Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 16:54
Static task
static1
Behavioral task
behavioral1
Sample
d4bf230df23616972131e6e26a825241.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d4bf230df23616972131e6e26a825241.exe
Resource
win10v2004-20220812-en
General
-
Target
d4bf230df23616972131e6e26a825241.exe
-
Size
244KB
-
MD5
d4bf230df23616972131e6e26a825241
-
SHA1
e2aa6076fc9080b2bdaf4e86a34358bda32852a6
-
SHA256
723f04899a2106b6be2b91b50905b3307077e4730bd97a8eef022a5657517c84
-
SHA512
782383cbcd083a3ab7c1521c8f186f2c32f9a0d7abb18132818e6b99390465096ceb6cf13b80c9341e8bea26c90c855ff64aeca0ffad606b48beceb6c85ba5de
-
SSDEEP
3072:gi6ItbhTm5EJBBEDCNVuNwXiNtoU39qzNAjv2bZxglSv1OrSjfXw2ODF:gi6ItdLjcCLSNmWt2bZQSdOrSjfXw2qF
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/620-56-0x0000000000400000-0x0000000000B4B000-memory.dmp family_gandcrab behavioral1/memory/620-59-0x0000000000400000-0x0000000000B4B000-memory.dmp family_gandcrab behavioral1/memory/620-60-0x00000000002F0000-0x0000000000307000-memory.dmp family_gandcrab behavioral1/memory/620-67-0x00000000002F0000-0x0000000000307000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce d4bf230df23616972131e6e26a825241.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\hrkqxciuqex = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\kmgfjp.exe\"" d4bf230df23616972131e6e26a825241.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\M: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\O: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\Q: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\Z: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\G: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\S: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\T: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\U: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\X: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\N: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\B: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\E: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\F: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\H: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\I: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\L: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\P: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\A: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\W: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\R: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\V: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\Y: d4bf230df23616972131e6e26a825241.exe File opened (read-only) \??\K: d4bf230df23616972131e6e26a825241.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini d4bf230df23616972131e6e26a825241.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d4bf230df23616972131e6e26a825241.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d4bf230df23616972131e6e26a825241.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier d4bf230df23616972131e6e26a825241.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 620 d4bf230df23616972131e6e26a825241.exe 620 d4bf230df23616972131e6e26a825241.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe Token: SeLoadDriverPrivilege 620 d4bf230df23616972131e6e26a825241.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 620 wrote to memory of 1504 620 d4bf230df23616972131e6e26a825241.exe 27 PID 620 wrote to memory of 1504 620 d4bf230df23616972131e6e26a825241.exe 27 PID 620 wrote to memory of 1504 620 d4bf230df23616972131e6e26a825241.exe 27 PID 620 wrote to memory of 1504 620 d4bf230df23616972131e6e26a825241.exe 27 PID 620 wrote to memory of 1748 620 d4bf230df23616972131e6e26a825241.exe 29 PID 620 wrote to memory of 1748 620 d4bf230df23616972131e6e26a825241.exe 29 PID 620 wrote to memory of 1748 620 d4bf230df23616972131e6e26a825241.exe 29 PID 620 wrote to memory of 1748 620 d4bf230df23616972131e6e26a825241.exe 29 PID 620 wrote to memory of 1520 620 d4bf230df23616972131e6e26a825241.exe 31 PID 620 wrote to memory of 1520 620 d4bf230df23616972131e6e26a825241.exe 31 PID 620 wrote to memory of 1520 620 d4bf230df23616972131e6e26a825241.exe 31 PID 620 wrote to memory of 1520 620 d4bf230df23616972131e6e26a825241.exe 31 PID 620 wrote to memory of 1888 620 d4bf230df23616972131e6e26a825241.exe 33 PID 620 wrote to memory of 1888 620 d4bf230df23616972131e6e26a825241.exe 33 PID 620 wrote to memory of 1888 620 d4bf230df23616972131e6e26a825241.exe 33 PID 620 wrote to memory of 1888 620 d4bf230df23616972131e6e26a825241.exe 33 PID 620 wrote to memory of 1352 620 d4bf230df23616972131e6e26a825241.exe 35 PID 620 wrote to memory of 1352 620 d4bf230df23616972131e6e26a825241.exe 35 PID 620 wrote to memory of 1352 620 d4bf230df23616972131e6e26a825241.exe 35 PID 620 wrote to memory of 1352 620 d4bf230df23616972131e6e26a825241.exe 35 PID 620 wrote to memory of 1280 620 d4bf230df23616972131e6e26a825241.exe 37 PID 620 wrote to memory of 1280 620 d4bf230df23616972131e6e26a825241.exe 37 PID 620 wrote to memory of 1280 620 d4bf230df23616972131e6e26a825241.exe 37 PID 620 wrote to memory of 1280 620 d4bf230df23616972131e6e26a825241.exe 37 PID 620 wrote to memory of 1052 620 d4bf230df23616972131e6e26a825241.exe 39 PID 620 wrote to memory of 1052 620 d4bf230df23616972131e6e26a825241.exe 39 PID 620 wrote to memory of 1052 620 d4bf230df23616972131e6e26a825241.exe 39 PID 620 wrote to memory of 1052 620 d4bf230df23616972131e6e26a825241.exe 39 PID 620 wrote to memory of 1228 620 d4bf230df23616972131e6e26a825241.exe 41 PID 620 wrote to memory of 1228 620 d4bf230df23616972131e6e26a825241.exe 41 PID 620 wrote to memory of 1228 620 d4bf230df23616972131e6e26a825241.exe 41 PID 620 wrote to memory of 1228 620 d4bf230df23616972131e6e26a825241.exe 41 PID 620 wrote to memory of 1836 620 d4bf230df23616972131e6e26a825241.exe 43 PID 620 wrote to memory of 1836 620 d4bf230df23616972131e6e26a825241.exe 43 PID 620 wrote to memory of 1836 620 d4bf230df23616972131e6e26a825241.exe 43 PID 620 wrote to memory of 1836 620 d4bf230df23616972131e6e26a825241.exe 43 PID 620 wrote to memory of 1944 620 d4bf230df23616972131e6e26a825241.exe 45 PID 620 wrote to memory of 1944 620 d4bf230df23616972131e6e26a825241.exe 45 PID 620 wrote to memory of 1944 620 d4bf230df23616972131e6e26a825241.exe 45 PID 620 wrote to memory of 1944 620 d4bf230df23616972131e6e26a825241.exe 45 PID 620 wrote to memory of 964 620 d4bf230df23616972131e6e26a825241.exe 47 PID 620 wrote to memory of 964 620 d4bf230df23616972131e6e26a825241.exe 47 PID 620 wrote to memory of 964 620 d4bf230df23616972131e6e26a825241.exe 47 PID 620 wrote to memory of 964 620 d4bf230df23616972131e6e26a825241.exe 47 PID 620 wrote to memory of 920 620 d4bf230df23616972131e6e26a825241.exe 49 PID 620 wrote to memory of 920 620 d4bf230df23616972131e6e26a825241.exe 49 PID 620 wrote to memory of 920 620 d4bf230df23616972131e6e26a825241.exe 49 PID 620 wrote to memory of 920 620 d4bf230df23616972131e6e26a825241.exe 49 PID 620 wrote to memory of 1160 620 d4bf230df23616972131e6e26a825241.exe 51 PID 620 wrote to memory of 1160 620 d4bf230df23616972131e6e26a825241.exe 51 PID 620 wrote to memory of 1160 620 d4bf230df23616972131e6e26a825241.exe 51 PID 620 wrote to memory of 1160 620 d4bf230df23616972131e6e26a825241.exe 51 PID 620 wrote to memory of 988 620 d4bf230df23616972131e6e26a825241.exe 53 PID 620 wrote to memory of 988 620 d4bf230df23616972131e6e26a825241.exe 53 PID 620 wrote to memory of 988 620 d4bf230df23616972131e6e26a825241.exe 53 PID 620 wrote to memory of 988 620 d4bf230df23616972131e6e26a825241.exe 53 PID 620 wrote to memory of 908 620 d4bf230df23616972131e6e26a825241.exe 55 PID 620 wrote to memory of 908 620 d4bf230df23616972131e6e26a825241.exe 55 PID 620 wrote to memory of 908 620 d4bf230df23616972131e6e26a825241.exe 55 PID 620 wrote to memory of 908 620 d4bf230df23616972131e6e26a825241.exe 55 PID 620 wrote to memory of 1732 620 d4bf230df23616972131e6e26a825241.exe 57 PID 620 wrote to memory of 1732 620 d4bf230df23616972131e6e26a825241.exe 57 PID 620 wrote to memory of 1732 620 d4bf230df23616972131e6e26a825241.exe 57 PID 620 wrote to memory of 1732 620 d4bf230df23616972131e6e26a825241.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4bf230df23616972131e6e26a825241.exe"C:\Users\Admin\AppData\Local\Temp\d4bf230df23616972131e6e26a825241.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1504
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1748
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1352
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1280
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1052
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1228
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:920
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1160
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:388
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1092
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1624
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1292
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1268
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:952
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1968
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1784
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1704
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1712
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1572
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1684
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1720
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:600
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:516
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1588
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1100
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1388
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:304
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1288
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1260
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1356
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2000
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1124
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1120
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1668
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1152
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:436
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1740
-