Overview
overview
8Static
static
3f80bc12ffe...51.exe
windows7-x64
8f80bc12ffe...51.exe
windows10-2004-x64
8kcinst.exe
windows7-x64
1kcinst.exe
windows10-2004-x64
1kcinst32.dll
windows7-x64
1kcinst32.dll
windows10-2004-x64
1letsvpn-latest.exe
windows7-x64
8letsvpn-latest.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3driver/tap0901.sys
windows10-2004-x64
1driver/tapinstall.exe
windows7-x64
1driver/tapinstall.exe
windows10-2004-x64
1libCLI.dll
windows7-x64
1libCLI.dll
windows10-2004-x64
1msvcp140.dll
windows7-x64
1msvcp140.dll
windows10-2004-x64
1vcruntime140.dll
windows7-x64
1vcruntime140.dll
windows10-2004-x64
1vcruntime140_1.dll
windows7-x64
1vcruntime140_1.dll
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
f80bc12ffee2539f5827757dc8052decbbd795e604a58d8c83ae357cf5055151.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f80bc12ffee2539f5827757dc8052decbbd795e604a58d8c83ae357cf5055151.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kcinst.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
kcinst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
kcinst32.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
kcinst32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
letsvpn-latest.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
letsvpn-latest.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
driver/tap0901.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
driver/tapinstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
driver/tapinstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
libCLI.dll
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
libCLI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
msvcp140.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
msvcp140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
vcruntime140.dll
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
vcruntime140.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
vcruntime140_1.dll
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
vcruntime140_1.dll
Resource
win10v2004-20241007-en
General
-
Target
letsvpn-latest.exe
-
Size
14.7MB
-
MD5
e039e221b48fc7c02517d127e158b89f
-
SHA1
79eed88061472ae590616556f31576ca13bfc7fb
-
SHA256
dc30e5dab15392627d30a506f6304030c581fc00716703fc31add10ff263d70b
-
SHA512
87231c025bb94771e89a639c9cb1528763f096059f8806227b8ab45a8f1ea5cd3d94fdc91cb20dd140b91a14904653517f7b6673a142a864a58a2726d14ae4b8
-
SSDEEP
393216:3Ie8M7oB2JNBXx9PMkglRy3mtFFu9zDVKZpw:3Rh8B2vB2c+kZD
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET73E8.tmp DrvInst.exe File created C:\Windows\system32\DRIVERS\SET73E8.tmp DrvInst.exe File opened for modification C:\Windows\system32\DRIVERS\tap0901.sys DrvInst.exe -
Modifies Windows Firewall 2 TTPs 5 IoCs
pid Process 2580 netsh.exe 1752 netsh.exe 896 netsh.exe 1808 netsh.exe 1620 netsh.exe -
Executes dropped EXE 5 IoCs
pid Process 536 tapinstall.exe 2340 tapinstall.exe 2436 tapinstall.exe 3036 LetsPRO.exe 2396 LetsPRO.exe -
Loads dropped DLL 64 IoCs
pid Process 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 2528 letsvpn-latest.exe 3036 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\LetsPRO = "\"C:\\Program Files (x86)\\letsvpn\\app-3.11.2\\LetsPRO.exe\" /silent" LetsPRO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 1940 cmd.exe 2216 ARP.EXE -
Drops file in System32 directory 21 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\SET39D6.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\SET39D7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstor.dat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat tapinstall.exe File created C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\SET39D5.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\tap0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\INFCACHE.0 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\SET39D7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\SET39D6.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\SET39D5.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Memory.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Globalization.Calendars.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Xml.XmlDocument.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Net.NameResolution.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Xml.XDocument.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\ko\System.Web.Services.Description.resources.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\DeltaCompressionDotNet.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\LetsVPNInfraStructure.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Buffers.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Collections.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Web.WebView2.WinForms.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Linq.Queryable.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.SecureString.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\WpfAnimatedGif.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Net.Requests.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\runtimes letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\log4net.config letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Collections.Specialized.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Reflection.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\x64 letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\zh-Hans\System.Web.Services.Description.resources.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Resources.ResourceManager.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\SQLite-net.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\SQLitePCLRaw.provider.dynamic_cdecl.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Data.Odbc.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Globalization.Extensions.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Web.WebView2.Core.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.FileSystem.AccessControl.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.Pipes.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.Cryptography.Pkcs.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\microsoft.identitymodel.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Mono.Cecil.Pdb.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Net.Http.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Xml.XDocument.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.CodeDom.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Reflection.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Runtime.Serialization.Formatters.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\de\System.Web.Services.Description.resources.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Expression.Interactions.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Data.OleDb.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Drawing.Primitives.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\WebSocket4Net.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\es letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Net.WebSockets.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Text.Encoding.CodePages.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Xml.XmlDocument.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\log4net.config letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.ServiceProcess.ServiceController.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\zh-MO letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2 letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Web.WebView2.WinForms.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\NuGet.Squirrel.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.ServiceModel.Security.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Collections.Concurrent.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.Security.Claims.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\cs\System.Web.Services.Description.resources.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Mono.Cecil.Mdb.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\System.IO.Compression.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Log\20241119.log LetsPRO.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\FontAwesome.WPF.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\MdXaml.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\System.Threading.Tasks.Parallel.dll letsvpn-latest.exe File created C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Web.WebView2.Core.dll letsvpn-latest.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.11.2\Microsoft.Win32.Registry.AccessControl.dll letsvpn-latest.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev2 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.app.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe -
pid Process 1660 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ROUTE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn-latest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2268 ipconfig.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\sstpsvc.dll,-203 = "Allows you to securely connect to a private network using the Internet." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@netcfgx.dll,-50002 = "Allows your computer to access resources on a Microsoft network." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\rascfg.dll,-32010 = "Provides the abilitiy to connect a host to a Remote Access Concentrator that supports RFC2516." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 LetsPRO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\CA\Certificates\329B78A5C9EBC2043242DE90CE1B7C6B1BA6C692\Blob = 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 LetsPRO.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\SystemCertificates\CA\Certificates\329B78A5C9EBC2043242DE90CE1B7C6B1BA6C692 LetsPRO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 LetsPRO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1660 powershell.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 1660 powershell.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeRestorePrivilege 628 rundll32.exe Token: SeBackupPrivilege 2540 vssvc.exe Token: SeRestorePrivilege 2540 vssvc.exe Token: SeAuditPrivilege 2540 vssvc.exe Token: SeBackupPrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2036 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2884 DrvInst.exe Token: SeLoadDriverPrivilege 2884 DrvInst.exe Token: SeLoadDriverPrivilege 2884 DrvInst.exe Token: SeLoadDriverPrivilege 2884 DrvInst.exe Token: SeRestorePrivilege 2340 tapinstall.exe Token: SeLoadDriverPrivilege 2340 tapinstall.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeRestorePrivilege 804 DrvInst.exe Token: SeLoadDriverPrivilege 804 DrvInst.exe Token: SeDebugPrivilege 2396 LetsPRO.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe 2396 LetsPRO.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1660 2528 letsvpn-latest.exe 31 PID 2528 wrote to memory of 1660 2528 letsvpn-latest.exe 31 PID 2528 wrote to memory of 1660 2528 letsvpn-latest.exe 31 PID 2528 wrote to memory of 1660 2528 letsvpn-latest.exe 31 PID 2528 wrote to memory of 536 2528 letsvpn-latest.exe 33 PID 2528 wrote to memory of 536 2528 letsvpn-latest.exe 33 PID 2528 wrote to memory of 536 2528 letsvpn-latest.exe 33 PID 2528 wrote to memory of 536 2528 letsvpn-latest.exe 33 PID 2528 wrote to memory of 2340 2528 letsvpn-latest.exe 35 PID 2528 wrote to memory of 2340 2528 letsvpn-latest.exe 35 PID 2528 wrote to memory of 2340 2528 letsvpn-latest.exe 35 PID 2528 wrote to memory of 2340 2528 letsvpn-latest.exe 35 PID 2036 wrote to memory of 628 2036 DrvInst.exe 39 PID 2036 wrote to memory of 628 2036 DrvInst.exe 39 PID 2036 wrote to memory of 628 2036 DrvInst.exe 39 PID 2528 wrote to memory of 1312 2528 letsvpn-latest.exe 44 PID 2528 wrote to memory of 1312 2528 letsvpn-latest.exe 44 PID 2528 wrote to memory of 1312 2528 letsvpn-latest.exe 44 PID 2528 wrote to memory of 1312 2528 letsvpn-latest.exe 44 PID 1312 wrote to memory of 2580 1312 cmd.exe 46 PID 1312 wrote to memory of 2580 1312 cmd.exe 46 PID 1312 wrote to memory of 2580 1312 cmd.exe 46 PID 1312 wrote to memory of 2580 1312 cmd.exe 46 PID 2528 wrote to memory of 444 2528 letsvpn-latest.exe 47 PID 2528 wrote to memory of 444 2528 letsvpn-latest.exe 47 PID 2528 wrote to memory of 444 2528 letsvpn-latest.exe 47 PID 2528 wrote to memory of 444 2528 letsvpn-latest.exe 47 PID 444 wrote to memory of 1752 444 cmd.exe 49 PID 444 wrote to memory of 1752 444 cmd.exe 49 PID 444 wrote to memory of 1752 444 cmd.exe 49 PID 444 wrote to memory of 1752 444 cmd.exe 49 PID 2528 wrote to memory of 1636 2528 letsvpn-latest.exe 50 PID 2528 wrote to memory of 1636 2528 letsvpn-latest.exe 50 PID 2528 wrote to memory of 1636 2528 letsvpn-latest.exe 50 PID 2528 wrote to memory of 1636 2528 letsvpn-latest.exe 50 PID 1636 wrote to memory of 896 1636 cmd.exe 52 PID 1636 wrote to memory of 896 1636 cmd.exe 52 PID 1636 wrote to memory of 896 1636 cmd.exe 52 PID 1636 wrote to memory of 896 1636 cmd.exe 52 PID 2528 wrote to memory of 1360 2528 letsvpn-latest.exe 53 PID 2528 wrote to memory of 1360 2528 letsvpn-latest.exe 53 PID 2528 wrote to memory of 1360 2528 letsvpn-latest.exe 53 PID 2528 wrote to memory of 1360 2528 letsvpn-latest.exe 53 PID 1360 wrote to memory of 1808 1360 cmd.exe 55 PID 1360 wrote to memory of 1808 1360 cmd.exe 55 PID 1360 wrote to memory of 1808 1360 cmd.exe 55 PID 1360 wrote to memory of 1808 1360 cmd.exe 55 PID 2528 wrote to memory of 1932 2528 letsvpn-latest.exe 56 PID 2528 wrote to memory of 1932 2528 letsvpn-latest.exe 56 PID 2528 wrote to memory of 1932 2528 letsvpn-latest.exe 56 PID 2528 wrote to memory of 1932 2528 letsvpn-latest.exe 56 PID 1932 wrote to memory of 1620 1932 cmd.exe 58 PID 1932 wrote to memory of 1620 1932 cmd.exe 58 PID 1932 wrote to memory of 1620 1932 cmd.exe 58 PID 1932 wrote to memory of 1620 1932 cmd.exe 58 PID 2528 wrote to memory of 2436 2528 letsvpn-latest.exe 59 PID 2528 wrote to memory of 2436 2528 letsvpn-latest.exe 59 PID 2528 wrote to memory of 2436 2528 letsvpn-latest.exe 59 PID 2528 wrote to memory of 2436 2528 letsvpn-latest.exe 59 PID 2528 wrote to memory of 3036 2528 letsvpn-latest.exe 61 PID 2528 wrote to memory of 3036 2528 letsvpn-latest.exe 61 PID 2528 wrote to memory of 3036 2528 letsvpn-latest.exe 61 PID 2528 wrote to memory of 3036 2528 letsvpn-latest.exe 61 PID 2528 wrote to memory of 3036 2528 letsvpn-latest.exe 61 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exe"C:\Users\Admin\AppData\Local\Temp\letsvpn-latest.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09012⤵
- Executes dropped EXE
PID:536
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap09012⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets.exe3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO.exe3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsVPN2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsVPN3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1620
-
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09012⤵
- Executes dropped EXE
PID:2436
-
-
C:\Program Files (x86)\letsvpn\LetsPRO.exe"C:\Program Files (x86)\letsvpn\LetsPRO.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe"C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2396 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ipconfig /all4⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2268
-
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C netsh interface ipv4 set interface LetsTAP metric=14⤵
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\netsh.exenetsh interface ipv4 set interface LetsTAP metric=15⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C route print4⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\ROUTE.EXEroute print5⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C arp -a4⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\ARP.EXEarp -a5⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2216
-
-
-
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{635a9352-376b-1169-84f0-5c419150086f}\oemvista.inf" "9" "6d14a44ff" "00000000000002F8" "WinSta0\Default" "000000000000058C" "208" "c:\program files (x86)\letsvpn\driver"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{1a3410b2-6351-0add-525c-e30d77b2001e} Global\{31318b47-f695-6fdb-3062-927fbd0b1e00} C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{6a6daa9c-0e0f-7e6e-9680-b046d3ce6c12}\tap0901.cat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E0" "00000000000005DC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:tap0901.NTamd64:tap0901.ndi:9.24.6.601:tap0901" "6d14a44ff" "00000000000002F8" "0000000000000580" "00000000000005DC"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:804
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD5143351606a574d84328219a7c18c7219
SHA18e47c7b530f40553f4a88daff11d78255cc77730
SHA256cbe3b5714c52ad9ff8885d9893c9ed77ad54485a7c5bae3a75151c06d3ae7c4f
SHA512b4698855a37639cac6dd4c400d11028bba1433f43e811e23881a72f7875048c77cf0dbd8bab8c0374ae7182fe41f37f69f5942d770fbbead86b12805b6647291
-
Filesize
1.5MB
MD5ca72f8ead2ae568acc481f685385fb60
SHA1887a1d53c8b61c81a80592ff62cf9cdf56b29d18
SHA256d287af28a137d9c015531eae28815d2b0d0a53879318f104ef34e5d86e2c4618
SHA5128da648e1363d490d6a4ee5ec9e38aec86384f345ae5fd58150b2affce8c3c208e1a55598cfe820d00e9448910598ffde29d2824275ebaafaa7d33279898a2e4c
-
Filesize
26KB
MD56126a1ab971d6bd4761f45791af90b1e
SHA136013821807f6fe08fe3b60a22ec519fd3e5579c
SHA2569b7b7ec30f305b3cd9da40662f95ed57ae89ed8afd2b11d26503e387ff3c262d
SHA5129f74f9f4ad593980337099717ba1e6b584530ee0e192b137297961d1550a70ae3a30fc1bf3e6e670fb817682354648d610f2a542b753a61f397ccaca20908510
-
Filesize
693KB
MD533a3c1df70cfab1888a4b20565515f81
SHA1c1bfab7454dda45074a6e2b9ae4e9a2712830af6
SHA2560c3c293507c487b76021baaded76defb0fecaf01c1327a448a9b756987595a9e
SHA51276d3e0c34c5e793283910f93af3693355abdd374cf50234496cf3bbebf82a381113fbb4d53ad469f2f5a001b2cb96c761310a3825f8973ae61a4e8b59061cb28
-
Filesize
138KB
MD52b370cc14974e2c9955a2a3bdb5cb78a
SHA198878fb3998e492cf964a2e2af2ca187372ce5b5
SHA256334ed3950898aa1f1a62a15bc411972246ab59498ecc9418f75695a2c1a5ba71
SHA512f5c06d3f184baa1d7a6c9ebff9c5f5bbe87f61318710b0b19a81ce2fa26d3fabfd2af504d558c8b35a81e4c0846325260a2a425f2f68fde2b075addecadacb3d
-
Filesize
21KB
MD52a27f887342305cecd5ba36c8dbd4267
SHA12ca43487e37a67824b071d2870765f26c33ef7f2
SHA25626a04bc90979886d477bb9777545e75a65c5f67443fdb5185c2fea249afc882b
SHA5128d25ed902e2ca4191118b75cae0ea6338d0ce6aac3d10c08288e802704a115b15988a764899f3368aca0e7798933c5d4925721d82d7a7228372f435a36e1eafe
-
Filesize
126KB
MD58af72dc9783c52125e229f8b79afba94
SHA171178bc7cfced6bc5dcb45ed666cdbe2c55182dd
SHA25668ae722154cebfb3a3ca59b135e182a68fa0d6966a089008028f97022849bbc5
SHA512dcada700522b78fe0006e84c6599a9857269512eb65a68c0475635f76d5805c43decad74232eb39dae83f987b3dabafe07129d44cce950c8dc9efd11901599e2
-
Filesize
1KB
MD57a7521bc7f838610905ce0286324ce39
SHA18ab90dd0c4b6edb79a6af2233340d0f59e9ac195
SHA2562a322178557c88cc3c608101e8fc84bfd2f8fa9b81483a443bb3d09779de218d
SHA512b25dfdce0977eaf7159df5eabe4b147a6c0adac39c84d1c7a9fe748446a10c8d2e20d04cf36221057aa210633df65f2a460821c8c79a2db16c912ec53a714d83
-
Filesize
273KB
MD55b9a663d7584d8e605b0c39031ec485a
SHA1b7d86ebe4e18cb6d2a48a1c97ac6f7e39c8a9b91
SHA256e45afce6eff080d568e3e059498f5768585143336c600011273366905f4fc635
SHA512b02bd950384cf3d656c4b8f590013392e3028c6183aa9321bd91b6fc1f5d41b03771313ca5e3305398a60642fa14fc5a98daf3e6decba586c80861bafcbf0c64
-
Filesize
7KB
MD526009f092ba352c1a64322268b47e0e3
SHA1e1b2220cd8dcaef6f7411a527705bd90a5922099
SHA256150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9
SHA512c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807eed6e883120aef50abac5e1655d99
SHA1a748f92757f3b001e744243eb451de14f987697d
SHA2568c5a0e1d7cd979a7d2cc1ab32b57714f681c23476d757d47eba791d04aa0d730
SHA512d8e5cd6e0a57d15e1179d90ab7a6f7106097dd266bbcb5c8492acc9efcf64a9a7ab89be5a952d2393f67ee355be12b90ecadf65403d16f84c1060957cd58b483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f19d3f6273a950cef6cb7a976e7616e
SHA1ae269d70fae78d8decc7154f99c1afef8469c3e4
SHA2567c144537e2d197064a110ed68772e41e8b67740213daf59bb656eb2015fc02fb
SHA512c28cab854bfc8201ac8361f3a008ff89c535297fcbb0585167fc0d7d9f5168070802c93f17cea66de6c759ede4308162f7783ad9e179d168ba00918963a2afc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8fd51ec573f62942cab45f8ea19a8b
SHA1f13a01f973ce03f70e0ea48c2c0dddb1fbbc92f2
SHA25630e48fc832ec95196ada77dc28be76495b475811694704b0e04bd5065e63c2e7
SHA5124b4bcc5a87b00eededa3f6b073d00241f850c08461863b9bfdf5e63952ea15ad8da30f87a614fa1fda0601501325dbe4fd6f689d8369678e70fa1d291c46c3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5dafe533a69c37dc4b25404d3e14d3
SHA1ca86d12219e4b8e2d3b049f13a0eea0358640b31
SHA2566f20fee7d36c6c84672172e31ea555263230ee178a934e8a9a44cd030eaf83c5
SHA5126e6170006ffac7a1832c362e2712db7b49578f5912252fa5e23873fd92bb29c4bf7759b721835176dc3dbb88e6a28bfaaa088fc17de1c8b51048d89b977dced0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c49d4431f76b30b3c0c971a7a3f9df
SHA10d18646ffe03a2156c352fc3eb320f41ca57d525
SHA2564d6458016043015a7978faa7a3743e3f28c0675fffbb1671a8ef6fcf402c3644
SHA51248aec743ca6df6e7449e48d6524e29d7e4d315916c54f058f88be7c6c05f6ae9cbb9bc8d1dd71c25d70b7023f9862f039dcc8b274d487b2f6bca458607b03809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6fa2019a19a334841b2b8bbb4620e3
SHA11cedc3ac4c9c71e53d5cf54041278c04872a2fbf
SHA256ae2ecfa6459fc8d885944de84963600766dd88072a182b751d7670105222a651
SHA512e6f6d272f14e19842357a6767e89340217a45b89ccd1363ce0c5f21943fb924c78b8ea43a08283f59ee7c3ead4740dfd48847ee96d0f110d537aa9805a6227fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d2a9dff1457a78f6479dc994070a00e
SHA155d12f62478bc0fb89f3c75c23f34bb0362a0cf9
SHA256b8cf39b0667be812f3ff20379b53d184974e1828b6a66c42f08216e07902dfed
SHA5128ac45f32b4de843e2fbaa491e4e7c568d9936f1d727c448b9ae35f5b0c12ed784c3b2914bea141a3e2910abbf49540537a2f9bacbd85d3c1f5d9282ec43ae047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf4bf6381181c11ea50f882f163af56
SHA15c876d50193028a00c374db4787a9979b169caf0
SHA256052d53a0d22680c5adc7206f0b2ea37a0af4a4a5a876219b4bb8d5499027f243
SHA5129031b4a73022e7638aed14a2f636438b8ceb176616f1549c1f460e38c2686b7103c835aa48b1d7902633bc315c9ea4b2180f640063e4ddc3b154c8b1faf99067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5eb2f1a788a074d0e86b1e0c74d475210
SHA124946d1c75eeaa480b74cdd4e92ff6be0744615b
SHA25635f9cb6ff58e025551ea986635f614ab921b8495527127226384d33e40e18710
SHA512d76b4d1f2154dbf79866ab000ef88d4647b8b2567a5a8dff8227c40b1b1be8be7688cd603732720f2db07a2e3dda7b19e7199a9b4725a5f0c7078e5b49bf7e73
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
51KB
MD57f8e1969b0874c8fb9ab44fc36575380
SHA13057c9ce90a23d29f7d0854472f9f44e87b0f09a
SHA256076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd
SHA5127aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555
-
C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF
Filesize8KB
MD567023792e331e20fc525a3d71eb70077
SHA19e1b1516880688ae06902cf806019a9568943dc2
SHA2569e3fcba7f5b295ea5565505585c7c502733fc3078a2b9ff6b801907fd0371eef
SHA5123fae720c760f7e8d6c2b87c65c90b3e6bf95f7011bc7112c8e05eb458ae15d26e04737c0ac1eae8cf13c9d1e55fbe670c20dceea763cbb79e3612b86a47ddb11
-
Filesize
1.4MB
MD549a68e43469f0ed4c6bb3dd1f0f17f43
SHA183b8692aab790b65d2d392719779d0da496b80bb
SHA2566848c0ed3e96eb47ad811f5a30226da09e2737db05bcd948f146cd322e78c9cd
SHA512eba9a1c135db9ca90f0cf182a17161db036b6cc2c007a7dab69228d16e08c36d3262e5904a72c15e57194b9f7a1ef595350e21e4795cefc532934eb80231801e
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
8KB
MD586d3f5482f300c663af73274167b30c5
SHA1e4c305c6ca508c2e13b2e176fc8a9e2eb2b95b35
SHA25699563b7ee71c13e741b4e441c3cef85303f3b0f9008427f6bc755d91ee3d165f
SHA51247704644aea3b9ca98a526d44f392ab436d21d068a67f090765a45222cf6905ac03ba19a05f2139193cb329965850131e4273bced4cfde9c709b7f4ba2d4bc44
-
Filesize
30KB
MD5b1c405ed0434695d6fc893c0ae94770c
SHA179ecacd11a5f2b7e2d3f0461eef97b7b91181c46
SHA2564c474ea37a98899e2997591a5e963f10f7d89d620c74c8ee099d3490f5213246
SHA512635421879cd4c7c069489033afaf7db1641615bfd84e237264acfe3f2d67668ecfe8a9b9edd0e9d35b44dec7d6ba0197ed7048dfb8ec3dba87ccdc88be9acfb7
-
Filesize
9KB
MD54fee2548578cd9f1719f84d2cb456dbf
SHA13070ed53d0e9c965bf1ffea82c259567a51f5d5f
SHA256baecd78253fb6fbcfb521131e3570bf655aa9a05bb5610ce8bb4bddccf599b24
SHA5126bc0c8c3757d1e226218a9485a4f9cdbae7ca40b56c35b9ff28c373be9bd6fbd7b1846ddf5680edb2e910d31912791afe2f9f2207b3880b56adb55426fc3fd49
-
Filesize
240KB
MD5bd8643e5db648810348aa0755e455b70
SHA1119cb1fb3057d9759d0abb3dfdafc460456c1cc4
SHA256bec6a116ea2224dd1532c6eaf20e4d61199240e55ccd0270199fbd22f2806477
SHA512b8033d8989c66431e1771ffc6d2549a4d1e32b8612b7331e7a2931ddad3e31c8a7e1af8ef129883034b1fcf466b8ad0e1cab431cbf5c20c724f4eef53468f714
-
Filesize
20KB
MD585bee1626071af1b07e79fc7963731e4
SHA1d804e63940798891928f3ba29be85cf06fbb9769
SHA256222f84cd3111f90b7ce045119e63678ee180ab0a7c4f48cae25f097ee425debe
SHA5126649931736a607dceea5ec8180e07c14c331761a7dd0fa5ab4187d3302c0a51262ccce40024d6540f3453d8bdd43785c5f8d45e9c5252e097b69b30fced78832
-
Filesize
99KB
MD51e3cf83b17891aee98c3e30012f0b034
SHA1824f299e8efd95beca7dd531a1067bfd5f03b646
SHA2569f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f
SHA512fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
9KB
MD5b7d61f3f56abf7b7ff0d4e7da3ad783d
SHA115ab5219c0e77fd9652bc62ff390b8e6846c8e3e
SHA25689a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912
SHA5126467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a