Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/12/2024, 22:23
241214-2ay27axqcp 10Analysis
-
max time kernel
125s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/12/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
lonelyscreen-win-installer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lonelyscreen-win-installer.exe
Resource
win10v2004-20241007-en
General
-
Target
lonelyscreen-win-installer.exe
-
Size
538KB
-
MD5
64da00119c76c6e1d75f059ffc4a772d
-
SHA1
ebaebff7db60430cad107d4efc45654d43f98075
-
SHA256
039004b76a1bc5ac020958256bdcf97f1464398c13b0be2e0d0078f1aee8b3a7
-
SHA512
d13544aa2ee6060510c0f906e3f174a4ec40878f36193a99d6c527b62fa6a379115e965e272069b0e3f0479df16e6899a096ede37fb0832262c72d3d24f824f3
-
SSDEEP
12288:AS3yBV888888888888W88888888888pKfXGU69eTutORzK/AA9i6Zub02O9HtFbl:/3yLKfXG6wZ/D9kqtZaTq
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules mDNSResponder.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 6 IoCs
pid Process 1376 lonelyscreen-win-installer.tmp 2100 setup.exe 2124 setup.tmp 2188 mDNSResponder.exe 280 Process not Found 1544 lonelyscreen.exe -
Loads dropped DLL 25 IoCs
pid Process 2260 lonelyscreen-win-installer.exe 1376 lonelyscreen-win-installer.tmp 1376 lonelyscreen-win-installer.tmp 1376 lonelyscreen-win-installer.tmp 1376 lonelyscreen-win-installer.tmp 2100 setup.exe 2124 setup.tmp 2124 setup.tmp 2124 setup.tmp 2124 setup.tmp 2124 setup.tmp 2544 MsiExec.exe 2544 MsiExec.exe 2544 MsiExec.exe 352 MsiExec.exe 352 MsiExec.exe 1592 MsiExec.exe 1952 MsiExec.exe 2276 MsiExec.exe 756 IEXPLORE.EXE 476 Process not Found 1376 lonelyscreen-win-installer.tmp 1544 lonelyscreen.exe 1376 lonelyscreen-win-installer.tmp 2040 iexplore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\LonelyScreen = "C:\\Program Files (x86)\\LonelyScreen\\lonelyscreen.exe /start_context sys_auto" setup.tmp -
Blocklisted process makes network request 4 IoCs
flow pid Process 14 1096 msiexec.exe 18 1096 msiexec.exe 21 1096 msiexec.exe 23 1096 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\dns-sd.exe msiexec.exe File created C:\Windows\system32\dns-sd.exe msiexec.exe File created C:\Windows\SysWOW64\dnssd.dll msiexec.exe File created C:\Windows\system32\dnssd.dll msiexec.exe File created C:\Windows\SysWOW64\dnssdX.dll msiexec.exe File created C:\Windows\system32\dnssdX.dll msiexec.exe File created C:\Windows\SysWOW64\jdns_sd.dll msiexec.exe File created C:\Windows\system32\jdns_sd.dll msiexec.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\fr.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files\Bonjour\About Bonjour.lnk msiexec.exe File created C:\Program Files (x86)\Bonjour\About Bonjour.lnk msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\en.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\pt_PT.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\mdnsNSP.dll msiexec.exe File created C:\Program Files (x86)\LonelyScreen\is-FAHJJ.tmp setup.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\nb.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\pt.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files\Java\jre7\lib\ext\dns_sd.jar msiexec.exe File created C:\Program Files (x86)\LonelyScreen\unins001.dat lonelyscreen-win-installer.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\zh_CN.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files\Bonjour\dns_sd.jar msiexec.exe File opened for modification C:\Program Files (x86)\LonelyScreen\unins000.dat setup.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\de.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\es.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\fi.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\ko.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\nl.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\LonelyScreen\is-U0CF5.tmp lonelyscreen-win-installer.tmp File opened for modification C:\Program Files\Java\jre7\lib\ext\dns_sd.jar msiexec.exe File opened for modification C:\Program Files (x86)\LonelyScreen\unins001.dat lonelyscreen-win-installer.tmp File created C:\Program Files (x86)\LonelyScreen\unins000.dat setup.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\en_GB.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\it.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\ja.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\ru.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\zh_TW.lproj\About Bonjour.rtf msiexec.exe File opened for modification C:\Program Files (x86)\LonelyScreen\LonelyScreen.exe setup.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\pl.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\sv.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\mDNSResponder.exe msiexec.exe File created C:\Program Files\Bonjour\mDNSResponder.exe msiexec.exe File created C:\Program Files (x86)\LonelyScreen\is-C4QI4.tmp setup.tmp File created C:\Program Files (x86)\Bonjour\Bonjour.Resources\da.lproj\About Bonjour.rtf msiexec.exe File created C:\Program Files (x86)\Bonjour\dns_sd.jar msiexec.exe File created C:\Program Files\Bonjour\mdnsNSP.dll msiexec.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI890D.tmp msiexec.exe File created C:\Windows\Installer\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}\Bonjour.ico msiexec.exe File opened for modification C:\Windows\Installer\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}\Bonjour.ico msiexec.exe File created C:\Windows\Installer\f77833a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8715.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI8811.tmp msiexec.exe File opened for modification C:\Windows\Installer\f778334.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8735.tmp msiexec.exe File created C:\Windows\Installer\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}\RichText.ico msiexec.exe File opened for modification C:\Windows\Installer\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}\RichText.ico msiexec.exe File opened for modification C:\Windows\Installer\f778337.ipi msiexec.exe File created C:\Windows\Installer\f778334.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI888F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8A56.tmp msiexec.exe File created C:\Windows\Installer\f778337.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI87F1.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 1496 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lonelyscreen-win-installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lonelyscreen-win-installer.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lonelyscreen.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20734bf2764edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DOMStorage\lonelyscreen.com IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093a4c9b1f9158d4a931e5f009806a25a00000000020000000000106600000001000020000000c9610c513b773567993dd12b84082d1635924a9be924b19d24656d33d840fec4000000000e8000000002000020000000017064011d8267861a0d44b0dfe59201e48572f3ba35f776245f5e88a519dbb490000000d32105caedfd36ae03b4281546ed063a69c4dafbfdb3c64e667f81f06181a2b5e6db7fa7cf73afd8b61dac95096af183dd32078a3530be45841dbca1341734c7da7e04e11e5d0ea492e8b2a75c9f8fbac860857c8b2f48f31996629e02c96a6257c1903bb537e585575fac2fd4d92b4c809fab46647991d77fa2fb4d27784488ca975ec89485cccc0b9a21e2fd84da1e400000009500914213275a1f7459a76ea2cd822ca22d7ad80a4e0d9db38500e53d3941b875d672bd447ed6f916834bd476d234b5abd274a154e8aad21782ef739297984a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440376904" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000093a4c9b1f9158d4a931e5f009806a25a00000000020000000000106600000001000020000000d59ce7515ff1485486faae2a69c81783679b3c01a2bcb21f17260894ddc8296d000000000e80000000020000200000006bffaaa7e5b4f8db33b0aba7aa283a38c31a693e0736d1f72b16219b5313efbf200000003f6f27507bd188650d633e08fc2ce114b41858a3708a7d20fee92e26437392b6400000000deab112f91aa99b21523a831dc2b473f69cda73794651497dc63885ee0824017bb1945ba112f80864d9e1a810d36d613b3bb0759e9d1bbdef8137753186bd6f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DOMStorage\lonelyscreen.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B8B3B81-BA6A-11EF-98BD-527E38F5B48B} = "0" iexplore.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CE603A0-3365-4DA0-86D1-3F780ECBA110}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ProxyStubClsid32\ = "{7FD72324-63E1-45AD-B337-4D525BD98DAD}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\ProgID\ = "Bonjour.DNSSDService.1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\InprocServer32\ = "C:\\Windows\\system32\\dnssdX.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\ = "DNSSDEventManager Class" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2B0163E6D0340BE4183EB2758E9BEDD8\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1523EA646D34FC14C8FD9E203C58611D\2B0163E6D0340BE4183EB2758E9BEDD8 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\VersionIndependentProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDRecord\CurVer\ = "Bonjour.DNSSDRecord.1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.TXTRecord\ = "TXTRecord Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2B0163E6D0340BE4183EB2758E9BEDD8\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\ProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\Programmable msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{9CE603A0-3365-4DA0-86D1-3F780ECBA110}\ = "IDNSSDRecord" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDService.1\CLSID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\InprocServer32\ThreadingModel = "Both" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDRecord.1\CLSID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDEventManager msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDEventManager.1\CLSID\ = "{BEEB932A-8D4A-4619-AEFE-A836F988B221}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDService\ = "DNSSDService Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDService.1 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ = "IDNSSDService" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2B0163E6D0340BE4183EB2758E9BEDD8\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\VersionIndependentProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDEventManager\CurVer msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{18FBED6D-F2B7-4EC8-A4A4-46282E635308}\1.0\0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ = "_IDNSSDEvents" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CE603A0-3365-4DA0-86D1-3F780ECBA110}\NumMethods\ = "9" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2B0163E6D0340BE4183EB2758E9BEDD8 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\InprocServer32\ = "C:\\Windows\\SysWOW64\\dnssdX.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\Programmable msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\VersionIndependentProgID\ = "Bonjour.DNSSDRecord" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9CE603A0-3365-4DA0-86D1-3F780ECBA110}\ = "IDNSSDRecord" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\2B0163E6D0340BE4183EB2758E9BEDD8 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\Programmable msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2B0163E6D0340BE4183EB2758E9BEDD8\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\is-AJ8K3.tmp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.TXTRecord\CurVer\ = "Bonjour.TXTRecord.1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{18FBED6D-F2B7-4EC8-A4A4-46282E635308}\1.0\ = "Apple Bonjour Library 1.0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\VersionIndependentProgID msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\VersionIndependentProgID msiexec.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 lonelyscreen-win-installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 lonelyscreen-win-installer.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2124 setup.tmp 2124 setup.tmp 1376 lonelyscreen-win-installer.tmp 1376 lonelyscreen-win-installer.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1496 msiexec.exe Token: SeIncreaseQuotaPrivilege 1496 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeSecurityPrivilege 1096 msiexec.exe Token: SeCreateTokenPrivilege 1496 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1496 msiexec.exe Token: SeLockMemoryPrivilege 1496 msiexec.exe Token: SeIncreaseQuotaPrivilege 1496 msiexec.exe Token: SeMachineAccountPrivilege 1496 msiexec.exe Token: SeTcbPrivilege 1496 msiexec.exe Token: SeSecurityPrivilege 1496 msiexec.exe Token: SeTakeOwnershipPrivilege 1496 msiexec.exe Token: SeLoadDriverPrivilege 1496 msiexec.exe Token: SeSystemProfilePrivilege 1496 msiexec.exe Token: SeSystemtimePrivilege 1496 msiexec.exe Token: SeProfSingleProcessPrivilege 1496 msiexec.exe Token: SeIncBasePriorityPrivilege 1496 msiexec.exe Token: SeCreatePagefilePrivilege 1496 msiexec.exe Token: SeCreatePermanentPrivilege 1496 msiexec.exe Token: SeBackupPrivilege 1496 msiexec.exe Token: SeRestorePrivilege 1496 msiexec.exe Token: SeShutdownPrivilege 1496 msiexec.exe Token: SeDebugPrivilege 1496 msiexec.exe Token: SeAuditPrivilege 1496 msiexec.exe Token: SeSystemEnvironmentPrivilege 1496 msiexec.exe Token: SeChangeNotifyPrivilege 1496 msiexec.exe Token: SeRemoteShutdownPrivilege 1496 msiexec.exe Token: SeUndockPrivilege 1496 msiexec.exe Token: SeSyncAgentPrivilege 1496 msiexec.exe Token: SeEnableDelegationPrivilege 1496 msiexec.exe Token: SeManageVolumePrivilege 1496 msiexec.exe Token: SeImpersonatePrivilege 1496 msiexec.exe Token: SeCreateGlobalPrivilege 1496 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe Token: SeRestorePrivilege 1096 msiexec.exe Token: SeTakeOwnershipPrivilege 1096 msiexec.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2124 setup.tmp 2040 iexplore.exe 1376 lonelyscreen-win-installer.tmp 1544 lonelyscreen.exe 1544 lonelyscreen.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1544 lonelyscreen.exe 1544 lonelyscreen.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 756 IEXPLORE.EXE 756 IEXPLORE.EXE 1544 lonelyscreen.exe 1544 lonelyscreen.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 2260 wrote to memory of 1376 2260 lonelyscreen-win-installer.exe 30 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 1376 wrote to memory of 2100 1376 lonelyscreen-win-installer.tmp 32 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2100 wrote to memory of 2124 2100 setup.exe 33 PID 2124 wrote to memory of 2040 2124 setup.tmp 35 PID 2124 wrote to memory of 2040 2124 setup.tmp 35 PID 2124 wrote to memory of 2040 2124 setup.tmp 35 PID 2124 wrote to memory of 2040 2124 setup.tmp 35 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 1376 wrote to memory of 1496 1376 lonelyscreen-win-installer.tmp 36 PID 2040 wrote to memory of 756 2040 iexplore.exe 37 PID 2040 wrote to memory of 756 2040 iexplore.exe 37 PID 2040 wrote to memory of 756 2040 iexplore.exe 37 PID 2040 wrote to memory of 756 2040 iexplore.exe 37 PID 1096 wrote to memory of 2544 1096 msiexec.exe 39 PID 1096 wrote to memory of 2544 1096 msiexec.exe 39 PID 1096 wrote to memory of 2544 1096 msiexec.exe 39 PID 1096 wrote to memory of 2544 1096 msiexec.exe 39 PID 1096 wrote to memory of 2544 1096 msiexec.exe 39 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 352 1096 msiexec.exe 40 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1592 1096 msiexec.exe 41 PID 1096 wrote to memory of 1952 1096 msiexec.exe 42 PID 1096 wrote to memory of 1952 1096 msiexec.exe 42 PID 1096 wrote to memory of 1952 1096 msiexec.exe 42 PID 1096 wrote to memory of 1952 1096 msiexec.exe 42 PID 1096 wrote to memory of 1952 1096 msiexec.exe 42 PID 1096 wrote to memory of 2276 1096 msiexec.exe 43 PID 1096 wrote to memory of 2276 1096 msiexec.exe 43 PID 1096 wrote to memory of 2276 1096 msiexec.exe 43 PID 1096 wrote to memory of 2276 1096 msiexec.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\is-E9EHB.tmp\lonelyscreen-win-installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-E9EHB.tmp\lonelyscreen-win-installer.tmp" /SL5="$40150,164153,114176,C:\Users\Admin\AppData\Local\Temp\lonelyscreen-win-installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\is-9TA3G.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-9TA3G.tmp\setup.tmp" /SL5="$60194,7573378,114176,C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\setup.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.lonelyscreen.com/installed.php?version=1.2.165⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:26⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:756
-
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"msiexec.exe" /qn /i C:\Users\Admin\AppData\Local\Temp\is-AJ8K3.tmp\bonjour.msi3⤵
- Event Triggered Execution: Installer Packages
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe"C:\Program Files (x86)\LonelyScreen\lonelyscreen.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 91D0229FB6C0DE6EB7D0517EC481DCF82⤵
- Loads dropped DLL
PID:2544
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A5A45CDBB2032E24A7DDE98EF4E0E2F32⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ABD9B2E985890074A0DF0E5E15D4DB59 M Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\system32\MsiExec.exe"C:\Windows\system32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"2⤵
- Loads dropped DLL
PID:1952
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Program Files\Bonjour\mDNSResponder.exe"C:\Program Files\Bonjour\mDNSResponder.exe"1⤵
- Modifies firewall policy service
- Executes dropped EXE
PID:2188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Installer Packages
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5818f0eab56ac6fe004efeac587395d5a
SHA12974594b09bd254bdc6c0d347848001f97d7660e
SHA2565d578e74772cb98f31102951048d56c0a1a41d399015c4dc4cfab092f0fcf60a
SHA51255eb3bcb32da8b49bea11f4d5230acfa2dc36e75f5df101740a86ecc658934c5743fd6a6903ed09242710e885dd27aa85ff1bf4c466c5796c918f6df50ffc361
-
Filesize
6KB
MD511495630a1d61bc810319b8953120d9f
SHA1914207f3effa9deec285f92d0853497d02250e11
SHA25645ee0a06bf30266b59c2e9e3b28076f986bb611799e7440d7b55714a2e3555ea
SHA5127099cd8b342d11c3917a5f2e2c456d22286427971ac4e43861230135edff522ece263768f71fb9e83b3a663d65a50ece873f1f246f001590c0b90cdc4951a2ce
-
Filesize
451KB
MD5ebbcd5dfbb1de70e8f4af8fa59e401fd
SHA15ca966b9a5ff4ecd0e139e21b3e30f3ea48e1a88
SHA25617bffc5df609ce3b2f0cab4bd6c118608c66a3ad86116a47e90b2bb7d8954122
SHA5122fbfcff6bc25461e7c98aabdae0efb33f2df64140aaf4b2b0c253e34294e1606077ae47b000ebababb3600bd4d9154a945036c58e4e930da445a0dda765ac8a4
-
Filesize
129KB
MD5f9d908de6b166dac9b89bf62fa291ce8
SHA1938b53238291fc41ae852fdde51eed7a2bff0604
SHA256d0a918ad60221623bb0278ea94cd6938744617fdbb2054968afafc2940648f02
SHA5126643a7066974abfd5904df73ed225fd5eed4a84341b12199b6eb9a8a2ad234dba865d50f8ccff8a88002ce4c6ae2131745cf43aac88a3a0a66b596fb0d93e56e
-
Filesize
16KB
MD5ca086bb31b598febd7e8d44daf14714a
SHA14838808e80df811cfb2bf7faf361b3cbc16f9f81
SHA2563818abdee5b1d3d77ae4a5ace25a638b2d7d624605f8e8ce14dd6d4c6639c00c
SHA51254188bf433a0da1b6b8f6f881af6d681a6bb629693191c7ee46f852953529cb94dfa894aca574e1cd7355985ea8d6187e7694c8144ea1db880922676f0dfe0c5
-
Filesize
734B
MD5e192462f281446b5d1500d474fbacc4b
SHA15ed0044ac937193b78f9878ad7bac5c9ff7534ff
SHA256f1ba9f1b63c447682ebf9de956d0da2a027b1b779abef9522d347d3479139a60
SHA512cc69a761a4e8e1d4bf6585aa8e3e5a7dfed610f540a6d43a288ebb35b16e669874ed5d2b06756ee4f30854f6465c84ee423502fc5b67ee9e7758a2dab41b31d3
-
Filesize
504B
MD56d7156f568dac461c6b6bb85c568132d
SHA1748c85211bb93f33ee9fdfa91e768b3c753c3965
SHA2568d5f5b5b6dafa8e98bf1494d23cfc649dcfe19a7f498c7650a4d6ee4c23e81ef
SHA5122c9412c11dc2b52bfc640b462e1f6b1e2604ca647021504ff07b64ed72d2df69ac3d2711acba53f502443a2ab3052840a62707809d7bcf722e1646d6c434912d
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5577de9f66f083dc619674a729cb23a8c
SHA1917ac68d80d5854385f9b27472080b6fc2f1f469
SHA25672c7df30f71199d36882f147dc424410217a5a24abe5e7d61d47cad001377cb7
SHA512fc3ac0757dee16091121c709236fa4a60567914e6be1af0c3ce7536334fe72b8771b06b57ceddb1b9a821d2c5b3b3a7fd6fd607bc52067e4acfeaa141f6e320a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1E73DB4BC7EC7D53DAA55B0E346CCF24
Filesize546B
MD5897ec7d6e03f8468f9ae145dee37f262
SHA1d957dd8dd6a3ade34de205b4c33c7a410b3001ed
SHA2568c3961bf91249b6a90571f998a195c2f41e494fb8466d06b08f7014f3e4ff3f4
SHA51220018f04f839f296a40cc3a73a0ad5e32f2c160610dddc9c23c7d8e1bb31ae49620891bf2bf9e15c34600623c66899a9bc623a242044ddd368f8451caec46b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5f0899abdeb8a467fec954c8b2db27ffa
SHA172a38d5cda5bff307cf75b2c2bde9d56d44743d4
SHA256cc8e3eb90b03d5d4f37c01e9e5fbadd9c3331c7b4f58b7987ac9eefe3299bd8b
SHA512b98d4f15811e790aad5381fc4f3c2737add7255418aa1f3b6c5424a1e588dc22a871605759d3bc5e1f81c87655cf5d9998eafbffb32db3cf96228bdc09634215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58318be9050e9e710af833f50eb98dc13
SHA118eb8283d90bf37312025eec3ecb88bf79fec498
SHA2567fd1599946a03dd7711ab127fbbefee24ce329334b8284c30524876d6090c501
SHA512f11344cf594a735629d3d698a1fb308bd487b205efb7168e38747324102f09780cecd573786f6298787df0aa1e55eb195b291159d7596f2749e015097ad66267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75b9479728ec11f64a923d38e9957e4
SHA1a679064fc7eaf3ce724637c2976c58f6a6d86d68
SHA2565955d61c130879a3e99933bf6f28ef9f4fd15c4e071e201d044570ecfbfdaa39
SHA5121216c186b6d08e39bf1ad07412ecb5f1132417bfbfcd4a9380420c66d68b571131dc31fc3741d504d469b6452f04e8fddf3f54510eb0b78860138609654d8ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5594552ce7fc2c39447c3ec4425c2eda5
SHA174aab3f6f1c9b41eeae16401b65129f9f74d312e
SHA2564c15af69a2138745c2f25eb59c945c1831ecd3a7e2883bb1a62f987d72afb04b
SHA512acb68ba6477b24c54717b93905ccd0817ea2d9b6d0e71f13319988890edc28700040a61dc861348c28ad9793cd1a017b8e81e2658334e2d88d7c4c82b7650465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27df01d1770d6d1f210804bcd298ea9
SHA1da8aea3ac011bcdb589a7fe0d005714cf07ff3d6
SHA256c7eaa47e97d3dd16d01a5b5d2169faef5a7eb2b13d942caf97890ef5078ad3e5
SHA512408e95b6c71db3d56c9ebb826056bbd5f5256bca8576bec20e824e4792d487d5f11d2665d92d64793db6380982fc35b6eec282caf87314ed286a0a974cdaeab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768cd75d68b8eb3094e4003948fd85ed
SHA10ef634831022ec8661737f5d38f5453bf8cddd8b
SHA256de774f78891399cbff1dca08faa02488635f263dd03e3e39fa0365f55de4f7e6
SHA512aa53dd1aed2f18c7c89d8db0350bfd360abda29f4dba6be126da44a93d2abf5e534970604297efe7f1ff54e857898b0a96480df0b251fc969da594b0369bdd93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a71d5a2b41212b4d6783f89a70e6a5
SHA19f61a9a15689b897dfdb39a42c06750e31df0a8d
SHA2562de12029b8349fe13212d47c39c823e674c05d7d3b9bba089e8b12389a089326
SHA512fd77fe2703365b809fd602b2a9d80ed124ca83e65f18f534ccf4a21125ea04904bfaf04056052593ec828c6df3cb9aee792d4fcec520bbae407c6b69cdab1dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc64445ae8ee22c1907bc6cb3fdfb33d
SHA11c68e5e413f4aab084c5bd67368ea24f62da30f5
SHA2560b41d98f2f70c8d4352acf5ccac43da597da9a7be52d27f3e537e6c1ca7a0d76
SHA51286bafa7abfc12cc154ec136aaecd062c5ba5fe277439fffba9ba0b1c359fd89ef130cd335201a3636fec4252ea454199a043cc817e9eaa36209e04d1c4a2b4a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58360439c1338f885d386610da6e764c3
SHA1a9d3091591ea07dbf160cfe192aee74791f1888f
SHA256039fcc38317efd3b4d7b42b7e42d3d6972ec5d06d71f22bc17cf7997381d0bb9
SHA51247df4edc9a491f24eed0d04df31406a83018b1ac69d4e6d8a8f7951238fac4bc06cfaabb593f135531e1d22339493b34fdc0dc285667ee4fc4f40670166d2bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be607cd38131e5bbbdf108a862b5ca34
SHA1b5c39f344a9a4506f23d821939db7bce892e1aed
SHA256b9a77d9c8ffb319668202b30de026b663adcda2242934767320f6a39c3eebec0
SHA5126d134fbf30ecbfff52282cb98dd94e82c2f75d1c51ac45c850dc357c4aeb8c7dfdcb0929048578a5bdad6b7690b39428fb0519dd2d1eaba18c1075f3105150a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e76c74962d78ebade3d62f981874f875
SHA18a2bdc24b8402e2f4cd5adb322b580507e9b37d5
SHA2565f11161570a9c46610cf069b051ab1f70f2850f0cfa13d4899af2eff98e2ea81
SHA512e5dd846b2cdae3acd11b3fd171cdcef469d1ffe832381309389400433f62d7b92c33536a692afe2e9d23f678cbe47aa1b9e173a9d363b9cf23378820f948ec6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e630d037805093da9b76c864f97f4dd3
SHA1c0198dc111df07e284cf3ea29892bcf464fb49d4
SHA256d781d248a69b3927211187f9602a244e8eb86faed40e4d5d121145571a9c0cde
SHA5120af44f67a1f6aba25a6f779dcb55321bab1e2de32ea116fa61ac44ff32201ce99fb66b10f3db918fbb0f80e66807ecc870dddc615017d1917887ee3d4afb9e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51038e0bf877bd4e9cde11cc312430a0b
SHA128b432cd2a42e4eae8b5eb73847ad81b25155438
SHA2563b3e84ebcc7a3e4b7273b074e15eceb06757fa0d772805222c9ed66be4588021
SHA5123c087207cf7e73df900c9b0888bbd351a6b583965be2421963a17fd9ae4563b1be7a7f939f89a4283f7b0af6f0c879bdf8745b1efa229e63e452e20d071b50a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af37028ee47d6de35ad2330c03d342b5
SHA1455b5e9c4d80cc30512190564a2dd689c5982ab6
SHA256230af9a6ea4c48b302c47fb1b3f78133158497317613ab4371a36dbfc80757f3
SHA5128f9a30355f5ef17a06bb1a042fb5550813b8efa527f0fcc89ccd0c6b40885b526244445257020f7347e6a292c1e65e1ad3aa8eb440461bec945c8221efc62646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5235ced9db5d8ddac73bbeba3e5ea1b3b
SHA1fa8e76579137fc04fb96f7d5e4a44894ef09467e
SHA256b907bf9859743155fcd9040813d0813b3c594054bcbc04cc24f5cfe3fa0ea7a9
SHA512ee3a7c684e3a73a91484cc5b9e2c5db9fd3ae5680918c0ea7319ee3bd02e962b0521e8f6cbefb44edd13beb269c1720d362a083950d1da60f0219b9137c40a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52452af95b7f89ed6c4c54d2b1c04e3cb
SHA17a7be2938d59e32783cb453c8ab4444f5377ff01
SHA25681460422e4bbfb9dd637bb7ddc51d519411f36fa9df27ecbaf70d66a539594e4
SHA512467037de95a73f1022c2149977082f8607b9d2b0125c4916251efb410947da23e2cfd992a5b68a2ad0331bd20775ce2237faf3d660ad7486c8539ec9be929b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65d78f3794b6965865e4e3dc7fb83d6
SHA18267e45cfb692d333b97d2f789c2dadeaae5c287
SHA25676f06a5a18234fbc4bc1b42685d1aabf92babc2df8d4abee6dd55678f6209ea5
SHA512e6eb01956ab4d8423bb46eef4347fcdbf6c7451dbb7f6c832c19d71c9aa29dbcf6b536370b2fd772db906accc40750214f953c4af49dfa5a5418ee1c83822cfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb76d34395184865edce010fe7717540
SHA16972a5ab3e4ff392cead7495297197645198056f
SHA2563660969587c99870b3430b51894e0119cb3a59156581b90dd2679a663c2d687a
SHA5120c3820b625d67039a14ecbf1324fae8b58e1951c53514950be5a903b34eb1c5440a147c1b54297406706674a47bd5249a2d80107557b30d100b515fed636321c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c070e3ed182a444475dd265828c30ff
SHA11b9d6f12d8d0d3b428d1a7b1f3c38030dde2fcd7
SHA256a66551901f022ff35623fb7fe8e768f9166de47cf4e43b9c048379659adf79fe
SHA5126161bd38a05955704848c9ff1fa817ca3a11de72dad1091231cdc3ef91a44bac1c63de8d30c91ace45e3449b9400676158ba86f1280184e1661b533a54529174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6bf033f1d14dcf80fd21a874ad582b3
SHA190ce07f9ac26d5431113fbf31152ede460862fb5
SHA256dc94ae882646e048347ebfb59fc366e42b77e0d6eb65a371046eaa477e483756
SHA512e11866e0d082f94cd60c5334f5bfef22e505f6826939d98d190daebc3aa0b24c04904897cf87790afb94bf643119ce0e204d3b39017e58989db76b55b23115a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071490f0ee858dd6d6f592438525e1b3
SHA14eeb500b3e184f19b59678f6033d7a07d04d6ac0
SHA25664cd637f7e618b88abc429947f84d08cd6145bbbd2b308d1842966956920aae6
SHA5123f9fd3cf1bce0ea15f6745caacfc3d1ac8aec342bbc168cdf028d10ecfcd968cb03d061dbec8f7149f3820b02bb7b6fbbf40f06c4d1da920928b517254f852a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe66fc48607fca879916f92dee13d64
SHA189917b955ac386cdd35da06e2df69479c27f8d30
SHA256caa52ec0f52d3994bd5ddddc2fa84c15647c302b0ae6206f0e7f7e1e281e2115
SHA51294c069cd6a6665bc9d2f5ca3ee52a519c868ed1bf7208899a5a14010ad4e8f634686c76cf098ea67434cde1dc80f9fab6424fa6e270fe4702a90dcd8741f412e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec9d3ef226447264bbf487d5d0d3778
SHA104d86b7ae9e4c1b97705ff7a214d61f90d3597fd
SHA2565289d1d29739ff52f0866d9b67f2f14e4ec32c84bacf3974494fa9fbcef8c17d
SHA512b3f39c6221e8e09e9f57c37fb7a533524b9dcc7da8b89f69d37eb9b1fc9ebbf3511c56496b6623588de69431cc079109a0f32add1c321a984388417fa36263cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549b3f5cbba64b409f16346bc427ade23
SHA1bc3c3595423790dad067dea6a9d271f4c9e51d4d
SHA256a127f05e73a2df66f2091da1b3e2863babfd6510b4abe5a90f6bbefd3aa8c8be
SHA512ee5a36b716b83f7398a355507beb7f9b90f01acb30644fb1e05bc2d8e069ec1dec1f3c820037ce3ce844316f3382c08a055d4df79febc71626b24fc0f38ea9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba0eb9128a84992918790839bbab160a
SHA1c7a5d00cce3582d484ea5d21ba0a0f6329444ffa
SHA2564eebc4d30b8b242e0fdf27c73a49502dca232cc91b661e69335ee05aa3cb66e6
SHA51211962df85cc7befac0bf8dd1e0e23de96abd3c8eab9baf9ddf26e0949fcd3d5c213e1e8cff5de836ba9e9b0daac4d6f28388c194fc9bbd78d86ae7fc13aee9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56a78857c7765ebcacc06d53ef8dc9616
SHA168322c91ed18d1b81cecb30d81281410c7ffd3c0
SHA25699d31f25407954352d69052bec51c989ffd52a76fd74ff68c52d5879eef7117e
SHA512c10d816783c045affd2444e1790c8cd64a926a6cb2583620f7ec4a426d6f4b4b3730b0fe8b43a419668193a870a6bf836218ed1a34c7ad312660abd2398ea2f2
-
Filesize
99KB
MD520e34a1d059edb46d4913ff0aba74916
SHA1ca894f5cda4e4bc11376f5a4bd0c20fffb7d2cea
SHA256d4e4af3eb5418dc842ef8d0621f759872e266987ffa609990d8e49f68c799fd2
SHA512b929dc891adf85317cbd96f1c6f6efd26bb9b7c5aec295c594d0bcedffb3bc10e9834240bb2f4b15942642fcebc94262cb1b3fbf201cd95389c04563ac5b7313
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\favicon[1].ico
Filesize98KB
MD586a9f54e1e7e6911fc80f844c8a9ebf9
SHA1383ee96826805cadd19909a0c9ee28f5414d129e
SHA256cd51992107746615390ac94e62cf1ff312ae50793b5ca505a1fac0ee4130f861
SHA512f6f41760895f5d7785ca7f40b26f467c838fc305d1a766575b3bf24466360b9612f8aa8cf3d88d23270973c0337ed20f48c13ea14b3601311ebb74733e80c8f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.6MB
MD58dcf5c9eaacdaf4568220d103f393dea
SHA127f68596398b68ba048f95752b4eeb4aa013c23f
SHA25653be81cc6e2dc95a1041e8f3d8f500fad4259ab20a1aac151b5fc7a64d354a93
SHA51210f8ffb6fa5e7163f0a83190ddf211479f12e16635389b49ac041eceafd7f04c040d830065adc89b1003f38d8381851c09150a5bc8edced6ecae8ee5ae801088
-
Filesize
75KB
MD508c031fa82a09aae1079378669678fe6
SHA1b109251d2fef08bd446be0c92369e6f11eb67093
SHA2568764d060558a9d4ef24adb43201d5178033171a649ad497f79ce3b6cc8eda98a
SHA512d133a7c02ee8e6e4a971ed4a6537c11cb58516a5ac0501672169805f7b97591d7cffd3a72133bd1df4b8d8a4f4965ddf324a83cd9be0d8af15e646a121e2ea4c
-
Filesize
75KB
MD56f8e3e4f72620bddc633f0175f47161e
SHA153ed75a208cc84f1a065e9e4ece356371cac0341
SHA2562adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e
SHA51280187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869
-
Filesize
118KB
MD540947436a70e0034e41123df5a0a7702
SHA16c27e1dd1c1533feb6435190a5074300ac2a9822
SHA2565d40fd92da5ca59c1badb58ad509db6a6d613f18660a9a270a53eca85d34c3a9
SHA512ba5634cc82f306245f9f0350bfa0b91e2f5ffc6c355b1452a95483f47e6acdb42c4e063f6c15115faf0f0630005df4fe8ef0e01539c270031cbd07a34a929704
-
Filesize
22.3MB
MD5a3ff7e328f41f4a6af82266bfe12036f
SHA179f0e44415ffe74b320dfb27c8988d326dc80b2e
SHA2569f2a9f89adda3003c587e4a9bdf5decf3260beefb135180e44845aee7730f731
SHA512472625b9ab26e83845a72423722e4b1286dce950597a52e95dff385bb33c1a1e4870755f273c8a02dea0793d04bdad7779cc05c786dff7ed624f5feb46d0a803
-
Filesize
1.1MB
MD5ff44a037ca0ef8d88c768cb284098170
SHA139be03cb8e657a10b0e88c9a4608a4fb536a1187
SHA256e94b86d8116aa6dbe60e8dc3891be64e2dcb4e4b4fd511eacac4c28af541d8dd
SHA51228de42438577f40b22b306cd5a8f99c97ece757abbb114810e9134a6593611fbe1a9c3f6b50a207f01fecd218916e560705487708178121f77a28f3e71841359
-
Filesize
1.1MB
MD5cc8b164c85cc68a2e6e0d10e452ef68b
SHA1fed79b50a5f03c0e33071ff849ea19dfdaf3c464
SHA25620590034969e110c4fba1d065da8ac53dad79f5b8a9bd68780164207a170c749
SHA512bee540ceb2b1de587872cdb963d2c754ac4ba0f3cac8026c3d7c2882aae0bfeb31babae927361b2ef5484ab2085b4a19914cc99a504aafd3f08c34f9f626699d
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
131KB
MD516881920cbe9ddb46c3ef29ee405a857
SHA10f76cffc2e57cf5c481a8015d203b96638d36ef5
SHA25659abe5f46020cb56e1079df8dc1145b2033e4b1459ae3d92f637064a6b618bc1
SHA512f07d1f4133a2ba2bda92fa6f55360fae73e44b97756ee3044f31af5f9e01cda34e7efbb1520c0b5aa2a496edc03ed4fefdc4ad419c1028b1ce6457b69aabeba0
-
Filesize
7.6MB
MD57a2f16b1053362d8e8edae5e320dd4d9
SHA18cda4387a93287f38d2b48fb109bd54a77bcdcf9
SHA256d2c7d87fad0c0fa94a4e2acdca4524cda696f2fd0c53ea9ddbe927da839707fa
SHA5122277ee7ac98560093a652019bf3a2fb18f02718580ef6711532498aaa17b87705266ed83093ffd4cfc73ec608a76359336a1780586679838633ac403bf683bcd
-
Filesize
1.1MB
MD5f120c361b527a9d090782300aa8f1ce5
SHA1ed82441da0dc7a5695ef96839fc2aea0f0c7e376
SHA2569209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825
SHA51260fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555
-
Filesize
71KB
MD5062373995eae5f0eac9eaa9192136bfb
SHA1b421e274da7d34aba8bf09ec2d3e7b4a01392b84
SHA2560392d5656bd677c4c5cb74c96e7b85b0867f2535a37950aec7f5c4a1a70d19ae
SHA51289c01c6c0abb7462a0dff6d9d03141f5dc42d08fcb22e44e532d8a87dd9d8c7db2fc272a1a52a147645e54d0116db94878fedc81f5fe4e5bf7d15292d95b2b88