Analysis
-
max time kernel
151s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-02-2025 20:49
Static task
static1
Behavioral task
behavioral1
Sample
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
Resource
win10v2004-20250207-en
General
-
Target
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
-
Size
17.1MB
-
MD5
4ba81cd6a16ffd3bf5e0e7338df60a5f
-
SHA1
e92ec4e696661c50d2ccbe05e44d19c413f58d18
-
SHA256
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c
-
SHA512
3113b8c8eb65a3a927c10762d24fd871fa9ca29df2f5121272b6a8e46ec48a8cd1b6957ebfa4bc70084e68f14cf7eeb5f676c7d65672fe0aa0a4865a78c1c26c
-
SSDEEP
393216:/Fj0IBCLzNxfYrp0ei6EMF9AFulgy8k7JaajjfHnDY5Su:/FXBmNOrpHi6E0Uk7wSnk
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\SET730E.tmp DrvInst.exe File created C:\Windows\system32\DRIVERS\SET730E.tmp DrvInst.exe File opened for modification C:\Windows\system32\DRIVERS\tap0901.sys DrvInst.exe -
Modifies Windows Firewall 2 TTPs 5 IoCs
pid Process 1872 netsh.exe 2440 netsh.exe 1972 netsh.exe 2636 netsh.exe 1988 netsh.exe -
Executes dropped EXE 15 IoCs
pid Process 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 3012 ksUu.exe 1180 pHHY_506.exe 384 ksUu.tmp 2204 ksUu.exe 2916 ksUu.tmp 1020 msedgewebview2.exe 1376 tapinstall.exe 1740 tapinstall.exe 2156 tapinstall.exe 2996 LetsPRO.exe 264 LetsPRO.exe 628 LetsPRO.exe 984 LetsPRO.exe -
Loads dropped DLL 64 IoCs
pid Process 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 392 cmd.exe 636 cmd.exe 3012 ksUu.exe 384 ksUu.tmp 384 ksUu.tmp 384 ksUu.tmp 1180 pHHY_506.exe 2204 ksUu.exe 1180 pHHY_506.exe 2916 ksUu.tmp 2916 ksUu.tmp 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 2996 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 264 LetsPRO.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 628 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\LetsPRO = "\"C:\\Program Files (x86)\\letsvpn\\app-3.12.0\\LetsPRO.exe\" /silent" LetsPRO.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 2240 cmd.exe 2904 ARP.EXE -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\infpub.dat tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\SETF864.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\SETF865.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\SETF865.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstor.dat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF DrvInst.exe File created C:\Windows\System32\DriverStore\INFCACHE.0 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\SETF864.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\SETF853.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infstrng.dat tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\SETF853.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\infpub.dat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt tapinstall.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Drawing.Primitives.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.FileSystem.Primitives.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\ko pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\x86\WebView2Loader.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\Microsoft.Win32.Registry.AccessControl.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Runtime.InteropServices.RuntimeInformation.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\LetsPRO.exe.config pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Buffers.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.FileSystem.AccessControl.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Security.Permissions.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\MdXaml.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\ToastNotifications.Messages.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\x86 pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\x86\WebView2Loader.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Data.Common.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Diagnostics.StackTrace.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.FileSystem.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.Ports.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\Hardcodet.Wpf.TaskbarNotification.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Diagnostics.StackTrace.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.ServiceModel.Duplex.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.ServiceModel.NetTcp.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Runtime.Extensions.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Security.Cryptography.Csp.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Security.Permissions.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\Microsoft.AppCenter.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\Microsoft.Expression.Interactions.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.IsolatedStorage.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Runtime.CompilerServices.Unsafe.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Diagnostics.TraceSource.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Drawing.Common.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Security.Claims.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\LetsVPNInfraStructure.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\SharpCompress.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Configuration.ConfigurationManager.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Console.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Collections.NonGeneric.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Security.Cryptography.ProtectedData.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\MdXaml.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\SQLitePCLRaw.batteries_v2.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Globalization.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.IO.FileSystem.Primitives.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.ServiceModel.Syndication.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Text.Encoding.Extensions.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\pt-BR pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\DeltaCompressionDotNet.PatchApi.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Diagnostics.Tracing.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.ObjectModel.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Runtime.Handles.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\ja pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Net.Security.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Security.Cryptography.Cng.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Threading.Tasks.Extensions.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\it\System.Web.Services.Description.resources.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\x64 pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\zh-Hant\System.Web.Services.Description.resources.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Diagnostics.Contracts.dll pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\System.Net.WebSockets.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\System.Windows.Interactivity.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\netstandard.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\LetsPRO.exe.config pHHY_506.exe File opened for modification C:\Program Files (x86)\letsvpn\app-3.12.0\ToastNotifications.Messages.dll pHHY_506.exe File created C:\Program Files (x86)\letsvpn\app-3.12.0\fr\System.Web.Services.Description.resources.dll pHHY_506.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.ev2 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.app.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\INF\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksUu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pHHY_506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksUu.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksUu.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksUu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsPRO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ROUTE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARP.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1144 ipconfig.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@netcfgx.dll,-50003 = "Allows other computers to access resources on your computer using a Microsoft network." DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\sstpsvc.dll,-203 = "Allows you to securely connect to a private network using the Internet." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@netcfgx.dll,-50002 = "Allows your computer to access resources on a Microsoft network." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\lltdres.dll,-4 = "Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine network bandwidth." DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\rascfg.dll,-32008 = "Allows you to securely connect to a private network using the Internet." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\lltdres.dll,-3 = "Allows this PC to be discovered and located on the network." DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe -
Modifies system certificate store 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d43190000000100000010000000749966cecc95c1874194ca7203f9b6202000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2916 ksUu.tmp 2916 ksUu.tmp 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 1180 pHHY_506.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeRestorePrivilege 2976 rundll32.exe Token: SeBackupPrivilege 1176 vssvc.exe Token: SeRestorePrivilege 1176 vssvc.exe Token: SeAuditPrivilege 1176 vssvc.exe Token: SeBackupPrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 2688 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1812 DrvInst.exe Token: SeLoadDriverPrivilege 1812 DrvInst.exe Token: SeLoadDriverPrivilege 1812 DrvInst.exe Token: SeLoadDriverPrivilege 1812 DrvInst.exe Token: SeRestorePrivilege 1740 tapinstall.exe Token: SeLoadDriverPrivilege 1740 tapinstall.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeRestorePrivilege 1692 DrvInst.exe Token: SeLoadDriverPrivilege 1692 DrvInst.exe Token: SeDebugPrivilege 984 LetsPRO.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 2916 ksUu.tmp 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe 984 LetsPRO.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2888 wrote to memory of 2940 2888 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 30 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2940 wrote to memory of 2280 2940 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 31 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2280 wrote to memory of 2660 2280 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe 32 PID 2660 wrote to memory of 636 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 33 PID 2660 wrote to memory of 636 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 33 PID 2660 wrote to memory of 636 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 33 PID 2660 wrote to memory of 636 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 33 PID 2660 wrote to memory of 392 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 34 PID 2660 wrote to memory of 392 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 34 PID 2660 wrote to memory of 392 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 34 PID 2660 wrote to memory of 392 2660 683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp 34 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 392 wrote to memory of 3012 392 cmd.exe 37 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 636 wrote to memory of 1180 636 cmd.exe 38 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 3012 wrote to memory of 384 3012 ksUu.exe 39 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 384 wrote to memory of 2204 384 ksUu.tmp 40 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 PID 2204 wrote to memory of 2916 2204 ksUu.exe 41 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe"C:\Users\Admin\AppData\Local\Temp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\is-05SLK.tmp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp"C:\Users\Admin\AppData\Local\Temp\is-05SLK.tmp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp" /SL5="$60152,17513082,161280,C:\Users\Admin\AppData\Local\Temp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe"C:\Users\Admin\AppData\Local\Temp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe" /VERYSILENT3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\is-QRBH9.tmp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp"C:\Users\Admin\AppData\Local\Temp\is-QRBH9.tmp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp" /SL5="$70152,17513082,161280,C:\Users\Admin\AppData\Local\Temp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\pHHY_506.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Public\Documents\pHHY_506.exeC:\Users\Public\Documents\pHHY_506.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09017⤵
- Executes dropped EXE
PID:1376
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" install "C:\Program Files (x86)\letsvpn\driver\OemVista.inf" tap09017⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Program Files (x86)\letsvpn\driver\tapinstall.exe"C:\Program Files (x86)\letsvpn\driver\tapinstall.exe" findall tap09017⤵
- Executes dropped EXE
PID:2156
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets7⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=lets.exe7⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=lets.exe8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO.exe7⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO.exe8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsPRO7⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsPRO8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh advfirewall firewall Delete rule name=LetsVPN7⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall Delete rule name=LetsVPN8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2440
-
-
-
C:\Program Files (x86)\letsvpn\LetsPRO.exe"C:\Program Files (x86)\letsvpn\LetsPRO.exe" checkNetFramework7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Program Files (x86)\letsvpn\app-3.12.0\LetsPRO.exe"C:\Program Files (x86)\letsvpn\app-3.12.0\LetsPRO.exe" checkNetFramework8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Program Files (x86)\letsvpn\LetsPRO.exe"C:\Program Files (x86)\letsvpn\LetsPRO.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:628 -
C:\Program Files (x86)\letsvpn\app-3.12.0\LetsPRO.exe"C:\Program Files (x86)\letsvpn\app-3.12.0\LetsPRO.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:984 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C netsh interface ipv4 set interface LetsTAP metric=19⤵
- System Location Discovery: System Language Discovery
PID:664 -
C:\Windows\SysWOW64\netsh.exenetsh interface ipv4 set interface LetsTAP metric=110⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ipconfig /all9⤵
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all10⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:1144
-
-
-
C:\Windows\SysWOW64\netsh.exeC:\Windows\System32\netsh interface ipv4 set dnsservers \"LetsTAP\" source=dhcp validate=no9⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C route print9⤵
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\ROUTE.EXEroute print10⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C arp -a9⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\ARP.EXEarp -a10⤵
- Network Service Discovery
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Public\Documents\ksUu.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Public\Documents\ksUu.exeC:\Users\Public\Documents\ksUu.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\is-J1IG0.tmp\ksUu.tmp"C:\Users\Admin\AppData\Local\Temp\is-J1IG0.tmp\ksUu.tmp" /SL5="$50108,1610660,141312,C:\Users\Public\Documents\ksUu.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Public\Documents\ksUu.exe"C:\Users\Public\Documents\ksUu.exe" /VERYSILENT8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\is-4SHCJ.tmp\ksUu.tmp"C:\Users\Admin\AppData\Local\Temp\is-4SHCJ.tmp\ksUu.tmp" /SL5="$9011C,1610660,141312,C:\Users\Public\Documents\ksUu.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2916 -
C:\Users\Admin\AppData\Roaming\NVIDIA app\864\msedgewebview2.exe"C:\Users\Admin\AppData\Roaming\\NVIDIA app\\864\\msedgewebview2.exe"10⤵
- Executes dropped EXE
PID:1020
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0354c1bb-57cb-04a6-fcea-ba4afec8a85a}\oemvista.inf" "9" "6d14a44ff" "0000000000000544" "WinSta0\Default" "00000000000005EC" "208" "c:\program files (x86)\letsvpn\driver"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{2c98fec7-24fc-032b-1f23-2258d6fe7278} Global\{7d070c1c-231f-5822-c475-4108c29b7f15} C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{6ff82e95-7f61-0f26-3b40-a051415d085f}\tap0901.cat2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005F0" "00000000000005E8"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:tap0901.NTamd64:tap0901.ndi:9.24.6.601:tap0901" "6d14a44ff" "0000000000000544" "0000000000000574" "00000000000005F4"1⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD526009f092ba352c1a64322268b47e0e3
SHA1e1b2220cd8dcaef6f7411a527705bd90a5922099
SHA256150ef8eb07532146f833dc020c02238161043260b8a565c3cfcb2365bad980d9
SHA512c18111982ca233a7fc5d1e893f9bd8a3ed739756a47651e0638debb0704066af6b25942c7961cdeedf953a206eb159fe50e0e10055c40b68eb0d22f6064bb363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f494812121262df2161921cc3287b0
SHA1cbc3fe07d384c0918f7844db78f599f0cc4fa31f
SHA25645a3328d42bc46ae649feb939d5fe11dd5cce95b18cc4ce0d9642e34d12f1b57
SHA51247cc0c4670005a3585ef63922e072faaadf305a217ed3752bbc1004896cdcbe60f3febfd06ecd016f2acb35d5aebb465eba652df0904c4700eb15e70a9057ef8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2430e1feb2e6aaebfad2b0d81905b79
SHA143a3167b706102ad52b7f1f30cfa1ddcfba58ba6
SHA256746e07c1963c133e1f221794a6bfff758a55cf41e77b1c60c5430beefdea978c
SHA512a9641af73abfcc11833de24189866b3293837db8a797a5801731e25e58853980cafb1fd48d84f1938af298a253f3520cb74ad98aac906e744cdf326fccc32acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa95f55db40a868def62a679b1a9890
SHA1eca0ff77394b4f1d7c255406544fb1be1ec2d649
SHA25645af86cdfe90e9d6734ae1fc6515ece31750bc7228a434023b030dad25f1dd85
SHA512defbb1701fea6fc0d19098984c5d69487a443a6f564498ac4b298ddf38464b6858b3d44600f3d07c016b5fefe6528510eb490b8505b9f5bcd74144559e1b2115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257bfc90411c99c3b1d3212b6f0e4b44
SHA1686d7ff4f54abf3b32adc19d6bc9ff9010e95d57
SHA256b30cf5648192bd2a0d5a6444ad290096c3e3d35e94099c376b13e05c960fa51c
SHA512868eb1b196cf405acda55836213cdc8b2ecf5f4835934b87f0fa1a6f2032c8516b8273a12fad347e8002b2cb4a257953207d4b376e4f238b94c0c8a6b6e1fb83
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.1MB
MD58fdc58c7d4c59472615682d6dea9d190
SHA18e131fe09fd238493719b4fd92e6c833bf3596c1
SHA25626a5be637ee680b1ec11d1adf2fd0972cc52078cbd200d9273f8bb826707c83b
SHA512b05b9fd8ff3d627b562cbd2968466fb54adbc2fa5591ebe803300a3c5ef7887bc1761d8013b47aab0f5387265c8b7b15078a01abb75d4c3180671780181ebe24
-
Filesize
51KB
MD57f8e1969b0874c8fb9ab44fc36575380
SHA13057c9ce90a23d29f7d0854472f9f44e87b0f09a
SHA256076221b4527ff13c3e1557abbbd48b0cb8e5f7d724c6b9171c6aadadb80561dd
SHA5127aa65cfadc2738c0186ef459d0f5f7f770ba0f6da4ccd55a2ceca23627b7f13ba258136bab88f4eee5d9bb70ed0e8eb8ba8e1874b0280d2b08b69fc9bdd81555
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
3KB
MD52c5a716963c48dd7b81f0086ad681b0b
SHA1f864833bf1465b9bdf97f4dc9203e7e931481acf
SHA2565ac720c3c3690c66e512e98ef6d37cacd0211c215118a0f4b2c99a2b70bbc0d6
SHA512d587dc0e25255581969eb3fddd3f9cba11868b290cadb685c3638b603d66151c416f5c280b871ee3ce2708c1e1d1d5a784fd2728162e33e40cfa9bf6be3e0da8
-
Filesize
3.2MB
MD571fdf2d301949413f8b14e0f12c2e0f5
SHA1c57e8eff6bfc0be6420e97cfd6de895c937fd5b7
SHA2561e7e2c05c6c634aa7f11c8c217bf9c21fbe336f128d744fbaf3fc91d643925a0
SHA512752fe30b893a1e0a0fbd93fb91dceea2b88f5e1c067e8f780fbedcf1fd4a11ec1317d65bbc3c11086926a2d37a49e5f519c40f7d65dba335079dc2044dd53f58
-
Filesize
14.8MB
MD59f5f358aa1a85d222ad967f4538bc753
SHA1567404faec3641f4df889c2c92164cee92723741
SHA256eb11627e59757105bddb884540854d56b173fe42417878de4e7d246cac92c932
SHA512d5a4c4b343704b96c98183d13d90e37065c8be0d0ed053696fb28b5e29f1432175d5e9f63c2d2879c3eb3541e4822a64ae7bfa2230c0c00b5c3ada0a1ac82bed
-
C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_neutral_662fd96dfdced4ae\oemvista.PNF
Filesize8KB
MD539e5c57c35c7ef229e12ebca640c06b3
SHA1d6aefe0edf229eeffee9bdd1423726d4a6ffc3a6
SHA256479b9b5d7100cdb90f369502d01c7a18a831988312b36e2671169c79600116bd
SHA51248118e55e7aa6d1c69be80a73a06fc31a7ff45dbb942a7b2ea559af984e851ea92ea754a5e3a2f0afb4fbb714b2cfcf9077b42c81f55d2643b30d65f212474ff
-
Filesize
1.4MB
MD507e4e95821cf7cc2be6b801388bcefb5
SHA1830f844276b69531730a2a090000537e9e8c1d43
SHA2565059d284577859e374fa1a31c4c41bef9de2f0d7a35077d24ac224e6e54f31a9
SHA51217239ae105d17e7d7f900987f02811702ca0f9e2713d6fbf982819d54d8aff44caa96867611a6492e0ff1fd47a140a866457e80ce9cc223252bca83f76d827c7
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
8KB
MD5da76a3102f4c82c028653d84d4d58134
SHA18fa1da2e30216c3481d92df100fb280d7884a888
SHA256065c0c13edcc57123e5f63aaa86ceeb6328d3809757a395b8ec25d9007d6de57
SHA51250b87abb493bb04001ad8eef1cf31c81a17467dc9c4efcb70993b9a276896882eaeee86321025bd384139ee346b4253d9bf86bb1d85c6e80a47f4ab5dab0c18e
-
Filesize
30KB
MD5b1c405ed0434695d6fc893c0ae94770c
SHA179ecacd11a5f2b7e2d3f0461eef97b7b91181c46
SHA2564c474ea37a98899e2997591a5e963f10f7d89d620c74c8ee099d3490f5213246
SHA512635421879cd4c7c069489033afaf7db1641615bfd84e237264acfe3f2d67668ecfe8a9b9edd0e9d35b44dec7d6ba0197ed7048dfb8ec3dba87ccdc88be9acfb7
-
Filesize
9KB
MD54fee2548578cd9f1719f84d2cb456dbf
SHA13070ed53d0e9c965bf1ffea82c259567a51f5d5f
SHA256baecd78253fb6fbcfb521131e3570bf655aa9a05bb5610ce8bb4bddccf599b24
SHA5126bc0c8c3757d1e226218a9485a4f9cdbae7ca40b56c35b9ff28c373be9bd6fbd7b1846ddf5680edb2e910d31912791afe2f9f2207b3880b56adb55426fc3fd49
-
Filesize
242KB
MD53530cb1b45ff13ba4456e4ffbcae6379
SHA15be7b8e19418212a5a93e900c12830facfd6ba54
SHA256e0669b6312baaef6a3c86f3142b333eab48494511405398bb09cc464881a43c9
SHA51223baae23815fc946203be6d93cef84ff23fde8ed88017179c65b7de1f3b6114bc8343c277b8ae5a1d85aa59f25b5f146c1d827b7e4617bfd0aa0ff20359f49b5
-
Filesize
99KB
MD51e3cf83b17891aee98c3e30012f0b034
SHA1824f299e8efd95beca7dd531a1067bfd5f03b646
SHA2569f45a39015774eeaa2a6218793edc8e6273eb9f764f3aedee5cf9e9ccacdb53f
SHA512fa5cf687eefd7a85b60c32542f5cb3186e1e835c01063681204b195542105e8718da2f42f3e1f84df6b0d49d7eebad6cb9855666301e9a1c5573455e25138a8b
-
\Users\Admin\AppData\Local\Temp\is-05SLK.tmp\683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.tmp
Filesize1.1MB
MD5070f66d3e84cd5ecccbb772fcf8e7811
SHA1bc9c66bbe77da53a8d57ad9e41fd92936e892937
SHA256b61184c727ecfeed0d77a237872ba282a544e15cfc54c28f420f06a5abea55db
SHA512aa0803ae82c115b28e5965b1c3387580b833330db03fe69778d1f5680948bb5369d48336ed2e016a279ddfd239a39ea17922e66a017858f128d9f4aa4a9bbdcf
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
12KB
MD5192639861e3dc2dc5c08bb8f8c7260d5
SHA158d30e460609e22fa0098bc27d928b689ef9af78
SHA25623d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6
SHA5126e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc
-
Filesize
9KB
MD5b7d61f3f56abf7b7ff0d4e7da3ad783d
SHA115ab5219c0e77fd9652bc62ff390b8e6846c8e3e
SHA25689a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912
SHA5126467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
1.9MB
MD51f2be558a74cb83afab86147e70d87d6
SHA167aa1ef5fca4e3e720feb6080d0f1ac20b503b26
SHA2564ce381358bde90843640ac7cc0d59f4c4066adf1f26db2e6ba4130e9f72b6af8
SHA5125f8af4ea3bd3a5078b91d086ef1d4d1a9d88f2065621eb76ce21573e02144deab5f6e33d65a0525caff1387e5bbfa1ea4bb3f288e60045efcf7a82d5f57e87a9