Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
18-05-2021 04:39
Static task
static1
Behavioral task
behavioral1
Sample
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe
Resource
win10v20210410
General
-
Target
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe
-
Size
324KB
-
MD5
85ec6689a9ae9bd4e66ede444813bf45
-
SHA1
7234cb1ff9944f2bfb35e0ee0b74217ebed42ad9
-
SHA256
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7
-
SHA512
875970afdb9bd508f7f4f804a767babccb0ec130e5c171b2f17ec9043c5ac0fbe64eb647825024b8b3ade39acc53e1f710395044e2e8bf1b0c6f7a2d5c8f3245
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\btwtatfpfxb = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\ritrle.exe\"" 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exedescription ioc process File opened (read-only) \??\I: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\K: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\L: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\U: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\Y: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\E: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\H: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\Q: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\G: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\N: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\R: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\T: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\V: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\W: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\A: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\F: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\M: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\O: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\P: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\S: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\X: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\Z: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\B: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe File opened (read-only) \??\J: 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exepid process 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exedescription pid process target process PID 3944 wrote to memory of 2452 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2452 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2452 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3484 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3484 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3484 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2612 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2612 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2612 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2368 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2368 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2368 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1576 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1576 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1576 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2984 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2984 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2984 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3896 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3896 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3896 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1348 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1348 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1348 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1424 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1424 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1424 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1120 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1120 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1120 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2464 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2464 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2464 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 824 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 824 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 824 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 388 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 388 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 388 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1848 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1848 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1848 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1568 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1568 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1568 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2128 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2128 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2128 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3528 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3528 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3528 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1512 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1512 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1512 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 424 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 424 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 424 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1168 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1168 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 1168 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3480 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3480 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 3480 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe PID 3944 wrote to memory of 2024 3944 84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe"C:\Users\Admin\AppData\Local\Temp\84ca757e6112d21636f4d72e737100a36209780a340a9f0039b0b72e95a98ba7.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/364-142-0x0000000000000000-mapping.dmp
-
memory/388-128-0x0000000000000000-mapping.dmp
-
memory/424-134-0x0000000000000000-mapping.dmp
-
memory/496-162-0x0000000000000000-mapping.dmp
-
memory/512-140-0x0000000000000000-mapping.dmp
-
memory/572-161-0x0000000000000000-mapping.dmp
-
memory/700-175-0x0000000000000000-mapping.dmp
-
memory/824-127-0x0000000000000000-mapping.dmp
-
memory/1120-125-0x0000000000000000-mapping.dmp
-
memory/1156-168-0x0000000000000000-mapping.dmp
-
memory/1168-135-0x0000000000000000-mapping.dmp
-
memory/1236-145-0x0000000000000000-mapping.dmp
-
memory/1256-156-0x0000000000000000-mapping.dmp
-
memory/1348-123-0x0000000000000000-mapping.dmp
-
memory/1392-169-0x0000000000000000-mapping.dmp
-
memory/1420-176-0x0000000000000000-mapping.dmp
-
memory/1424-124-0x0000000000000000-mapping.dmp
-
memory/1428-154-0x0000000000000000-mapping.dmp
-
memory/1512-133-0x0000000000000000-mapping.dmp
-
memory/1568-130-0x0000000000000000-mapping.dmp
-
memory/1576-120-0x0000000000000000-mapping.dmp
-
memory/1640-148-0x0000000000000000-mapping.dmp
-
memory/1760-138-0x0000000000000000-mapping.dmp
-
memory/1796-146-0x0000000000000000-mapping.dmp
-
memory/1808-171-0x0000000000000000-mapping.dmp
-
memory/1848-129-0x0000000000000000-mapping.dmp
-
memory/1972-167-0x0000000000000000-mapping.dmp
-
memory/2024-137-0x0000000000000000-mapping.dmp
-
memory/2080-173-0x0000000000000000-mapping.dmp
-
memory/2128-131-0x0000000000000000-mapping.dmp
-
memory/2144-151-0x0000000000000000-mapping.dmp
-
memory/2176-158-0x0000000000000000-mapping.dmp
-
memory/2184-166-0x0000000000000000-mapping.dmp
-
memory/2224-170-0x0000000000000000-mapping.dmp
-
memory/2320-157-0x0000000000000000-mapping.dmp
-
memory/2336-150-0x0000000000000000-mapping.dmp
-
memory/2368-119-0x0000000000000000-mapping.dmp
-
memory/2380-165-0x0000000000000000-mapping.dmp
-
memory/2416-149-0x0000000000000000-mapping.dmp
-
memory/2452-116-0x0000000000000000-mapping.dmp
-
memory/2464-126-0x0000000000000000-mapping.dmp
-
memory/2600-144-0x0000000000000000-mapping.dmp
-
memory/2612-118-0x0000000000000000-mapping.dmp
-
memory/2724-153-0x0000000000000000-mapping.dmp
-
memory/2864-177-0x0000000000000000-mapping.dmp
-
memory/2932-164-0x0000000000000000-mapping.dmp
-
memory/2976-143-0x0000000000000000-mapping.dmp
-
memory/2984-121-0x0000000000000000-mapping.dmp
-
memory/3184-160-0x0000000000000000-mapping.dmp
-
memory/3192-147-0x0000000000000000-mapping.dmp
-
memory/3228-159-0x0000000000000000-mapping.dmp
-
memory/3408-152-0x0000000000000000-mapping.dmp
-
memory/3480-136-0x0000000000000000-mapping.dmp
-
memory/3484-117-0x0000000000000000-mapping.dmp
-
memory/3528-132-0x0000000000000000-mapping.dmp
-
memory/3540-178-0x0000000000000000-mapping.dmp
-
memory/3740-155-0x0000000000000000-mapping.dmp
-
memory/3808-179-0x0000000000000000-mapping.dmp
-
memory/3896-122-0x0000000000000000-mapping.dmp
-
memory/3904-163-0x0000000000000000-mapping.dmp
-
memory/3944-114-0x0000000000400000-0x00000000012D6000-memory.dmpFilesize
14.8MB
-
memory/3944-115-0x00000000013E0000-0x000000000152A000-memory.dmpFilesize
1.3MB
-
memory/4012-174-0x0000000000000000-mapping.dmp
-
memory/4040-172-0x0000000000000000-mapping.dmp
-
memory/4064-139-0x0000000000000000-mapping.dmp
-
memory/4076-141-0x0000000000000000-mapping.dmp