Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 01:31

General

  • Target

    7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe

  • Size

    15.8MB

  • MD5

    db5818c5d7a25382f53f6f961b5d04f5

  • SHA1

    fe5f8cfd8adf3297a2dd883951ed84af9058721d

  • SHA256

    7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9

  • SHA512

    1b1e3b124dba5666b3e04942b8306836b608fc639664538b70f937b4af6f0473a7d9c9e0fc6565eabc2c24e2d139171c9c227f9c648d464b8c0c346b4f899a21

  • SSDEEP

    393216:SpNtz8jMP3N9X4VPpiFPXyK3q3kwaQNnMykEOSc:S3Z3P3N9X24Xlq3xBMz

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Modifies Windows Firewall 2 TTPs 5 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Drops file in System32 directory 22 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 38 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 9 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 63 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
    "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Local\Temp\is-VOC1A.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VOC1A.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp" /SL5="$40016,16129897,161280,C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:484
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\SysWOW64\timeout.exe
          timeout /T 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2552
        • C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
          "C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2776
          • C:\Users\Admin\AppData\Local\Temp\is-UEUKF.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-UEUKF.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp" /SL5="$401B6,16129897,161280,C:\Users\Admin\AppData\Local\Temp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe" /VERYSILENT /SUPPRESSMSGBOXES
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2840
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\xIdr.exe
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2664
              • C:\Users\Public\Documents\xIdr.exe
                C:\Users\Public\Documents\xIdr.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2676
                • C:\Users\Admin\AppData\Local\Temp\is-RBPCK.tmp\xIdr.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-RBPCK.tmp\xIdr.tmp" /SL5="$401EA,450511,141312,C:\Users\Public\Documents\xIdr.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2624
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /C timeout /T 3 & "C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES
                    9⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:2240
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /T 3
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Delays execution with timeout.exe
                      PID:2848
                    • C:\Users\Public\Documents\xIdr.exe
                      "C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2996
                      • C:\Users\Admin\AppData\Local\Temp\is-4TE3M.tmp\xIdr.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-4TE3M.tmp\xIdr.tmp" /SL5="$40162,450511,141312,C:\Users\Public\Documents\xIdr.exe" /VERYSILENT /SUPPRESSMSGBOXES
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        PID:2732
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "regsvr32.exe" /s /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
                          12⤵
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:2028
                          • C:\Windows\system32\regsvr32.exe
                            /s /i:360 C:\Users\Admin\AppData\Roaming\Setup_Lock.dll
                            13⤵
                            • Loads dropped DLL
                            PID:2492
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\XkcY.exe
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3044
              • C:\Users\Public\Documents\XkcY.exe
                C:\Users\Public\Documents\XkcY.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2696
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"
                  8⤵
                  • Drops file in System32 directory
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1952
                • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
                  "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
                  8⤵
                  • Executes dropped EXE
                  PID:1800
                • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
                  "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap0901
                  8⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Modifies system certificate store
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1732
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=lets
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2316
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=lets
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:864
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=lets.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2568
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=lets.exe
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2740
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2784
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=LetsPRO.exe
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2724
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=LetsPRO
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2248
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=LetsPRO
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2648
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh advfirewall firewall Delete rule name=LetsVPN
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2032
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall Delete rule name=LetsVPN
                    9⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1416
                • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe
                  "C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap0901
                  8⤵
                  • Executes dropped EXE
                  PID:2468
                • C:\Program Files (x86)\letsvpn\LetsPRO.exe
                  "C:\Program Files (x86)\letsvpn\LetsPRO.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:832
                  • C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe
                    "C:\Program Files (x86)\letsvpn\app-3.11.2\LetsPRO.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2236
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C ipconfig /all
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2776
                      • C:\Windows\SysWOW64\ipconfig.exe
                        ipconfig /all
                        11⤵
                        • System Location Discovery: System Language Discovery
                        • Gathers network information
                        PID:2796
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C netsh interface ipv4 set interface LetsTAP metric=1
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:3064
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh interface ipv4 set interface LetsTAP metric=1
                        11⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:2640
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C route print
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:276
                      • C:\Windows\SysWOW64\ROUTE.EXE
                        route print
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:372
                    • C:\Windows\SysWOW64\netsh.exe
                      C:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no
                      10⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2676
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd.exe" /C arp -a
                      10⤵
                      • Network Service Discovery
                      • System Location Discovery: System Language Discovery
                      PID:2024
                      • C:\Windows\SysWOW64\ARP.EXE
                        arp -a
                        11⤵
                        • Network Service Discovery
                        • System Location Discovery: System Language Discovery
                        PID:2240
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{734e8506-952a-50f1-ebbf-420a991e3133}\oemvista.inf" "9" "6d14a44ff" "000000000000049C" "WinSta0\Default" "00000000000003A4" "208" "c:\program files (x86)\letsvpn\driver"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2180
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{714e07f1-39c2-6420-0e9a-156b1df3567a} Global\{31b1b15d-9797-1ae1-a4c4-681f28c3405a} C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{0756fec3-0380-39f7-63f5-dc12a591a358}\tap0901.cat
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2992
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2848
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003DC" "00000000000003C0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1700
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:tap0901.NTamd64:tap0901.ndi:9.24.6.601:tap0901" "6d14a44ff" "000000000000049C" "00000000000005D8" "00000000000005E8"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:1972
  • C:\Windows\system32\wbem\WmiApSrv.exe
    C:\Windows\system32\wbem\WmiApSrv.exe
    1⤵
      PID:656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\letsvpn\driver\OemVista.inf

      Filesize

      7KB

      MD5

      26009f092ba352c1a64322268b47e0e3

      SHA1

      e1b2220cd8dcaef6f7411a527705bd90a5922099

      SHA256

      150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9

      SHA512

      c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363

    • C:\Program Files (x86)\letsvpn\driver\tapinstall.exe

      Filesize

      99KB

      MD5

      1e3cf83b17891aee98c3e30012f0b034

      SHA1

      824f299e8efd95beca7dd531a1067bfd5f03b646

      SHA256

      9f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f

      SHA512

      fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      0e3aa4367eb540422637ee99aef91296

      SHA1

      fca332adddeb31b1abb93d9bdbbf956a9765480e

      SHA256

      ac6bb859893baad2a3c4ea03975cbf61d838eb42f4dbd3f0c0253884b82ff57c

      SHA512

      b9c060dae7ecf45b57ccbc7ba414288a13cdb0a73fc63fea452fd0ee2d39b98b85b16ace02159b559bb9bccc3d24299596951c678d3f7d4f536b15d3acba2d63

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d39d336c3ad22975be11294af439512d

      SHA1

      f1345c824c8721e7e5a4dc56362ae428653f4025

      SHA256

      ce05fde84989bada20a27a3563e1a78b23faa1c25f1edc6392e8fb813fe4f8d8

      SHA512

      6d52243edd1e7bb5d6fae0def24fa91b42d0fbcaf82bfe37da2d16b4c932156a41b99d29b988ffbf0633a8536b546da0ac1eb488c5d0363d5661dbd8811d68c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      45878297bfdab9d5d21433dbb91fa632

      SHA1

      0860963fbde6fdac213233b9abaf32aeb50b575e

      SHA256

      92dc95daf42ea72247ae53725bc66ecafb99a8b0089c4daffe238e4d07c2c0da

      SHA512

      951606e1fd3868259f0f5d68092b2fb477bc5463cf85cf3738e58533365e0752c2daaa9ed78ee436f3b2ed9615bdd7f9dc46385ba7e8b1bb53b2e19dd611288c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ea632892603c191571ca326e535d5be4

      SHA1

      e3727d8212ca4481778d46c14624d04555af219f

      SHA256

      14b6adf040fc64b368559ffa75ff29ad587420fe62021f7a68b376247b7ca391

      SHA512

      9706cab8ec82c4a04820de64bb5a5d31e6ee41092950452430a277af1f476b8b664c243283b12f5b5e670d819ecdf5476458f5f2bc6ba041c0075178d7582ae3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      04fee1fe88a532e1c3d7f0f320aa47b8

      SHA1

      0aaf1b99f75f3777dbf2214755aabf6275cc2bef

      SHA256

      050cba6f61d4e7016696146b85d74cf75e83985c212b5920336669475fb1159c

      SHA512

      68fa6019901340e5bca1fa52f2988dba986aca818aa81238d0b5bbf372a01d81c314db0821686cb77786dfb240ee783d2acb487e6acc740901c2f93cc893e8dc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1460dee9070d05fedc1c380cc54c0cfa

      SHA1

      458af3246aab0e17ba3a3013cb18a00ddada5c8a

      SHA256

      5d12f639b5cd8dd37ba6b77fc3aaf02823d610424a4f7bbffff839cf4d820899

      SHA512

      8e90ae3ab99a8a36e65e537719f2b2d601fed3160fcd7a27ff73e743ab4a31099f9d91f855ccf2ee5b704738aa356bc6298fbaa1a96a19c1d444434fe1b0d21f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4fc0fe861e08d09ade304dccad4c7f01

      SHA1

      1de6b99dc6ff5d741b6a73f1f83203409eaa0d79

      SHA256

      68e7116fbb0810a04ace293ebdef423dc81075603abf5027dccef43f48323801

      SHA512

      4610eae3470fc7c5f768eec5b22c6a392e18858c1b4cae14d2dfb949a93a4d7449cc37bf7d47ac01aa7e2e046bd683bc16b5370a6dbf39c47d4175acf838cb5c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fad7178dc49630a115002e6ac8349ba6

      SHA1

      67bf5ee8a07fd858d80e629a948584ffe6da9bf1

      SHA256

      61a330e60fa680b4a3ba4d02b885f046ca95b80dc23dd91a9e8c9c062d3f06f7

      SHA512

      bed0926f6e8eaa64118e7067c01f9f841779e42f4aca1fca63693a19e286e8e81a2fea58506745f2b914aa1936b56f51eca000dd5ebbc129ea7aa3fc14d98cae

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      d9879b43c8c6f3a221f8dee9e698a5c8

      SHA1

      09b874d298411034ecc81e948bdf1f7d5128182f

      SHA256

      14b5615e8c7ae0e969b2915145ae5eca209c8221e12bcb8f1172e4def62edd3f

      SHA512

      14a7df3fc2e606825de95e1ca1f6c2a05547e07721a924ad2e71e5a2fda589fe269b90f8d0b4ee1a92b0ab514c1d6a5bd80287ebeb74248241886643f794bb0d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      759b1c135d62eb5f8af994d962b87d9b

      SHA1

      c9465d0b7b7b113bd6320b84b751498e45912eec

      SHA256

      e129e23311e176a606b22b246787be3a6216021cdbf7301c2b09076290d723f4

      SHA512

      b24c0188d03540a88af4f2a0a75d36a2644ef6ab8fc12b9eaf442ac459a260d5964ebe52f3de4e7637be687fea69f2e2441126f9788de9c09f77130a72046b74

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      27eefd76583132d943f8efcc411b3cd4

      SHA1

      164542b1cc2a2238c05a34731a18c7588ee9ee18

      SHA256

      9d4ea927620e47648742683c727d4392b29a2522a1136a38267d0c7e6380bb77

      SHA512

      462114a87d6d56db376c6f952317d0185969b25eef305ca7e0ccd932075738ad1e2c040e6f39320072e0795eb2e561c6e95c9c4cf0031c9cb1cbe0f6b4ad91cd

    • C:\Users\Admin\AppData\Local\Temp\Cab320A.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar321D.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\nstF854.tmp\modern-wizard.bmp

      Filesize

      51KB

      MD5

      7f8e1969b0874c8fb9ab44fc36575380

      SHA1

      3057c9ce90a23d29f7d0854472f9f44e87b0f09a

      SHA256

      076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd

      SHA512

      7aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555

    • C:\Users\Admin\AppData\Local\unins000.dat

      Filesize

      3KB

      MD5

      29c0f406102b94c5d38e25c9943d9985

      SHA1

      f9073df4cadcc70e896becfccbbc159fccc8196a

      SHA256

      911c6c2c49838dc11f9d10512e9df1d60483b78ca6a164987a2f572be4b8f732

      SHA512

      8413f042bdff6dc16c18e498ac7168b6efb318721eba720a6c2bd6cabae421439dc27e9e06d37d57ccb8c699a08f13e909bd9fbc20fa3230954cbc577737b709

    • C:\Users\Admin\AppData\Local\unins000.exe

      Filesize

      1.1MB

      MD5

      2c8dc574be7d1f780d42a2a9b8360c66

      SHA1

      fbae754f9ff7ea7caa528900f186cc6e49ef1609

      SHA256

      26db8da9a1921abec961ed77d4713389901a3cfe97dd420283bb679c5b537b2d

      SHA512

      a33c66e7729dc913d5089e2569f7b7e649bf6b11895bbccc88c95666c6e18e0ce09a66ef57434f3470014166bb2c6e1f5e1de2d830722642078c8db335e34495

    • C:\Users\Admin\AppData\Roaming\Setup_Lock.dll

      Filesize

      722KB

      MD5

      8227e4c7968f31debf26e01c5b3373ea

      SHA1

      da4a3634918d45a3c076dece82534425914763ea

      SHA256

      c180b6566c67983b6b065010f2ee50a594e532777cbb509ffaebec037d6dfa18

      SHA512

      4b03e9b40b4720208359b93ef350f1dbd56b368938c9673f035f7f5e76ff622d4eafdcf6205907ef0855d27debd063e82f51f448a2b2c1a8d548b3455d539332

    • C:\Users\Public\Documents\XkcY.exe

      Filesize

      14.7MB

      MD5

      e039e221b48fc7c02517d127e158b89f

      SHA1

      79eed88061472ae590616556f31576ca13bfc7fb

      SHA256

      dc30e5dab15392627d30a506f6304030c581fc00716703fc31add10ff263d70b

      SHA512

      87231c025bb94771e89a639c9cb1528763f096059f8806227b8ab45a8f1ea5cd3d94fdc91cb20dd140b91a14904653517f7b6673a142a864a58a2726d14ae4b8

    • C:\Users\Public\Documents\xIdr.exe

      Filesize

      810KB

      MD5

      293b0b9d1f227d92c2d7eec2f24ad24d

      SHA1

      65ba68759577ba15279e3934a50ca2e1fa31797f

      SHA256

      f30e5bbafa334ed502d1db1085a0033e74649b7ed1d3caaf719e4e0d80513498

      SHA512

      e08c30e52faf5cce75e3095b5dc805f083e330b71d7a03af4d6b365877aeded6ac827a53232d82e25e809b991ec7a2f17fd3d3367d747936cfcb57cb8540475f

    • C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF

      Filesize

      8KB

      MD5

      2147c28db2b267f312c89b0a6a71e037

      SHA1

      a0cd14bcf1e7d07372f297aa7a5c1fd15296aae3

      SHA256

      85147e629a379822a85ba3c3877284bb92335271365cae8e919436e1efd47b3f

      SHA512

      f35e3a80b11cbc7330894b0d17f04593487a3fb72df8463f26f2a92fe7454837b1d3f5f9cb59016cc618801d17a3614d37346abe33e3551bfe4424e505c23b6d

    • C:\Windows\System32\DriverStore\INFCACHE.1

      Filesize

      1.4MB

      MD5

      f376c949b09e2a2afe5368104e6d0751

      SHA1

      ad705348227b4eb2d514b66fc7eda1a962b613a0

      SHA256

      f2a52d4ab3330cb90579dd3e6fd5d3a86de3326f1820ac83c164671926c06e28

      SHA512

      174db21dae1258d06cf4fbcbd4c69406d4548dbe92600e42c0c89b3dace06fff8e7b9aca890d78537eb64eca6c38ac10cb629825fe7daff1c2a6f8d4d4fe9f99

    • C:\Windows\Temp\Cab3390.tmp

      Filesize

      29KB

      MD5

      d59a6b36c5a94916241a3ead50222b6f

      SHA1

      e274e9486d318c383bc4b9812844ba56f0cff3c6

      SHA256

      a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

      SHA512

      17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

    • C:\Windows\Temp\Tar33A3.tmp

      Filesize

      81KB

      MD5

      b13f51572f55a2d31ed9f266d581e9ea

      SHA1

      7eef3111b878e159e520f34410ad87adecf0ca92

      SHA256

      725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

      SHA512

      f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

    • C:\Windows\inf\oem2.PNF

      Filesize

      8KB

      MD5

      c7f9fa536ee6239aef93a6f130effb78

      SHA1

      031bdc2bac5bbd97c02fc865c4717430c72e15c4

      SHA256

      feb2374060b716b99cc68df0fad211992b440a79c3aa4a3cd24f2e5a063c80f7

      SHA512

      1af79157b73a4205ad000aa0ca28e51b18c48c336ff8a8065c9bec2bcacb250e3f1376f68a60a417b2f68dc9cfe6b84c5af005dc9413986d6a9fb03b67320a38

    • \??\c:\PROGRA~2\letsvpn\driver\tap0901.sys

      Filesize

      30KB

      MD5

      b1c405ed0434695d6fc893c0ae94770c

      SHA1

      79ecacd11a5f2b7e2d3f0461eef97b7b91181c46

      SHA256

      4c474ea37a98899e2997591a5e963f10f7d89d620c74c8ee099d3490f5213246

      SHA512

      635421879cd4c7c069489033afaf7db1641615bfd84e237264acfe3f2d67668ecfe8a9b9edd0e9d35b44dec7d6ba0197ed7048dfb8ec3dba87ccdc88be9acfb7

    • \??\c:\program files (x86)\letsvpn\driver\tap0901.cat

      Filesize

      9KB

      MD5

      4fee2548578cd9f1719f84d2cb456dbf

      SHA1

      3070ed53d0e9c965bf1ffea82c259567a51f5d5f

      SHA256

      baecd78253fb6fbcfb521131e3570bf655aa9a05bb5610ce8bb4bddccf599b24

      SHA512

      6bc0c8c3757d1e226218a9485a4f9cdbae7ca40b56c35b9ff28c373be9bd6fbd7b1846ddf5680edb2e910d31912791afe2f9f2207b3880b56adb55426fc3fd49

    • \Program Files (x86)\letsvpn\LetsPRO.exe

      Filesize

      240KB

      MD5

      bd8643e5db648810348aa0755e455b70

      SHA1

      119cb1fb3057d9759d0abb3dfdafc460456c1cc4

      SHA256

      bec6a116ea2224dd1532c6eaf20e4d61199240e55ccd0270199fbd22f2806477

      SHA512

      b8033d8989c66431e1771ffc6d2549a4d1e32b8612b7331e7a2931ddad3e31c8a7e1af8ef129883034b1fcf466b8ad0e1cab431cbf5c20c724f4eef53468f714

    • \Users\Admin\AppData\Local\Temp\is-RBPCK.tmp\xIdr.tmp

      Filesize

      1.1MB

      MD5

      8fdc58c7d4c59472615682d6dea9d190

      SHA1

      8e131fe09fd238493719b4fd92e6c833bf3596c1

      SHA256

      26a5be637ee680b1ec11d1adf2fd0972cc52078cbd200d9273f8bb826707c83b

      SHA512

      b05b9fd8ff3d627b562cbd2968466fb54adbc2fa5591ebe803300a3c5ef7887bc1761d8013b47aab0f5387265c8b7b15078a01abb75d4c3180671780181ebe24

    • \Users\Admin\AppData\Local\Temp\is-TSDNR.tmp\_isetup\_shfoldr.dll

      Filesize

      22KB

      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Local\Temp\is-VOC1A.tmp\7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.tmp

      Filesize

      1.1MB

      MD5

      070f66d3e84cd5ecccbb772fcf8e7811

      SHA1

      bc9c66bbe77da53a8d57ad9e41fd92936e892937

      SHA256

      b61184c727ecfeed0d77a237872ba282a544e15cfc54c28f420f06a5abea55db

      SHA512

      aa0803ae82c115b28e5965b1c3387580b833330db03fe69778d1f5680948bb5369d48336ed2e016a279ddfd239a39ea17922e66a017858f128d9f4aa4a9bbdcf

    • \Users\Admin\AppData\Local\Temp\nstF854.tmp\System.dll

      Filesize

      12KB

      MD5

      192639861e3dc2dc5c08bb8f8c7260d5

      SHA1

      58d30e460609e22fa0098bc27d928b689ef9af78

      SHA256

      23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

      SHA512

      6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

    • \Users\Admin\AppData\Local\Temp\nstF854.tmp\nsDialogs.dll

      Filesize

      9KB

      MD5

      b7d61f3f56abf7b7ff0d4e7da3ad783d

      SHA1

      15ab5219c0e77fd9652bc62ff390b8e6846c8e3e

      SHA256

      89a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912

      SHA512

      6467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8

    • \Users\Admin\AppData\Local\Temp\nstF854.tmp\nsExec.dll

      Filesize

      7KB

      MD5

      11092c1d3fbb449a60695c44f9f3d183

      SHA1

      b89d614755f2e943df4d510d87a7fc1a3bcf5a33

      SHA256

      2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

      SHA512

      c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a

    • memory/484-41-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/484-8-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/1672-43-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1672-0-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1672-2-0x0000000000401000-0x0000000000417000-memory.dmp

      Filesize

      88KB

    • memory/1972-823-0x0000000000F90000-0x0000000000FB6000-memory.dmp

      Filesize

      152KB

    • memory/2236-1028-0x0000000005810000-0x000000000581A000-memory.dmp

      Filesize

      40KB

    • memory/2236-1026-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-871-0x00000000041D0000-0x00000000041EE000-memory.dmp

      Filesize

      120KB

    • memory/2236-872-0x0000000004290000-0x00000000042AA000-memory.dmp

      Filesize

      104KB

    • memory/2236-873-0x0000000004330000-0x000000000433A000-memory.dmp

      Filesize

      40KB

    • memory/2236-874-0x0000000004720000-0x0000000004746000-memory.dmp

      Filesize

      152KB

    • memory/2236-875-0x0000000002080000-0x0000000002088000-memory.dmp

      Filesize

      32KB

    • memory/2236-876-0x0000000004800000-0x000000000480A000-memory.dmp

      Filesize

      40KB

    • memory/2236-877-0x0000000004810000-0x000000000481A000-memory.dmp

      Filesize

      40KB

    • memory/2236-879-0x0000000004F80000-0x0000000004FA6000-memory.dmp

      Filesize

      152KB

    • memory/2236-880-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/2236-878-0x0000000004E60000-0x0000000004E6A000-memory.dmp

      Filesize

      40KB

    • memory/2236-881-0x0000000005810000-0x000000000581A000-memory.dmp

      Filesize

      40KB

    • memory/2236-882-0x0000000005810000-0x000000000581A000-memory.dmp

      Filesize

      40KB

    • memory/2236-869-0x0000000000700000-0x000000000070A000-memory.dmp

      Filesize

      40KB

    • memory/2236-1006-0x0000000006180000-0x0000000006192000-memory.dmp

      Filesize

      72KB

    • memory/2236-1008-0x000000000E920000-0x000000000E932000-memory.dmp

      Filesize

      72KB

    • memory/2236-1007-0x00000000061A0000-0x00000000061A8000-memory.dmp

      Filesize

      32KB

    • memory/2236-1010-0x000000000E9A0000-0x000000000E9A8000-memory.dmp

      Filesize

      32KB

    • memory/2236-1009-0x000000000E980000-0x000000000E994000-memory.dmp

      Filesize

      80KB

    • memory/2236-1011-0x000000000EAE0000-0x000000000EAFE000-memory.dmp

      Filesize

      120KB

    • memory/2236-1016-0x000000002F0B0000-0x000000002F0C0000-memory.dmp

      Filesize

      64KB

    • memory/2236-1019-0x000000002F220000-0x000000002F236000-memory.dmp

      Filesize

      88KB

    • memory/2236-1020-0x000000002F0D0000-0x000000002F0E0000-memory.dmp

      Filesize

      64KB

    • memory/2236-1021-0x0000000031EE0000-0x0000000031F3C000-memory.dmp

      Filesize

      368KB

    • memory/2236-870-0x0000000004AF0000-0x0000000004BA2000-memory.dmp

      Filesize

      712KB

    • memory/2236-1027-0x0000000005010000-0x0000000005042000-memory.dmp

      Filesize

      200KB

    • memory/2236-868-0x00000000006B0000-0x00000000006F6000-memory.dmp

      Filesize

      280KB

    • memory/2236-1029-0x000000002EDE0000-0x000000002EDF0000-memory.dmp

      Filesize

      64KB

    • memory/2236-1030-0x000000002FA40000-0x000000002FA7A000-memory.dmp

      Filesize

      232KB

    • memory/2236-1031-0x000000002EE00000-0x000000002EE10000-memory.dmp

      Filesize

      64KB

    • memory/2236-1032-0x000000002EE50000-0x000000002EE6E000-memory.dmp

      Filesize

      120KB

    • memory/2236-867-0x00000000005C0000-0x00000000005E4000-memory.dmp

      Filesize

      144KB

    • memory/2236-866-0x0000000000170000-0x00000000002F4000-memory.dmp

      Filesize

      1.5MB

    • memory/2236-1577-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1576-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1205-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1575-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1574-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1573-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1571-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1368-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2236-1567-0x000000006C110000-0x000000006CB78000-memory.dmp

      Filesize

      10.4MB

    • memory/2624-115-0x0000000000400000-0x0000000000528000-memory.dmp

      Filesize

      1.2MB

    • memory/2676-47-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2676-117-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2732-113-0x0000000000400000-0x0000000000528000-memory.dmp

      Filesize

      1.2MB

    • memory/2776-39-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2776-15-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/2840-38-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/2996-88-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/2996-114-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB