Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi
Resource
win10v2004-20241007-en
General
-
Target
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi
-
Size
31.4MB
-
MD5
44e80380964f2ccbc6bc7b14ad4ffd3f
-
SHA1
c1b9a5cf8b8b63860fab7b3e8094fb0f58892596
-
SHA256
5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395
-
SHA512
93a9935aa0b14b99b8d74ecc9870a782907afd540a21759f56cc837fab72b33ce5386b7c6623987596fad15594848e47da36efed60d1553a566e2bc54c90647d
-
SSDEEP
786432:FPmtdVFmEvj9/DRTZVb2kZDJkj4BZELqx4LIsUtC1dQ+8eQfH2oPFQx:APVAW9Ff2kZaUBKLquL1UtCY+8x22FC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1588-558-0x000000002B3B0000-0x000000002B56D000-memory.dmp purplefox_rootkit behavioral2/memory/1588-574-0x000000002B3B0000-0x000000002B56D000-memory.dmp purplefox_rootkit behavioral2/memory/1588-573-0x000000002B3B0000-0x000000002B56D000-memory.dmp purplefox_rootkit behavioral2/memory/1588-584-0x000000002B3B0000-0x000000002B56D000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1588-558-0x000000002B3B0000-0x000000002B56D000-memory.dmp family_gh0strat behavioral2/memory/1588-574-0x000000002B3B0000-0x000000002B56D000-memory.dmp family_gh0strat behavioral2/memory/1588-573-0x000000002B3B0000-0x000000002B56D000-memory.dmp family_gh0strat behavioral2/memory/1588-584-0x000000002B3B0000-0x000000002B56D000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SET413A.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET413A.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\B: OqmnhpUgthmZ.exe File opened (read-only) \??\E: OqmnhpUgthmZ.exe File opened (read-only) \??\Q: OqmnhpUgthmZ.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: OqmnhpUgthmZ.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\P: OqmnhpUgthmZ.exe File opened (read-only) \??\X: OqmnhpUgthmZ.exe File opened (read-only) \??\Y: OqmnhpUgthmZ.exe File opened (read-only) \??\Z: OqmnhpUgthmZ.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: OqmnhpUgthmZ.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: OqmnhpUgthmZ.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\M: OqmnhpUgthmZ.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: OqmnhpUgthmZ.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: OqmnhpUgthmZ.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: OqmnhpUgthmZ.exe File opened (read-only) \??\T: OqmnhpUgthmZ.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: OqmnhpUgthmZ.exe File opened (read-only) \??\V: OqmnhpUgthmZ.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: OqmnhpUgthmZ.exe File opened (read-only) \??\S: OqmnhpUgthmZ.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: OqmnhpUgthmZ.exe File opened (read-only) \??\G: msiexec.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 2252 netsh.exe 3768 netsh.exe 1168 netsh.exe 1768 netsh.exe -
pid Process 5776 cmd.exe 5820 ARP.EXE -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\SET3F28.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\SET3F29.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_662fd96dfdced4ae\tap0901.cat DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_46C2CD5D0F070B6D918CC9BAEC875CC3 LetsPRO.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xPKoYjAvcnvH.exe.log xPKoYjAvcnvH.exe File created C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\SET3F17.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_662fd96dfdced4ae\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5} DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_71A3756DBB32C004799210B766A7AFA4 LetsPRO.exe File created C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\SET3F29.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEED7C5D2183A1352C6D421D65F131F0 LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F LetsPRO.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_662fd96dfdced4ae\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\tap0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_662fd96dfdced4ae\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_46C2CD5D0F070B6D918CC9BAEC875CC3 LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F LetsPRO.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\SET3F28.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB LetsPRO.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\SET3F17.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEED7C5D2183A1352C6D421D65F131F0 LetsPRO.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_71A3756DBB32C004799210B766A7AFA4 LetsPRO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\letsvpn\packages\SquirrelTemp letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Security.Cryptography.Csp.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.Compression.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Net.Requests.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Threading.Tasks.Parallel.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\zh-HK\LetsPRO.resources.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Collections.NonGeneric.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Runtime.Handles.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Runtime.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Security.Permissions.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\zh-MO letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Dynamic.Runtime.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\runtimes\win-x86\native letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.ComponentModel.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.Pipes.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\zh-HK\LetsPRO.resources.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.IsolatedStorage.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Xml.XPath.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\pt-BR\System.Web.Services.Description.resources.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\x64\WebView2Loader.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\zh-CN\LetsPRO.resources.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Net.NameResolution.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\pl\System.Web.Services.Description.resources.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Linq.Expressions.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Security.SecureString.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Collections.Specialized.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Diagnostics.StackTrace.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.Pipes.AccessControl.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Linq.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Text.Encoding.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Threading.Tasks.Extensions.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\pt-BR letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\DeltaCompressionDotNet.PatchApi.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.CodeDom.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.ComponentModel.TypeConverter.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Runtime.Serialization.Primitives.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Threading.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Xml.XPath.XDocument.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\Mono.Cecil.Pdb.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Net.Primitives.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.Compression.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Threading.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Xml.XmlDocument.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\cs\System.Web.Services.Description.resources.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\SQLitePCLRaw.provider.dynamic_cdecl.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Configuration.ConfigurationManager.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Resources.ResourceManager.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\SQLite-net.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\Microsoft.Bcl.AsyncInterfaces.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.ServiceModel.Http.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\runtimes\win-arm letsvpn.exe File created C:\Program Files (x86)\letsvpn\driver\tapinstall.exe letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\DeltaCompressionDotNet.MsDelta.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\Microsoft.Win32.Primitives.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Resources.ResourceManager.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\System.Text.RegularExpressions.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\ko\System.Web.Services.Description.resources.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Diagnostics.PerformanceCounter.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.IO.Pipes.AccessControl.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.ObjectModel.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\SQLiteNetExtensionsAsync.dll letsvpn.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.10.2\SQLitePCLRaw.batteries_v2.dll letsvpn.exe File created C:\Program Files (x86)\letsvpn\app-3.10.2\System.Collections.Specialized.dll letsvpn.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File created C:\Windows\Installer\e57e6d6.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIE81E.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\e57e6d8.msi msiexec.exe File opened for modification C:\Windows\Installer\e57e6d6.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{E91D9162-F95F-402E-99AF-044651ADC395} msiexec.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe -
Executes dropped EXE 13 IoCs
pid Process 2100 ckhjghacCGCf.exe 2464 OqmnhpUgthmZ.exe 1744 letsvpn.exe 4888 xPKoYjAvcnvH.exe 2556 xPKoYjAvcnvH.exe 3588 xPKoYjAvcnvH.exe 2012 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 4988 tapinstall.exe 4196 tapinstall.exe 4904 tapinstall.exe 1808 LetsPRO.exe 2252 LetsPRO.exe -
Loads dropped DLL 59 IoCs
pid Process 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 1744 letsvpn.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe -
pid Process 1060 powershell.exe 1800 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4196 msiexec.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 15 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OqmnhpUgthmZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OqmnhpUgthmZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OqmnhpUgthmZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ckhjghacCGCf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ROUTE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs tapinstall.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OqmnhpUgthmZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OqmnhpUgthmZ.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LetsPRO.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz LetsPRO.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 312 ipconfig.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2452 = "Saint Pierre Standard Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs tapinstall.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software letsvpn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My LetsPRO.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings\JITDebug = "0" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates tapinstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-592 = "Malay Peninsula Standard Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-982 = "Kamchatka Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-872 = "Pakistan Standard Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople tapinstall.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-152 = "Central America Standard Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" LetsPRO.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Lets\userHabit = 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 LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates LetsPRO.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Lets\qjiwx = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d8c5ae66c44e0548aebe78fbbf17ad21000000000200000000001066000000010000200000003f469819376c1d299198e35dda38cee4f862cee5c79afcc348e6a8323a124426000000000e8000000002000020000000cb2047ede89ceb49bcbbfc0714e7c4056519c1d28a9153ab4e0b1694c0d38e2160030000d4cd2aa669cd79f7bd23e10455d4d9ab34b5bc5162338b5373d2fe317946289cbb677ef007022e52e9be47f2dce9fc9c70d88e2bdfb9c59a86e91eb9e7ae518867a2c37d8ac894805bd623fefb686eace6faa8c57b7cbb6805c404c2d808a15138bb8b7890405bbdbab970c7dda9e50fc0e6344371ebaa89887f0c3f474691efd9550af46e33d29fe24f9ecaffd4e17cff8e2876fca19ef3abeb137f37f0013fe09d5f5c6d00df250764abcf31725dd6bb90d101c1601cd4943ca25a8b7a4b8e89e0b374dff6d471905b8187b6c79fbac8038b5343b7cd56ace35f6795030334fc01deb37094d503107f7da38e46bea5c67c42d88cc7f9b7d897870273ec06bf7ac9cac7205b273eda4bc66e64b9761254c88cdc563ec6926dea4105b951078438ccd65b2ebc065e20f532dc76774bae5fe74cf12727a8ce1a1524f7d9097b0cc94923667175d3d12784bcbddf36b8a251e2e66fd9a591c6404163e03e6ac78626d4784b0d62ab784d94a8a2b16da8fa0c9bf1e1c384462139900450d6c47b461f15ded1c2d91a4463c5515ac0dc0de6f8fa77b87611e6c86ce4c44a7a317d3d388be361245e898768b2502d0208acb4afc922d3a1e8722375d4710d0e70ef38fd16bb2eaac1b3f008a0b41c63e80d8301192bed02637a245246cd482872347101d59d78ce3da95310a86ca09ab0b4c26d24a82f9753b86877b0df0f68e00612c64ef68da41debe521c4d97a052993ea4f0794453b76896772cf0017ebf1be1739c73004e6b48ef5d38f9bff100e99252b20701af75c3b4bcb7256e95cc1d928985167a9a2ecc2c76cb2aba1b049b727f4d5cadff84f082d665d1f0e25fa6c9775494060ae015ba01efde2d4a0b30a8a2cfcb0b1c7f14c7d78732179d1537be1beabb8d32d14877d9ecdeb55156c3a40d5168b044cb4e0d0ac859101186bb86506b35b2f03ef659fc862e390de6a4a839ba87429edcfe89022735cebe53fea5d40ee3c0e185107976f6eb3167e2239dda619a8f0dd4b6506b6afdaa12ef76a4c52c5a426f265fb629bfcce8b5d492e09774d71ea48acd53db31b06023d422e5980951eba1eac62a5505ae00986dd93746fcc24c48b5f119dac4dba17906eb3e5916f93486ba98394c8d171a470be83c7b9c153ecbe9967c07a2b959faaf8639c892984c92cd4f45fb97853ef6a754c5109a2455d33deb08db0d7670030b6db9740000000ae01ffc2c3f04c77fe9c18a180f77bb408dfeb8851dae5220ee0e6e01dd61b0121fc0ea5c34ca2070965d1004498ca6eddae30088f1e1b6dd6da3fe9d81c87f4 LetsPRO.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" LetsPRO.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\LetsPRO = "\"C:\\Program Files (x86)\\letsvpn\\app-3.10.2\\LetsPRO.exe\" /silent" LetsPRO.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" LetsPRO.exe -
Modifies registry class 22 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\ProductName = "InnovateGraciousSupplier" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\2619D19EF59FE20499FA406415DA3C59\ProductFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\PackageCode = "C77F9DB5C75184D43A75CFB1C0847EF1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList\PackageName = "5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\2619D19EF59FE20499FA406415DA3C59 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\58FC6756EF1B4C747BC43E3A7ABA54B6 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\58FC6756EF1B4C747BC43E3A7ABA54B6\2619D19EF59FE20499FA406415DA3C59 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\Version = "50331649" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\2619D19EF59FE20499FA406415DA3C59\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CCBBF9E1485AF63CE47ABF8E9E648C2504FC319D LetsPRO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CCBBF9E1485AF63CE47ABF8E9E648C2504FC319D\Blob = 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 LetsPRO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\CCBBF9E1485AF63CE47ABF8E9E648C2504FC319D\Blob = 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 LetsPRO.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1388 msiexec.exe 1388 msiexec.exe 2464 OqmnhpUgthmZ.exe 2464 OqmnhpUgthmZ.exe 1800 powershell.exe 1800 powershell.exe 1800 powershell.exe 3588 xPKoYjAvcnvH.exe 3588 xPKoYjAvcnvH.exe 2012 OqmnhpUgthmZ.exe 2012 OqmnhpUgthmZ.exe 2012 OqmnhpUgthmZ.exe 2012 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe 1588 OqmnhpUgthmZ.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1744 letsvpn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4196 msiexec.exe Token: SeIncreaseQuotaPrivilege 4196 msiexec.exe Token: SeSecurityPrivilege 1388 msiexec.exe Token: SeCreateTokenPrivilege 4196 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4196 msiexec.exe Token: SeLockMemoryPrivilege 4196 msiexec.exe Token: SeIncreaseQuotaPrivilege 4196 msiexec.exe Token: SeMachineAccountPrivilege 4196 msiexec.exe Token: SeTcbPrivilege 4196 msiexec.exe Token: SeSecurityPrivilege 4196 msiexec.exe Token: SeTakeOwnershipPrivilege 4196 msiexec.exe Token: SeLoadDriverPrivilege 4196 msiexec.exe Token: SeSystemProfilePrivilege 4196 msiexec.exe Token: SeSystemtimePrivilege 4196 msiexec.exe Token: SeProfSingleProcessPrivilege 4196 msiexec.exe Token: SeIncBasePriorityPrivilege 4196 msiexec.exe Token: SeCreatePagefilePrivilege 4196 msiexec.exe Token: SeCreatePermanentPrivilege 4196 msiexec.exe Token: SeBackupPrivilege 4196 msiexec.exe Token: SeRestorePrivilege 4196 msiexec.exe Token: SeShutdownPrivilege 4196 msiexec.exe Token: SeDebugPrivilege 4196 msiexec.exe Token: SeAuditPrivilege 4196 msiexec.exe Token: SeSystemEnvironmentPrivilege 4196 msiexec.exe Token: SeChangeNotifyPrivilege 4196 msiexec.exe Token: SeRemoteShutdownPrivilege 4196 msiexec.exe Token: SeUndockPrivilege 4196 msiexec.exe Token: SeSyncAgentPrivilege 4196 msiexec.exe Token: SeEnableDelegationPrivilege 4196 msiexec.exe Token: SeManageVolumePrivilege 4196 msiexec.exe Token: SeImpersonatePrivilege 4196 msiexec.exe Token: SeCreateGlobalPrivilege 4196 msiexec.exe Token: SeBackupPrivilege 4436 vssvc.exe Token: SeRestorePrivilege 4436 vssvc.exe Token: SeAuditPrivilege 4436 vssvc.exe Token: SeBackupPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeBackupPrivilege 1940 srtasks.exe Token: SeRestorePrivilege 1940 srtasks.exe Token: SeSecurityPrivilege 1940 srtasks.exe Token: SeTakeOwnershipPrivilege 1940 srtasks.exe Token: SeBackupPrivilege 1940 srtasks.exe Token: SeRestorePrivilege 1940 srtasks.exe Token: SeSecurityPrivilege 1940 srtasks.exe Token: SeTakeOwnershipPrivilege 1940 srtasks.exe Token: SeRestorePrivilege 2100 ckhjghacCGCf.exe Token: 35 2100 ckhjghacCGCf.exe Token: SeSecurityPrivilege 2100 ckhjghacCGCf.exe Token: SeSecurityPrivilege 2100 ckhjghacCGCf.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 4196 msiexec.exe 4196 msiexec.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe 2252 LetsPRO.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1940 1388 msiexec.exe 104 PID 1388 wrote to memory of 1940 1388 msiexec.exe 104 PID 1388 wrote to memory of 2012 1388 msiexec.exe 106 PID 1388 wrote to memory of 2012 1388 msiexec.exe 106 PID 2012 wrote to memory of 2100 2012 MsiExec.exe 107 PID 2012 wrote to memory of 2100 2012 MsiExec.exe 107 PID 2012 wrote to memory of 2100 2012 MsiExec.exe 107 PID 2012 wrote to memory of 2464 2012 MsiExec.exe 109 PID 2012 wrote to memory of 2464 2012 MsiExec.exe 109 PID 2012 wrote to memory of 2464 2012 MsiExec.exe 109 PID 2012 wrote to memory of 1744 2012 MsiExec.exe 110 PID 2012 wrote to memory of 1744 2012 MsiExec.exe 110 PID 2012 wrote to memory of 1744 2012 MsiExec.exe 110 PID 1744 wrote to memory of 1800 1744 letsvpn.exe 112 PID 1744 wrote to memory of 1800 1744 letsvpn.exe 112 PID 1744 wrote to memory of 1800 1744 letsvpn.exe 112 PID 3588 wrote to memory of 2012 3588 xPKoYjAvcnvH.exe 119 PID 3588 wrote to memory of 2012 3588 xPKoYjAvcnvH.exe 119 PID 3588 wrote to memory of 2012 3588 xPKoYjAvcnvH.exe 119 PID 2012 wrote to memory of 1588 2012 OqmnhpUgthmZ.exe 121 PID 2012 wrote to memory of 1588 2012 OqmnhpUgthmZ.exe 121 PID 2012 wrote to memory of 1588 2012 OqmnhpUgthmZ.exe 121 PID 1744 wrote to memory of 1060 1744 letsvpn.exe 127 PID 1744 wrote to memory of 1060 1744 letsvpn.exe 127 PID 1744 wrote to memory of 1060 1744 letsvpn.exe 127 PID 1744 wrote to memory of 4988 1744 letsvpn.exe 131 PID 1744 wrote to memory of 4988 1744 letsvpn.exe 131 PID 1744 wrote to memory of 4196 1744 letsvpn.exe 133 PID 1744 wrote to memory of 4196 1744 letsvpn.exe 133 PID 1924 wrote to memory of 836 1924 svchost.exe 136 PID 1924 wrote to memory of 836 1924 svchost.exe 136 PID 1924 wrote to memory of 1040 1924 svchost.exe 137 PID 1924 wrote to memory of 1040 1924 svchost.exe 137 PID 1744 wrote to memory of 2216 1744 letsvpn.exe 139 PID 1744 wrote to memory of 2216 1744 letsvpn.exe 139 PID 1744 wrote to memory of 2216 1744 letsvpn.exe 139 PID 2216 wrote to memory of 1168 2216 cmd.exe 141 PID 2216 wrote to memory of 1168 2216 cmd.exe 141 PID 2216 wrote to memory of 1168 2216 cmd.exe 141 PID 1744 wrote to memory of 4624 1744 letsvpn.exe 142 PID 1744 wrote to memory of 4624 1744 letsvpn.exe 142 PID 1744 wrote to memory of 4624 1744 letsvpn.exe 142 PID 4624 wrote to memory of 1768 4624 cmd.exe 144 PID 4624 wrote to memory of 1768 4624 cmd.exe 144 PID 4624 wrote to memory of 1768 4624 cmd.exe 144 PID 1744 wrote to memory of 2732 1744 letsvpn.exe 145 PID 1744 wrote to memory of 2732 1744 letsvpn.exe 145 PID 1744 wrote to memory of 2732 1744 letsvpn.exe 145 PID 2732 wrote to memory of 2252 2732 cmd.exe 147 PID 2732 wrote to memory of 2252 2732 cmd.exe 147 PID 2732 wrote to memory of 2252 2732 cmd.exe 147 PID 1744 wrote to memory of 3124 1744 letsvpn.exe 148 PID 1744 wrote to memory of 3124 1744 letsvpn.exe 148 PID 1744 wrote to memory of 3124 1744 letsvpn.exe 148 PID 3124 wrote to memory of 3768 3124 cmd.exe 150 PID 3124 wrote to memory of 3768 3124 cmd.exe 150 PID 3124 wrote to memory of 3768 3124 cmd.exe 150 PID 1744 wrote to memory of 4904 1744 letsvpn.exe 151 PID 1744 wrote to memory of 4904 1744 letsvpn.exe 151 PID 1744 wrote to memory of 1808 1744 letsvpn.exe 154 PID 1744 wrote to memory of 1808 1744 letsvpn.exe 154 PID 1744 wrote to memory of 1808 1744 letsvpn.exe 154 PID 1808 wrote to memory of 2252 1808 LetsPRO.exe 155 PID 1808 wrote to memory of 2252 1808 LetsPRO.exe 155 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4196
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 51CDBE16E03FA96544849520FC6D7CB0 E Global\MSI00002⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\InnovateGraciousSupplier\ckhjghacCGCf.exe"C:\Program Files\InnovateGraciousSupplier\ckhjghacCGCf.exe" x "C:\Program Files\InnovateGraciousSupplier\gAyPsguYXDsMcEThACGI" -o"C:\Program Files\InnovateGraciousSupplier\" -pgeAZLqCXgLqbCiVjQrQI -y3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe"C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe" -number 164 -file file3 -mode mode3 -flag flag33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files\InnovateGraciousSupplier\letsvpn.exe"C:\Program Files\InnovateGraciousSupplier\letsvpn.exe"3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -ExecutionPolicy Bypass -File "C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09014⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4988
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap09014⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4196
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1168
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets.exe5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO.exe5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3768
-
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09014⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4904
-
-
C:\Program Files (x86)\letsvpn\LetsPRO.exe"C:\Program Files (x86)\letsvpn\LetsPRO.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\letsvpn\app-3.10.2\LetsPRO.exe"C:\Program Files (x86)\letsvpn\app-3.10.2\LetsPRO.exe"5⤵
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2252 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ipconfig /all6⤵
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all7⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:312
-
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5200
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C route print6⤵
- System Location Discovery: System Language Discovery
PID:5688 -
C:\Windows\SysWOW64\ROUTE.EXEroute print7⤵
- System Location Discovery: System Language Discovery
PID:5748
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C arp -a6⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5776 -
C:\Windows\SysWOW64\ARP.EXEarp -a7⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:5820
-
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe"C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe" install1⤵
- Drops file in System32 directory
- Executes dropped EXE
PID:4888
-
C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe"C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe" start1⤵
- Executes dropped EXE
PID:2556
-
C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe"C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe"C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe" -number 132 -file file3 -mode mode3 -flag flag32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe"C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe" -number 362 -file file3 -mode mode3 -flag flag33⤵
- Enumerates connected drives
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "c:\program files (x86)\letsvpn\driver\oemvista.inf" "9" "4d14a44ff" "0000000000000140" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\letsvpn\driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:836
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap0901.ndi:9.24.6.601:tap0901," "4d14a44ff" "0000000000000140"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1040
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:4716
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5564
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1System Binary Proxy Execution
1Msiexec
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a44cbe607d7403b1425f70e58de1bf30
SHA19f16449cf99633dc8612088b2299bfbb0e8dd0ad
SHA25687353efba7d189069d00fe4721205902eadf15eb94aea642e7240e14bf62103a
SHA512c9610c10ee6ef03823f5dba6cc5364bdf7c03cb599ecfde50e4e96b17a2e6f40d71dde1a60d3ec34c8b7f9614967ea8543b0283be214495684e571741522dfb2
-
Filesize
318B
MD5b34636a4e04de02d079ba7325e7565f0
SHA1f32c1211eac22409bb195415cb5a8063431f75cd
SHA256a9901397d39c0fc74adfdb95dd5f95c3a14def3f9d58ef44ab45fc74a56d46df
SHA5126eb3255e3c89e2894f0085095fb5f6ab97349f0ed63c267820c82916f43a0ac014a94f98c186ff5d54806469a00c3c700a34d26de90afb090b80ac824a05aa2f
-
Filesize
240KB
MD55c418c95fad150290b99fd115838f2a9
SHA11af87b13df4f52fa458152821fa7c51c75a772f3
SHA2567bcd5e4b4771172d4a66f3d1eefd74d94755e929fe4012295d6651ca15277a88
SHA5124a3bb2a01e48c2be67dcae15c1e9e7255fafccb8a3270b77484f72c939b92a18cb80b4b5ed579511d6eba42482ae5e8528e8270a7a06d19463044b20f709f775
-
Filesize
109KB
MD58bfa2e9dc7f4ac42d1fa58fc3ff37267
SHA1b3189f2f45a70e719339a147f9cab0d1ee77858d
SHA256c5059bf1dd92deb3c590d0ea8065dc62b89259f4266c0ea54f5c8d062056c76f
SHA512a2be51b345c3c7d69695e284d0097c36a6e3b53104a159f8cc1e2af28cb6f5a7f9710299febaff3d3be6f554cf3f3d184fb11408908bf7237be161b0fe38af5c
-
Filesize
1.5MB
MD5cc8594dbaf16443f0d92fbdac4dc2797
SHA1047e926a7d3e0e7a1fa6219af32b531ed3574487
SHA256afeb1c6108ef4f2b241ffbdf0bd138ada0fb2af2381b068f2af397c761c76890
SHA512e4a8390a60fd42f21ce89e79ec5bea6629359d2c4629810aec7069234f423058f8271b1d61d7342a623edca7a65abdda701149494709c88c8431a61c352d108e
-
Filesize
22KB
MD5ebaeca4375f9cc819ff3835ba62717de
SHA1819d4ad83729d709a3ed6172e2c608af70de3d03
SHA256a12e73eb35a51a227afd1318edb824a77cbe60d2fbf67e1463404c0673e42d9c
SHA512311d6aa1a8608b327bfa97cb77e4e21a44946438f60c6c2fc9e0bf9ef97434138d0136ca1d55c7d836d72a03cebec63beefd974219ab8ea580eddf3e23e76d3f
-
Filesize
21KB
MD54aa9b59fc32caa6d74293cc4ff4234a9
SHA13ed90204d89217a19b1078eb8718202932f4282a
SHA2562aa48a6078e2ef1c4954b507c3da13bea8ee3e4c38a4131621adf98fc8da265e
SHA512dad298b8430ffcb3d7c44283f3b85892773a288eff1e071860839ed39725e8696f2dae6f9562377bddcdbcfde83f164fb753d36501e2b9c215d0fb2d93cb2ee2
-
Filesize
693KB
MD5a051afcfeff1f630188c5785f7ea3273
SHA19312b0a42b4ffbdad365c4938a081c9abc870074
SHA25697e46c96938851c462a59eaa43bca65ed3a0b0a385e2b87ae959acf3bfa6ba75
SHA5120a4ba46ea22021f467e97a4f68dd1473187c7af213dda9f0a9fcb683891bb804b27b45d9760aa02a3ce8eb0287efa67b8b4690ce1908aab0004d548183015cb9
-
Filesize
126KB
MD50b0e7270f14d5dec664787ef680ab980
SHA14c5c9f4385423d083d2693585056363853727ca0
SHA25635288ce35fb77395a2f55244e30f7f8aa2131fa3ebac9c85ea58979e7276ec3e
SHA512d45c34602a49c75e9f0beb4f473ebb851e17c1a342308984ecf5666be93d615f75655a0ea723aa4bd3fd24208e8ab384223f888a0f2baa9d36c96150098fd801
-
Filesize
3KB
MD528f9077c304d8c626554818a5b5f3b3a
SHA1a01f735fe348383795d61aadd6aab0cc3a9db190
SHA256746b5675ea85c21ef4fcc05e072383a7f83c5fe06aaa391fc3046f34b9817c90
SHA512485c175bc13c64601b15243daecbf72621883c2ff294852c9bbb2681937f7ef0bea65361e0f83131ec989432326442ef387c1ccf2a7ca537c6788b8fd5c0021e
-
Filesize
273KB
MD56c4e61362d16c7c0b3731b0e2a84f911
SHA13c89a13ab980e3d9ea515470c9d53bb30ac746cb
SHA2565245b084cfd79eb3627caf4ddac63096ef89046093dcb0e00e2b96cf74c24fb6
SHA512ac1a941200787971d154b99211fa5c7d7a3ba83132be505de2a7ea2682e8be87e668fb0264de94dc6cedce85750b214159c797ce5b1fcfde1e229875215ae458
-
Filesize
7KB
MD526009f092ba352c1a64322268b47e0e3
SHA1e1b2220cd8dcaef6f7411a527705bd90a5922099
SHA256150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9
SHA512c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363
-
Filesize
99KB
MD51e3cf83b17891aee98c3e30012f0b034
SHA1824f299e8efd95beca7dd531a1067bfd5f03b646
SHA2569f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f
SHA512fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b
-
Filesize
2.9MB
MD5c0332d95acdfc46fb60f3f1d9dd6b92d
SHA12863f05a42637d22a354e7c39cd17f8497c447ad
SHA2560975d859e5a7b56faaf48ba8e50c800156b8cff927f3bd01f564aa6f18eac2e7
SHA5127fdab98bdb7012cc87af60d3bbe1bfcd42ce536f75aca56981b1a2d7121bca7d9c8f5091fea7902a9e5c688c7d30613c3f99c07dc166faf58e6c230dac53d09d
-
Filesize
577KB
MD511fa744ebf6a17d7dd3c58dc2603046d
SHA1d99de792fd08db53bb552cd28f0080137274f897
SHA2561b16c41ae39b679384b06f1492b587b650716430ff9c2e079dca2ad1f62c952d
SHA512424196f2acf5b89807f4038683acc50e7604223fc630245af6bab0e0df923f8b1c49cb09ac709086568c214c3f53dcb7d6c32e8a54af222a3ff78cfab9c51670
-
Filesize
2.1MB
MD56bb89d170132b6a2df5920a5243ed390
SHA194a1a99e6d0bfd8d4458daafe56b3f9e36caa18d
SHA2561cf0546651767e50b1ccd478dffb5afd00ca9af6316ec3bc1349f0a2573bc070
SHA51267bb4e5fafa4a95ada5f0df6c669f3bd85c5efd0446ae199f277d2f0075ec8e5c0b47fde4a84df2158eb49c198e1676143b91c888ddcc9f75055486c64f83070
-
Filesize
14.5MB
MD594f6bd702b7a2e17c45d16eaf7da0d64
SHA145f8c05851bcf16416e087253ce962b320e9db8a
SHA25607f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776
SHA5127ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
831B
MD5c11ec63d0bfb573e4abbd1b5fd0eeafd
SHA1b2b76484db4057183b3c95227407811c8b80824d
SHA2563e8d7234980baff4108a45b20694cfa5cf714b725b821b5181ecc3e962023aa8
SHA512be6d993df99e226da2bc6751705e663f8e3c38c6db28e8ecfc01c83c98371499ce2f05dcd9da34dfca6baa40a78870002d45394f83fdd19009b52f040c67431b
-
Filesize
294B
MD58c4aed848206255ddaa905091ff15eae
SHA18aec7fa58e5a8fe0b386ce8768d5fe81cedb3af4
SHA256ad2a1c413fc49af6a964fa414c6c7f034d40701cd59bed7e6ddb34bbef223d9c
SHA5127549832ba94047e4e371b0a443e7175660f893b76131d622838dcc615b0f68ff6aace31b46eb39e02833d1257f2189a4b26c730c0259b29df2b82f6bc920551c
-
Filesize
464B
MD5fe8932402d8d9b0b99f0b0b18ebdf019
SHA1de78883798177c3567aeb8bfe7f59fc7016988c7
SHA256c89ccea7622249bdbac57da9476e6c8ef55d872b05820e5c867883cbb298bfa3
SHA512e90c3601ce985a41feee4aba3766200ad0fed7737c291e71768ff3e820884bf0942216c462f3675e2372a7eb9096616655f7c561a4f6d6c396ea283851ac3ad0
-
Filesize
528B
MD5244352a9e179d643c944ffc807c0f46d
SHA1a6cc23179d6274a2095a9c7a732764ed8b1c425f
SHA25603514bfba85de6bbad8ca847988b315bb280a71408a21e27e5d0ded1c50d921c
SHA512e784eb892b5873ad78a304d8e65cae4ac939bcae73caeb6d1469c1f65fdddccbc6a250285620dd59a68c1a396aef1716815fe75a058e0cc16dea8975fcf65fb6
-
Filesize
456B
MD54a0662c093559ef4a0a36a7ea203b449
SHA1790de7e00830c00edb86d1e58bd8e2f4fea14b28
SHA25607883d6864252d25a20e729b9d4dfa3d7f48b5efaf20acfe0efe23824827e68e
SHA512697604a80208c61493c97d81893323e8517c740b3dd2780e57b00ca37d663faedfd9f14f08d966139d2769af4f7813811fe329bcb358ec8094f2c43bda504540
-
Filesize
1KB
MD533b19d75aa77114216dbc23f43b195e3
SHA136a6c3975e619e0c5232aa4f5b7dc1fec9525535
SHA256b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2
SHA512676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821
-
Filesize
11KB
MD5c066d5070ebb837c1c93ad427f33513b
SHA1e2eec1af262bf8fb08d78fe0f7147f8d67ae3fd6
SHA256463625a370edfe0cf6ac3b46ab713ecec42892380b6d7e0a2ed73eb2fed9d3c7
SHA512b45c251701561b799cd2e1e379ccee4aea0b341cf1de47c05d56c82332f031293f418ab01449001f5d84bc1351e4ff050793323cdd85a804855469bc718db36d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
51KB
MD57f8e1969b0874c8fb9ab44fc36575380
SHA13057c9ce90a23d29f7d0854472f9f44e87b0f09a
SHA256076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd
SHA5127aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555
-
Filesize
9KB
MD5ca95c9da8cef7062813b989ab9486201
SHA1c555af25df3de51aa18d487d47408d5245dba2d1
SHA256feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be
SHA512a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9
-
Filesize
6KB
MD53d366250fcf8b755fce575c75f8c79e4
SHA12ebac7df78154738d41aac8e27d7a0e482845c57
SHA2568bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6
SHA51267d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094
-
Filesize
31.4MB
MD544e80380964f2ccbc6bc7b14ad4ffd3f
SHA1c1b9a5cf8b8b63860fab7b3e8094fb0f58892596
SHA2565f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395
SHA51293a9935aa0b14b99b8d74ecc9870a782907afd540a21759f56cc837fab72b33ce5386b7c6623987596fad15594848e47da36efed60d1553a566e2bc54c90647d
-
Filesize
38KB
MD5c10ccdec5d7af458e726a51bb3cdc732
SHA10553aab8c2106abb4120353360d747b0a2b4c94f
SHA256589c5667b1602837205da8ea8e92fe13f8c36048b293df931c99b39641052253
SHA5127437c12ae5b31e389de3053a55996e7a0d30689c6e0d10bde28f1fbf55cee42e65aa441b7b82448334e725c0899384dee2645ce5c311f3a3cfc68e42ad046981
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xPKoYjAvcnvH.exe.log
Filesize1KB
MD5122cf3c4f3452a55a92edee78316e071
SHA1f2caa36d483076c92d17224cf92e260516b3cbbf
SHA25642f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0
SHA512c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c
-
Filesize
24.1MB
MD5498cd00af4158d887a260f5cb7d93183
SHA1525e71046b5f20250b29f3d05537c302d0966567
SHA25654190d20fb4e39f75f91a410dbb952353021942e567972b0b0e322c1eb7a0065
SHA5120a09421efbeef59e19980c8cc571312c0ae47a5c83eae445e9f77b8c8d7dc49831aca3c6f7c52180807f010e8608676321da6d054a4a46151739ff9a3353c05d
-
\??\Volume{ff55cfe6-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{45be2ef3-3b5c-4069-a3bf-11c0a4126402}_OnDiskSnapshotProp
Filesize6KB
MD57acf497de03e4db0b867fea96d5c52ca
SHA10438b859a7c0f07bd4c6b4d6bd07e1742259b52f
SHA256db2acd4b9cca93c859335ea5a97b4cbf7068665a4454b054393e17793c8094fb
SHA51219dbb9c4fb57607f03f206040f1f98b241ceb9e64051da3f08a4fe040b3accd6e2ce90f8ad45a5d74e9ac6a125b1fa5d482c453005c31516eff91daa7cb94a61
-
Filesize
10KB
MD5f73ac62e8df97faf3fc8d83e7f71bf3f
SHA1619a6e8f7a9803a4c71f73060649903606beaf4e
SHA256cc74cdb88c198eb00aef4caa20bf1fda9256917713a916e6b94435cd4dcb7f7b
SHA512f81f5757e0e449ad66a632299bcbe268ed02df61333a304dccafb76b2ad26baf1a09e7f837762ee4780afb47d90a09bf07cb5b8b519c6fb231b54fa4fbe17ffe