7.6MB

    MD5

    7a2f16b1053362d8e8edae5e320dd4d9

    SHA1

    8cda4387a93287f38d2b48fb109bd54a77bcdcf9

    SHA256

    d2c7d87fad0c0fa94a4e2acdca4524cda696f2fd0c53ea9ddbe927da839707fa

    SHA512

    2277ee7ac98560093a652019bf3a2fb18f02718580ef6711532498aaa17b87705266ed83093ffd4cfc73ec608a76359336a1780586679838633ac403bf683bcd

  • \Users\Admin\AppData\Local\Temp\is-E9EHB.tmp\lonelyscreen-win-installer.tmp

    Filesize

    1.1MB

    MD5

    f120c361b527a9d090782300aa8f1ce5

    SHA1

    ed82441da0dc7a5695ef96839fc2aea0f0c7e376

    SHA256

    9209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825

    SHA512

    60fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555

  • \Windows\SysWOW64\dnssd.dll

    Filesize

    71KB

    MD5

    062373995eae5f0eac9eaa9192136bfb

    SHA1

    b421e274da7d34aba8bf09ec2d3e7b4a01392b84

    SHA256

    0392d5656bd677c4c5cb74c96e7b85b0867f2535a37950aec7f5c4a1a70d19ae

    SHA512

    89c01c6c0abb7462a0dff6d9d03141f5dc42d08fcb22e44e532d8a87dd9d8c7db2fc272a1a52a147645e54d0116db94878fedc81f5fe4e5bf7d15292d95b2b88

  • memory/1376-460-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/1376-59-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/1376-36-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/1376-19-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/1376-8-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/1376-400-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/2100-45-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2100-81-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2124-80-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/2260-3-0x0000000000401000-0x0000000000410000-memory.dmp

    Filesize

    60KB

  • memory/2260-37-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2260-461-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2260-0-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB