Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-10-2024 12:21

General

  • Target

    5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi

  • Size

    31.4MB

  • MD5

    44e80380964f2ccbc6bc7b14ad4ffd3f

  • SHA1

    c1b9a5cf8b8b63860fab7b3e8094fb0f58892596

  • SHA256

    5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395

  • SHA512

    93a9935aa0b14b99b8d74ecc9870a782907afd540a21759f56cc837fab72b33ce5386b7c6623987596fad15594848e47da36efed60d1553a566e2bc54c90647d

  • SSDEEP

    786432:FPmtdVFmEvj9/DRTZVb2kZDJkj4BZELqx4LIsUtC1dQ+8eQfH2oPFQx:APVAW9Ff2kZaUBKLquL1UtCY+8x22FC

Malware Config

Signatures

  • Detect PurpleFox Rootkit 4 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Purplefox family
  • Drops file in Drivers directory 3 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Windows Firewall 2 TTPs 4 IoCs
  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Drops file in System32 directory 33 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 59 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 15 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4196
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 51CDBE16E03FA96544849520FC6D7CB0 E Global\MSI0000
      2⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files\InnovateGraciousSupplier\ckhjghacCGCf.exe
        "C:\Program Files\InnovateGraciousSupplier\ckhjghacCGCf.exe" x "C:\Program Files\InnovateGraciousSupplier\gAyPsguYXDsMcEThACGI" -o"C:\Program Files\InnovateGraciousSupplier\" -pgeAZLqCXgLqbCiVjQrQI -y
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe
        "C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe" -number 164 -file file3 -mode mode3 -flag flag3
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2464
      • C:\Program Files\InnovateGraciousSupplier\letsvpn.exe
        "C:\Program Files\InnovateGraciousSupplier\letsvpn.exe"
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1800
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -ExecutionPolicy Bypass -File "C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1060
        • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
          "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:4988
        • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
          "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap0901
          4⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:4196
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c netsh advfirewall firewall Delete rule name=lets
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2216
          • C:\Windows\SysWOW64\netsh.exe
            netsh advfirewall firewall Delete rule name=lets
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1168
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c netsh advfirewall firewall Delete rule name=lets.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4624
          • C:\Windows\SysWOW64\netsh.exe
            netsh advfirewall firewall Delete rule name=lets.exe
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1768
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\SysWOW64\netsh.exe
            netsh advfirewall firewall Delete rule name=LetsPRO.exe
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2252
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c netsh advfirewall firewall Delete rule name=LetsPRO
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3124
          • C:\Windows\SysWOW64\netsh.exe
            netsh advfirewall firewall Delete rule name=LetsPRO
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3768
        • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
          "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:4904
        • C:\Program Files (x86)\letsvpn\LetsPRO.exe
          "C:\Program Files (x86)\letsvpn\LetsPRO.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Program Files (x86)\letsvpn\app-3.10.2\LetsPRO.exe
            "C:\Program Files (x86)\letsvpn\app-3.10.2\LetsPRO.exe"
            5⤵
            • Drops file in System32 directory
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies data under HKEY_USERS
            • Modifies system certificate store
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2252
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C ipconfig /all
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2956
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /all
                7⤵
                • System Location Discovery: System Language Discovery
                • Gathers network information
                PID:312
            • C:\Windows\SysWOW64\netsh.exe
              C:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no
              6⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:5200
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C route print
              6⤵
              • System Location Discovery: System Language Discovery
              PID:5688
              • C:\Windows\SysWOW64\ROUTE.EXE
                route print
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5748
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C arp -a
              6⤵
              • Network Service Discovery
              • System Location Discovery: System Language Discovery
              PID:5776
              • C:\Windows\SysWOW64\ARP.EXE
                arp -a
                7⤵
                • Network Service Discovery
                • System Location Discovery: System Language Discovery
                PID:5820
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4436
  • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe
    "C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe" install
    1⤵
    • Drops file in System32 directory
    • Executes dropped EXE
    PID:4888
  • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe
    "C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe" start
    1⤵
    • Executes dropped EXE
    PID:2556
  • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe
    "C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe
      "C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe" -number 132 -file file3 -mode mode3 -flag flag3
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe
        "C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe" -number 362 -file file3 -mode mode3 -flag flag3
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1588
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "1" "c:\program files (x86)\letsvpn\driver\oemvista.inf" "9" "4d14a44ff" "0000000000000140" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\letsvpn\driver"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:836
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tap0901.ndi:9.24.6.601:tap0901," "4d14a44ff" "0000000000000140"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      PID:1040
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
    1⤵
      PID:4716
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:5564

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57e6d7.rbs

        Filesize

        8KB

        MD5

        a44cbe607d7403b1425f70e58de1bf30

        SHA1

        9f16449cf99633dc8612088b2299bfbb0e8dd0ad

        SHA256

        87353efba7d189069d00fe4721205902eadf15eb94aea642e7240e14bf62103a

        SHA512

        c9610c10ee6ef03823f5dba6cc5364bdf7c03cb599ecfde50e4e96b17a2e6f40d71dde1a60d3ec34c8b7f9614967ea8543b0283be214495684e571741522dfb2

      • C:\Program Files (x86)\letsvpn\AddWindowsSecurityExclusion.ps1

        Filesize

        318B

        MD5

        b34636a4e04de02d079ba7325e7565f0

        SHA1

        f32c1211eac22409bb195415cb5a8063431f75cd

        SHA256

        a9901397d39c0fc74adfdb95dd5f95c3a14def3f9d58ef44ab45fc74a56d46df

        SHA512

        6eb3255e3c89e2894f0085095fb5f6ab97349f0ed63c267820c82916f43a0ac014a94f98c186ff5d54806469a00c3c700a34d26de90afb090b80ac824a05aa2f

      • C:\Program Files (x86)\letsvpn\LetsPRO.exe

        Filesize

        240KB

        MD5

        5c418c95fad150290b99fd115838f2a9

        SHA1

        1af87b13df4f52fa458152821fa7c51c75a772f3

        SHA256

        7bcd5e4b4771172d4a66f3d1eefd74d94755e929fe4012295d6651ca15277a88

        SHA512

        4a3bb2a01e48c2be67dcae15c1e9e7255fafccb8a3270b77484f72c939b92a18cb80b4b5ed579511d6eba42482ae5e8528e8270a7a06d19463044b20f709f775

      • C:\Program Files (x86)\letsvpn\app-3.10.2\CommunityToolkit.Mvvm.dll

        Filesize

        109KB

        MD5

        8bfa2e9dc7f4ac42d1fa58fc3ff37267

        SHA1

        b3189f2f45a70e719339a147f9cab0d1ee77858d

        SHA256

        c5059bf1dd92deb3c590d0ea8065dc62b89259f4266c0ea54f5c8d062056c76f

        SHA512

        a2be51b345c3c7d69695e284d0097c36a6e3b53104a159f8cc1e2af28cb6f5a7f9710299febaff3d3be6f554cf3f3d184fb11408908bf7237be161b0fe38af5c

      • C:\Program Files (x86)\letsvpn\app-3.10.2\LetsPRO.exe

        Filesize

        1.5MB

        MD5

        cc8594dbaf16443f0d92fbdac4dc2797

        SHA1

        047e926a7d3e0e7a1fa6219af32b531ed3574487

        SHA256

        afeb1c6108ef4f2b241ffbdf0bd138ada0fb2af2381b068f2af397c761c76890

        SHA512

        e4a8390a60fd42f21ce89e79ec5bea6629359d2c4629810aec7069234f423058f8271b1d61d7342a623edca7a65abdda701149494709c88c8431a61c352d108e

      • C:\Program Files (x86)\letsvpn\app-3.10.2\LetsPRO.exe.config

        Filesize

        22KB

        MD5

        ebaeca4375f9cc819ff3835ba62717de

        SHA1

        819d4ad83729d709a3ed6172e2c608af70de3d03

        SHA256

        a12e73eb35a51a227afd1318edb824a77cbe60d2fbf67e1463404c0673e42d9c

        SHA512

        311d6aa1a8608b327bfa97cb77e4e21a44946438f60c6c2fc9e0bf9ef97434138d0136ca1d55c7d836d72a03cebec63beefd974219ab8ea580eddf3e23e76d3f

      • C:\Program Files (x86)\letsvpn\app-3.10.2\LetsVPNDomainModel.dll

        Filesize

        21KB

        MD5

        4aa9b59fc32caa6d74293cc4ff4234a9

        SHA1

        3ed90204d89217a19b1078eb8718202932f4282a

        SHA256

        2aa48a6078e2ef1c4954b507c3da13bea8ee3e4c38a4131621adf98fc8da265e

        SHA512

        dad298b8430ffcb3d7c44283f3b85892773a288eff1e071860839ed39725e8696f2dae6f9562377bddcdbcfde83f164fb753d36501e2b9c215d0fb2d93cb2ee2

      • C:\Program Files (x86)\letsvpn\app-3.10.2\Newtonsoft.Json.dll

        Filesize

        693KB

        MD5

        a051afcfeff1f630188c5785f7ea3273

        SHA1

        9312b0a42b4ffbdad365c4938a081c9abc870074

        SHA256

        97e46c96938851c462a59eaa43bca65ed3a0b0a385e2b87ae959acf3bfa6ba75

        SHA512

        0a4ba46ea22021f467e97a4f68dd1473187c7af213dda9f0a9fcb683891bb804b27b45d9760aa02a3ce8eb0287efa67b8b4690ce1908aab0004d548183015cb9

      • C:\Program Files (x86)\letsvpn\app-3.10.2\Utils.dll

        Filesize

        126KB

        MD5

        0b0e7270f14d5dec664787ef680ab980

        SHA1

        4c5c9f4385423d083d2693585056363853727ca0

        SHA256

        35288ce35fb77395a2f55244e30f7f8aa2131fa3ebac9c85ea58979e7276ec3e

        SHA512

        d45c34602a49c75e9f0beb4f473ebb851e17c1a342308984ecf5666be93d615f75655a0ea723aa4bd3fd24208e8ab384223f888a0f2baa9d36c96150098fd801

      • C:\Program Files (x86)\letsvpn\app-3.10.2\log4net.config

        Filesize

        3KB

        MD5

        28f9077c304d8c626554818a5b5f3b3a

        SHA1

        a01f735fe348383795d61aadd6aab0cc3a9db190

        SHA256

        746b5675ea85c21ef4fcc05e072383a7f83c5fe06aaa391fc3046f34b9817c90

        SHA512

        485c175bc13c64601b15243daecbf72621883c2ff294852c9bbb2681937f7ef0bea65361e0f83131ec989432326442ef387c1ccf2a7ca537c6788b8fd5c0021e

      • C:\Program Files (x86)\letsvpn\app-3.10.2\log4net.dll

        Filesize

        273KB

        MD5

        6c4e61362d16c7c0b3731b0e2a84f911

        SHA1

        3c89a13ab980e3d9ea515470c9d53bb30ac746cb

        SHA256

        5245b084cfd79eb3627caf4ddac63096ef89046093dcb0e00e2b96cf74c24fb6

        SHA512

        ac1a941200787971d154b99211fa5c7d7a3ba83132be505de2a7ea2682e8be87e668fb0264de94dc6cedce85750b214159c797ce5b1fcfde1e229875215ae458

      • C:\Program Files (x86)\letsvpn\driver\OemVista.inf

        Filesize

        7KB

        MD5

        26009f092ba352c1a64322268b47e0e3

        SHA1

        e1b2220cd8dcaef6f7411a527705bd90a5922099

        SHA256

        150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9

        SHA512

        c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363

      • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe

        Filesize

        99KB

        MD5

        1e3cf83b17891aee98c3e30012f0b034

        SHA1

        824f299e8efd95beca7dd531a1067bfd5f03b646

        SHA256

        9f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f

        SHA512

        fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b

      • C:\Program Files\InnovateGraciousSupplier\OqmnhpUgthmZ.exe

        Filesize

        2.9MB

        MD5

        c0332d95acdfc46fb60f3f1d9dd6b92d

        SHA1

        2863f05a42637d22a354e7c39cd17f8497c447ad

        SHA256

        0975d859e5a7b56faaf48ba8e50c800156b8cff927f3bd01f564aa6f18eac2e7

        SHA512

        7fdab98bdb7012cc87af60d3bbe1bfcd42ce536f75aca56981b1a2d7121bca7d9c8f5091fea7902a9e5c688c7d30613c3f99c07dc166faf58e6c230dac53d09d

      • C:\Program Files\InnovateGraciousSupplier\ckhjghacCGCf.exe

        Filesize

        577KB

        MD5

        11fa744ebf6a17d7dd3c58dc2603046d

        SHA1

        d99de792fd08db53bb552cd28f0080137274f897

        SHA256

        1b16c41ae39b679384b06f1492b587b650716430ff9c2e079dca2ad1f62c952d

        SHA512

        424196f2acf5b89807f4038683acc50e7604223fc630245af6bab0e0df923f8b1c49cb09ac709086568c214c3f53dcb7d6c32e8a54af222a3ff78cfab9c51670

      • C:\Program Files\InnovateGraciousSupplier\gAyPsguYXDsMcEThACGI

        Filesize

        2.1MB

        MD5

        6bb89d170132b6a2df5920a5243ed390

        SHA1

        94a1a99e6d0bfd8d4458daafe56b3f9e36caa18d

        SHA256

        1cf0546651767e50b1ccd478dffb5afd00ca9af6316ec3bc1349f0a2573bc070

        SHA512

        67bb4e5fafa4a95ada5f0df6c669f3bd85c5efd0446ae199f277d2f0075ec8e5c0b47fde4a84df2158eb49c198e1676143b91c888ddcc9f75055486c64f83070

      • C:\Program Files\InnovateGraciousSupplier\letsvpn.exe

        Filesize

        14.5MB

        MD5

        94f6bd702b7a2e17c45d16eaf7da0d64

        SHA1

        45f8c05851bcf16416e087253ce962b320e9db8a

        SHA256

        07f44325eab13b01d536a42e90a0247c6efecf23ccd4586309828aa814f5c776

        SHA512

        7ffc5183d3f1fb23e38c60d55724ab9e9e1e3832c9fb09296f0635f78d81477c6894c00a28e63096fa395e1c11cbeaa1f77f910f9ff9c1f1ecf0b857aa671b3d

      • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.exe

        Filesize

        832KB

        MD5

        d305d506c0095df8af223ac7d91ca327

        SHA1

        679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

        SHA256

        923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

        SHA512

        94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

      • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.wrapper.log

        Filesize

        831B

        MD5

        c11ec63d0bfb573e4abbd1b5fd0eeafd

        SHA1

        b2b76484db4057183b3c95227407811c8b80824d

        SHA256

        3e8d7234980baff4108a45b20694cfa5cf714b725b821b5181ecc3e962023aa8

        SHA512

        be6d993df99e226da2bc6751705e663f8e3c38c6db28e8ecfc01c83c98371499ce2f05dcd9da34dfca6baa40a78870002d45394f83fdd19009b52f040c67431b

      • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.wrapper.log

        Filesize

        294B

        MD5

        8c4aed848206255ddaa905091ff15eae

        SHA1

        8aec7fa58e5a8fe0b386ce8768d5fe81cedb3af4

        SHA256

        ad2a1c413fc49af6a964fa414c6c7f034d40701cd59bed7e6ddb34bbef223d9c

        SHA512

        7549832ba94047e4e371b0a443e7175660f893b76131d622838dcc615b0f68ff6aace31b46eb39e02833d1257f2189a4b26c730c0259b29df2b82f6bc920551c

      • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.wrapper.log

        Filesize

        464B

        MD5

        fe8932402d8d9b0b99f0b0b18ebdf019

        SHA1

        de78883798177c3567aeb8bfe7f59fc7016988c7

        SHA256

        c89ccea7622249bdbac57da9476e6c8ef55d872b05820e5c867883cbb298bfa3

        SHA512

        e90c3601ce985a41feee4aba3766200ad0fed7737c291e71768ff3e820884bf0942216c462f3675e2372a7eb9096616655f7c561a4f6d6c396ea283851ac3ad0

      • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.wrapper.log

        Filesize

        528B

        MD5

        244352a9e179d643c944ffc807c0f46d

        SHA1

        a6cc23179d6274a2095a9c7a732764ed8b1c425f

        SHA256

        03514bfba85de6bbad8ca847988b315bb280a71408a21e27e5d0ded1c50d921c

        SHA512

        e784eb892b5873ad78a304d8e65cae4ac939bcae73caeb6d1469c1f65fdddccbc6a250285620dd59a68c1a396aef1716815fe75a058e0cc16dea8975fcf65fb6

      • C:\Program Files\InnovateGraciousSupplier\xPKoYjAvcnvH.xml

        Filesize

        456B

        MD5

        4a0662c093559ef4a0a36a7ea203b449

        SHA1

        790de7e00830c00edb86d1e58bd8e2f4fea14b28

        SHA256

        07883d6864252d25a20e729b9d4dfa3d7f48b5efaf20acfe0efe23824827e68e

        SHA512

        697604a80208c61493c97d81893323e8517c740b3dd2780e57b00ca37d663faedfd9f14f08d966139d2769af4f7813811fe329bcb358ec8094f2c43bda504540

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        1KB

        MD5

        33b19d75aa77114216dbc23f43b195e3

        SHA1

        36a6c3975e619e0c5232aa4f5b7dc1fec9525535

        SHA256

        b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

        SHA512

        676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        11KB

        MD5

        c066d5070ebb837c1c93ad427f33513b

        SHA1

        e2eec1af262bf8fb08d78fe0f7147f8d67ae3fd6

        SHA256

        463625a370edfe0cf6ac3b46ab713ecec42892380b6d7e0a2ed73eb2fed9d3c7

        SHA512

        b45c251701561b799cd2e1e379ccee4aea0b341cf1de47c05d56c82332f031293f418ab01449001f5d84bc1351e4ff050793323cdd85a804855469bc718db36d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qk0pqaar.dit.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\nsyF4C1.tmp\System.dll

        Filesize

        11KB

        MD5

        75ed96254fbf894e42058062b4b4f0d1

        SHA1

        996503f1383b49021eb3427bc28d13b5bbd11977

        SHA256

        a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

        SHA512

        58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

      • C:\Users\Admin\AppData\Local\Temp\nsyF4C1.tmp\modern-wizard.bmp

        Filesize

        51KB

        MD5

        7f8e1969b0874c8fb9ab44fc36575380

        SHA1

        3057c9ce90a23d29f7d0854472f9f44e87b0f09a

        SHA256

        076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd

        SHA512

        7aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555

      • C:\Users\Admin\AppData\Local\Temp\nsyF4C1.tmp\nsDialogs.dll

        Filesize

        9KB

        MD5

        ca95c9da8cef7062813b989ab9486201

        SHA1

        c555af25df3de51aa18d487d47408d5245dba2d1

        SHA256

        feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be

        SHA512

        a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9

      • C:\Users\Admin\AppData\Local\Temp\nsyF4C1.tmp\nsExec.dll

        Filesize

        6KB

        MD5

        3d366250fcf8b755fce575c75f8c79e4

        SHA1

        2ebac7df78154738d41aac8e27d7a0e482845c57

        SHA256

        8bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6

        SHA512

        67d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094

      • C:\Windows\Installer\e57e6d6.msi

        Filesize

        31.4MB

        MD5

        44e80380964f2ccbc6bc7b14ad4ffd3f

        SHA1

        c1b9a5cf8b8b63860fab7b3e8094fb0f58892596

        SHA256

        5f523ca858a54f437a676f1b03682fb73fb2c02c388e38214c3a306fb11bf395

        SHA512

        93a9935aa0b14b99b8d74ecc9870a782907afd540a21759f56cc837fab72b33ce5386b7c6623987596fad15594848e47da36efed60d1553a566e2bc54c90647d

      • C:\Windows\System32\DriverStore\Temp\{911e8228-effe-b943-a212-2fc3e2913ff5}\tap0901.sys

        Filesize

        38KB

        MD5

        c10ccdec5d7af458e726a51bb3cdc732

        SHA1

        0553aab8c2106abb4120353360d747b0a2b4c94f

        SHA256

        589c5667b1602837205da8ea8e92fe13f8c36048b293df931c99b39641052253

        SHA512

        7437c12ae5b31e389de3053a55996e7a0d30689c6e0d10bde28f1fbf55cee42e65aa441b7b82448334e725c0899384dee2645ce5c311f3a3cfc68e42ad046981

      • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\xPKoYjAvcnvH.exe.log

        Filesize

        1KB

        MD5

        122cf3c4f3452a55a92edee78316e071

        SHA1

        f2caa36d483076c92d17224cf92e260516b3cbbf

        SHA256

        42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

        SHA512

        c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

      • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

        Filesize

        24.1MB

        MD5

        498cd00af4158d887a260f5cb7d93183

        SHA1

        525e71046b5f20250b29f3d05537c302d0966567

        SHA256

        54190d20fb4e39f75f91a410dbb952353021942e567972b0b0e322c1eb7a0065

        SHA512

        0a09421efbeef59e19980c8cc571312c0ae47a5c83eae445e9f77b8c8d7dc49831aca3c6f7c52180807f010e8608676321da6d054a4a46151739ff9a3353c05d

      • \??\Volume{ff55cfe6-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{45be2ef3-3b5c-4069-a3bf-11c0a4126402}_OnDiskSnapshotProp

        Filesize

        6KB

        MD5

        7acf497de03e4db0b867fea96d5c52ca

        SHA1

        0438b859a7c0f07bd4c6b4d6bd07e1742259b52f

        SHA256

        db2acd4b9cca93c859335ea5a97b4cbf7068665a4454b054393e17793c8094fb

        SHA512

        19dbb9c4fb57607f03f206040f1f98b241ceb9e64051da3f08a4fe040b3accd6e2ce90f8ad45a5d74e9ac6a125b1fa5d482c453005c31516eff91daa7cb94a61

      • \??\c:\program files (x86)\letsvpn\driver\tap0901.cat

        Filesize

        10KB

        MD5

        f73ac62e8df97faf3fc8d83e7f71bf3f

        SHA1

        619a6e8f7a9803a4c71f73060649903606beaf4e

        SHA256

        cc74cdb88c198eb00aef4caa20bf1fda9256917713a916e6b94435cd4dcb7f7b

        SHA512

        f81f5757e0e449ad66a632299bcbe268ed02df61333a304dccafb76b2ad26baf1a09e7f837762ee4780afb47d90a09bf07cb5b8b519c6fb231b54fa4fbe17ffe

      • memory/1060-560-0x000000006FC80000-0x000000006FCCC000-memory.dmp

        Filesize

        304KB

      • memory/1060-582-0x0000000007720000-0x000000000773A000-memory.dmp

        Filesize

        104KB

      • memory/1060-570-0x0000000006620000-0x000000000663E000-memory.dmp

        Filesize

        120KB

      • memory/1060-571-0x00000000072D0000-0x0000000007373000-memory.dmp

        Filesize

        652KB

      • memory/1060-551-0x0000000005AD0000-0x0000000005E24000-memory.dmp

        Filesize

        3.3MB

      • memory/1060-556-0x0000000006660000-0x00000000066AC000-memory.dmp

        Filesize

        304KB

      • memory/1060-576-0x0000000007400000-0x000000000741A000-memory.dmp

        Filesize

        104KB

      • memory/1060-575-0x0000000007A20000-0x000000000809A000-memory.dmp

        Filesize

        6.5MB

      • memory/1060-577-0x0000000007450000-0x000000000745A000-memory.dmp

        Filesize

        40KB

      • memory/1060-578-0x0000000007680000-0x0000000007716000-memory.dmp

        Filesize

        600KB

      • memory/1060-579-0x00000000075E0000-0x00000000075F1000-memory.dmp

        Filesize

        68KB

      • memory/1060-580-0x0000000007610000-0x000000000761E000-memory.dmp

        Filesize

        56KB

      • memory/1060-581-0x0000000007620000-0x0000000007634000-memory.dmp

        Filesize

        80KB

      • memory/1060-559-0x00000000066E0000-0x0000000006712000-memory.dmp

        Filesize

        200KB

      • memory/1060-583-0x0000000007660000-0x0000000007668000-memory.dmp

        Filesize

        32KB

      • memory/1588-573-0x000000002B3B0000-0x000000002B56D000-memory.dmp

        Filesize

        1.7MB

      • memory/1588-574-0x000000002B3B0000-0x000000002B56D000-memory.dmp

        Filesize

        1.7MB

      • memory/1588-106-0x0000000009770000-0x00000000097B5000-memory.dmp

        Filesize

        276KB

      • memory/1588-558-0x000000002B3B0000-0x000000002B56D000-memory.dmp

        Filesize

        1.7MB

      • memory/1588-584-0x000000002B3B0000-0x000000002B56D000-memory.dmp

        Filesize

        1.7MB

      • memory/1800-56-0x0000000006310000-0x0000000006376000-memory.dmp

        Filesize

        408KB

      • memory/1800-71-0x0000000006960000-0x000000000697E000-memory.dmp

        Filesize

        120KB

      • memory/1800-55-0x00000000062A0000-0x0000000006306000-memory.dmp

        Filesize

        408KB

      • memory/1800-66-0x0000000006380000-0x00000000066D4000-memory.dmp

        Filesize

        3.3MB

      • memory/1800-72-0x0000000006990000-0x00000000069DC000-memory.dmp

        Filesize

        304KB

      • memory/1800-54-0x00000000059B0000-0x00000000059D2000-memory.dmp

        Filesize

        136KB

      • memory/1800-52-0x0000000005A40000-0x0000000006068000-memory.dmp

        Filesize

        6.2MB

      • memory/1800-50-0x0000000005380000-0x00000000053B6000-memory.dmp

        Filesize

        216KB

      • memory/2252-710-0x0000000005B70000-0x0000000005B92000-memory.dmp

        Filesize

        136KB

      • memory/2252-744-0x0000000035F70000-0x0000000036514000-memory.dmp

        Filesize

        5.6MB

      • memory/2252-698-0x0000000004F60000-0x0000000004FA6000-memory.dmp

        Filesize

        280KB

      • memory/2252-694-0x0000000004B20000-0x0000000004B44000-memory.dmp

        Filesize

        144KB

      • memory/2252-707-0x0000000005260000-0x0000000005312000-memory.dmp

        Filesize

        712KB

      • memory/2252-708-0x0000000005320000-0x0000000005674000-memory.dmp

        Filesize

        3.3MB

      • memory/2252-690-0x00000000001A0000-0x0000000000324000-memory.dmp

        Filesize

        1.5MB

      • memory/2252-709-0x0000000005DE0000-0x000000000630C000-memory.dmp

        Filesize

        5.2MB

      • memory/2252-811-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-713-0x0000000005D00000-0x0000000005D1A000-memory.dmp

        Filesize

        104KB

      • memory/2252-712-0x0000000005CE0000-0x0000000005CFE000-memory.dmp

        Filesize

        120KB

      • memory/2252-714-0x0000000005D40000-0x0000000005D4A000-memory.dmp

        Filesize

        40KB

      • memory/2252-717-0x0000000005D50000-0x0000000005D5A000-memory.dmp

        Filesize

        40KB

      • memory/2252-716-0x0000000005D30000-0x0000000005D38000-memory.dmp

        Filesize

        32KB

      • memory/2252-715-0x0000000005D80000-0x0000000005DA6000-memory.dmp

        Filesize

        152KB

      • memory/2252-718-0x0000000005D70000-0x0000000005D7A000-memory.dmp

        Filesize

        40KB

      • memory/2252-719-0x000000002F740000-0x000000002F74A000-memory.dmp

        Filesize

        40KB

      • memory/2252-720-0x000000002F780000-0x000000002F7A6000-memory.dmp

        Filesize

        152KB

      • memory/2252-721-0x000000002F750000-0x000000002F760000-memory.dmp

        Filesize

        64KB

      • memory/2252-724-0x0000000030590000-0x0000000030622000-memory.dmp

        Filesize

        584KB

      • memory/2252-725-0x0000000034470000-0x0000000034478000-memory.dmp

        Filesize

        32KB

      • memory/2252-726-0x0000000034400000-0x0000000034438000-memory.dmp

        Filesize

        224KB

      • memory/2252-727-0x00000000343E0000-0x00000000343EE000-memory.dmp

        Filesize

        56KB

      • memory/2252-736-0x0000000035200000-0x0000000035212000-memory.dmp

        Filesize

        72KB

      • memory/2252-740-0x0000000033E70000-0x0000000033E8E000-memory.dmp

        Filesize

        120KB

      • memory/2252-702-0x0000000004B00000-0x0000000004B0A000-memory.dmp

        Filesize

        40KB

      • memory/2252-748-0x0000000035710000-0x0000000035722000-memory.dmp

        Filesize

        72KB

      • memory/2252-749-0x0000000035730000-0x0000000035744000-memory.dmp

        Filesize

        80KB

      • memory/2252-747-0x0000000034C30000-0x0000000034C38000-memory.dmp

        Filesize

        32KB

      • memory/2252-750-0x0000000034B60000-0x0000000034B68000-memory.dmp

        Filesize

        32KB

      • memory/2252-753-0x0000000034C20000-0x0000000034C30000-memory.dmp

        Filesize

        64KB

      • memory/2252-754-0x0000000035770000-0x0000000035786000-memory.dmp

        Filesize

        88KB

      • memory/2252-755-0x0000000035750000-0x0000000035760000-memory.dmp

        Filesize

        64KB

      • memory/2252-765-0x0000000036D70000-0x0000000036DBA000-memory.dmp

        Filesize

        296KB

      • memory/2252-766-0x0000000030810000-0x000000003085C000-memory.dmp

        Filesize

        304KB

      • memory/2252-776-0x0000000037980000-0x0000000037A23000-memory.dmp

        Filesize

        652KB

      • memory/2252-777-0x0000000037A50000-0x0000000037A61000-memory.dmp

        Filesize

        68KB

      • memory/2252-778-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-779-0x00000000391A0000-0x0000000039326000-memory.dmp

        Filesize

        1.5MB

      • memory/2252-784-0x0000000039110000-0x0000000039186000-memory.dmp

        Filesize

        472KB

      • memory/2252-796-0x00000000371C0000-0x00000000371F2000-memory.dmp

        Filesize

        200KB

      • memory/2252-797-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-803-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-804-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-805-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-807-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-808-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-809-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/2252-810-0x000000006C1E0000-0x000000006CC48000-memory.dmp

        Filesize

        10.4MB

      • memory/4888-67-0x0000000000DB0000-0x0000000000E86000-memory.dmp

        Filesize

        856KB