Analysis
-
max time kernel
64s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 22:57
Behavioral task
behavioral1
Sample
vaultFile11006347749467126253.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
vaultFile11006347749467126253.exe
Resource
win10v2004-20241007-en
General
-
Target
vaultFile11006347749467126253.exe
-
Size
4.1MB
-
MD5
a9dd2982d7f123950a6865bd7b59906a
-
SHA1
1f258810190dca1cfcc34dc3adfb083255f23330
-
SHA256
92b303f29d883e414190f1263ea4ad7a6e556dfab7d3e0fd91bbae133c125a52
-
SHA512
f15472a17653c585f6b4bf4be097119be01b2c77ecefe8271fd8024ba3ab51962fef40f13f395b4db534420846e9e80f35e3c13116f580cf3908daa0fc70ba4e
-
SSDEEP
49152:XEBgnnvHwB+yswrZr8mm6LhL02F989+SwEIe9by/uMnoVedHqCchacRcHkAQ6TU:LnvC+GkAJqDJRMI
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca2-4.dat family_neshta behavioral2/files/0x0007000000023ca3-11.dat family_neshta behavioral2/memory/2140-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2672-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3232-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2180-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4524-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020378-52.dat family_neshta behavioral2/memory/4176-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000202b3-55.dat family_neshta behavioral2/files/0x000400000002036b-69.dat family_neshta behavioral2/files/0x000400000002037d-72.dat family_neshta behavioral2/files/0x0006000000020262-77.dat family_neshta behavioral2/memory/1528-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/64-89-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3176-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1964-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002033e-76.dat family_neshta behavioral2/memory/4476-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002026a-104.dat family_neshta behavioral2/memory/4488-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002150f-123.dat family_neshta behavioral2/files/0x000100000002260e-122.dat family_neshta behavioral2/files/0x00010000000202c9-68.dat family_neshta behavioral2/files/0x000100000002025a-66.dat family_neshta behavioral2/files/0x000400000002036a-65.dat family_neshta behavioral2/files/0x0006000000020247-64.dat family_neshta behavioral2/files/0x0001000000022fac-135.dat family_neshta behavioral2/files/0x0001000000022f6a-134.dat family_neshta behavioral2/files/0x00010000000167b7-145.dat family_neshta behavioral2/files/0x00010000000167d4-150.dat family_neshta behavioral2/files/0x000100000001dbea-164.dat family_neshta behavioral2/files/0x0001000000016977-177.dat family_neshta behavioral2/files/0x000100000001691b-176.dat family_neshta behavioral2/files/0x0001000000016920-170.dat family_neshta behavioral2/files/0x000100000001691a-169.dat family_neshta behavioral2/files/0x000100000001691e-168.dat family_neshta behavioral2/files/0x000400000001e6a3-188.dat family_neshta behavioral2/files/0x000100000001dbe8-163.dat family_neshta behavioral2/files/0x0001000000022772-198.dat family_neshta behavioral2/files/0x000200000002279b-201.dat family_neshta behavioral2/memory/4604-202-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022769-197.dat family_neshta behavioral2/memory/4764-213-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/768-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167f0-160.dat family_neshta behavioral2/memory/5004-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000016809-144.dat family_neshta behavioral2/files/0x0001000000022f6e-132.dat family_neshta behavioral2/files/0x0001000000022f6d-131.dat family_neshta behavioral2/files/0x0001000000021510-124.dat family_neshta behavioral2/memory/408-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4060-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1036-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4828-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2488-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3096-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4028-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/432-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3036-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4268-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1756-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2336-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1876-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VAULTF~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4680 vaultFile11006347749467126253.exe 2140 svchost.com 2672 VAULTF~1.EXE 3232 svchost.com 2180 VAULTF~1.EXE 4524 svchost.com 4176 VAULTF~1.EXE 1528 svchost.com 64 VAULTF~1.EXE 1964 svchost.com 3176 VAULTF~1.EXE 4476 svchost.com 4488 VAULTF~1.EXE 4604 svchost.com 4764 VAULTF~1.EXE 768 svchost.com 5004 VAULTF~1.EXE 408 svchost.com 4060 VAULTF~1.EXE 1036 svchost.com 4828 VAULTF~1.EXE 2488 svchost.com 3096 VAULTF~1.EXE 4028 svchost.com 432 VAULTF~1.EXE 3036 svchost.com 4268 VAULTF~1.EXE 1756 svchost.com 2336 VAULTF~1.EXE 1876 svchost.com 3304 VAULTF~1.EXE 4788 svchost.com 1840 VAULTF~1.EXE 4576 svchost.com 3992 VAULTF~1.EXE 1744 svchost.com 4176 VAULTF~1.EXE 4428 svchost.com 2404 VAULTF~1.EXE 1104 svchost.com 1464 VAULTF~1.EXE 228 svchost.com 4704 VAULTF~1.EXE 3076 svchost.com 1480 VAULTF~1.EXE 4488 svchost.com 2444 VAULTF~1.EXE 2540 svchost.com 3292 VAULTF~1.EXE 3360 svchost.com 4672 VAULTF~1.EXE 1836 svchost.com 4604 VAULTF~1.EXE 1656 svchost.com 4764 VAULTF~1.EXE 3032 svchost.com 1632 VAULTF~1.EXE 1956 svchost.com 4768 VAULTF~1.EXE 3168 svchost.com 2776 VAULTF~1.EXE 648 svchost.com 3604 VAULTF~1.EXE 2484 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" vaultFile11006347749467126253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" VAULTF~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe VAULTF~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE vaultFile11006347749467126253.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE vaultFile11006347749467126253.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\directx.sys VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE File opened for modification C:\Windows\svchost.com VAULTF~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAULTF~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings vaultFile11006347749467126253.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings VAULTF~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 4680 1360 vaultFile11006347749467126253.exe 82 PID 1360 wrote to memory of 4680 1360 vaultFile11006347749467126253.exe 82 PID 1360 wrote to memory of 4680 1360 vaultFile11006347749467126253.exe 82 PID 4680 wrote to memory of 2140 4680 vaultFile11006347749467126253.exe 83 PID 4680 wrote to memory of 2140 4680 vaultFile11006347749467126253.exe 83 PID 4680 wrote to memory of 2140 4680 vaultFile11006347749467126253.exe 83 PID 2140 wrote to memory of 2672 2140 svchost.com 84 PID 2140 wrote to memory of 2672 2140 svchost.com 84 PID 2140 wrote to memory of 2672 2140 svchost.com 84 PID 2672 wrote to memory of 3232 2672 VAULTF~1.EXE 85 PID 2672 wrote to memory of 3232 2672 VAULTF~1.EXE 85 PID 2672 wrote to memory of 3232 2672 VAULTF~1.EXE 85 PID 3232 wrote to memory of 2180 3232 svchost.com 86 PID 3232 wrote to memory of 2180 3232 svchost.com 86 PID 3232 wrote to memory of 2180 3232 svchost.com 86 PID 2180 wrote to memory of 4524 2180 VAULTF~1.EXE 87 PID 2180 wrote to memory of 4524 2180 VAULTF~1.EXE 87 PID 2180 wrote to memory of 4524 2180 VAULTF~1.EXE 87 PID 4524 wrote to memory of 4176 4524 svchost.com 119 PID 4524 wrote to memory of 4176 4524 svchost.com 119 PID 4524 wrote to memory of 4176 4524 svchost.com 119 PID 4176 wrote to memory of 1528 4176 VAULTF~1.EXE 89 PID 4176 wrote to memory of 1528 4176 VAULTF~1.EXE 89 PID 4176 wrote to memory of 1528 4176 VAULTF~1.EXE 89 PID 1528 wrote to memory of 64 1528 svchost.com 90 PID 1528 wrote to memory of 64 1528 svchost.com 90 PID 1528 wrote to memory of 64 1528 svchost.com 90 PID 64 wrote to memory of 1964 64 VAULTF~1.EXE 91 PID 64 wrote to memory of 1964 64 VAULTF~1.EXE 91 PID 64 wrote to memory of 1964 64 VAULTF~1.EXE 91 PID 1964 wrote to memory of 3176 1964 svchost.com 92 PID 1964 wrote to memory of 3176 1964 svchost.com 92 PID 1964 wrote to memory of 3176 1964 svchost.com 92 PID 3176 wrote to memory of 4476 3176 VAULTF~1.EXE 93 PID 3176 wrote to memory of 4476 3176 VAULTF~1.EXE 93 PID 3176 wrote to memory of 4476 3176 VAULTF~1.EXE 93 PID 4476 wrote to memory of 4488 4476 svchost.com 128 PID 4476 wrote to memory of 4488 4476 svchost.com 128 PID 4476 wrote to memory of 4488 4476 svchost.com 128 PID 4488 wrote to memory of 4604 4488 VAULTF~1.EXE 135 PID 4488 wrote to memory of 4604 4488 VAULTF~1.EXE 135 PID 4488 wrote to memory of 4604 4488 VAULTF~1.EXE 135 PID 4604 wrote to memory of 4764 4604 svchost.com 137 PID 4604 wrote to memory of 4764 4604 svchost.com 137 PID 4604 wrote to memory of 4764 4604 svchost.com 137 PID 4764 wrote to memory of 768 4764 VAULTF~1.EXE 97 PID 4764 wrote to memory of 768 4764 VAULTF~1.EXE 97 PID 4764 wrote to memory of 768 4764 VAULTF~1.EXE 97 PID 768 wrote to memory of 5004 768 svchost.com 98 PID 768 wrote to memory of 5004 768 svchost.com 98 PID 768 wrote to memory of 5004 768 svchost.com 98 PID 5004 wrote to memory of 408 5004 VAULTF~1.EXE 99 PID 5004 wrote to memory of 408 5004 VAULTF~1.EXE 99 PID 5004 wrote to memory of 408 5004 VAULTF~1.EXE 99 PID 408 wrote to memory of 4060 408 svchost.com 100 PID 408 wrote to memory of 4060 408 svchost.com 100 PID 408 wrote to memory of 4060 408 svchost.com 100 PID 4060 wrote to memory of 1036 4060 VAULTF~1.EXE 101 PID 4060 wrote to memory of 1036 4060 VAULTF~1.EXE 101 PID 4060 wrote to memory of 1036 4060 VAULTF~1.EXE 101 PID 1036 wrote to memory of 4828 1036 svchost.com 102 PID 1036 wrote to memory of 4828 1036 svchost.com 102 PID 1036 wrote to memory of 4828 1036 svchost.com 102 PID 4828 wrote to memory of 2488 4828 VAULTF~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\vaultFile11006347749467126253.exe"C:\Users\Admin\AppData\Local\Temp\vaultFile11006347749467126253.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\vaultFile11006347749467126253.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\vaultFile11006347749467126253.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:3096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"25⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:4268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"29⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"31⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"33⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE34⤵
- Executes dropped EXE
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"37⤵
- Executes dropped EXE
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"39⤵
- Executes dropped EXE
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"41⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE42⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"43⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE44⤵
- Executes dropped EXE
PID:4704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"45⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE46⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"47⤵
- Executes dropped EXE
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE50⤵
- Executes dropped EXE
PID:3292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"51⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"53⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"55⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE56⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"57⤵
- Executes dropped EXE
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE58⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"59⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"61⤵
- Executes dropped EXE
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE62⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"63⤵
- Executes dropped EXE
PID:648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE66⤵
- Modifies registry class
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"67⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE68⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"69⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE70⤵PID:3984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"71⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE72⤵
- Checks computer location settings
PID:3596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"73⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE74⤵PID:3148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"75⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE76⤵PID:5084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"77⤵
- Drops file in Windows directory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE78⤵
- Checks computer location settings
PID:3716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"79⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE80⤵PID:2412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"81⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE82⤵
- Checks computer location settings
- Modifies registry class
PID:1464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"83⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE84⤵PID:4704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"85⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE86⤵
- Modifies registry class
PID:4668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"87⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE88⤵PID:2656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"89⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE90⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"91⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE92⤵PID:4588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"93⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE94⤵
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"95⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE96⤵
- Modifies registry class
PID:3008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"97⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE98⤵PID:4720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"99⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE100⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"101⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE102⤵
- Checks computer location settings
PID:2316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"103⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE104⤵
- Checks computer location settings
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"105⤵
- Drops file in Windows directory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE106⤵PID:4292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"107⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE108⤵PID:4880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"109⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE110⤵PID:3096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"111⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE112⤵PID:2140
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"113⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE114⤵
- Checks computer location settings
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"115⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE116⤵
- Checks computer location settings
PID:684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"117⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE118⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE120⤵PID:3476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\VAULTF~1.EXE122⤵PID:2080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-