Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 06:28 UTC
Static task
static1
Behavioral task
behavioral1
Sample
426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe
Resource
win10v2004-20220901-en
General
-
Target
426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe
-
Size
500KB
-
MD5
3347552aa09c4c82643bb8208f10dfe0
-
SHA1
455c324106cce3ea37fc3620bcacd96311f4d1ab
-
SHA256
426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79
-
SHA512
6c98c94e39dc9b6672dee53298cd32bd2af79df4dd93258c693514a311560a6bf04e2efed4d26d431eceb8ee30c11694cbfd361471752e8370ede694de91a789
-
SSDEEP
12288:e+vMwQh85td43o3XD9b3wgGY8QKqRWFn5:e+EwFtdXD1ggGY8F15
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe:*:enabled:@shell32.dll,-1" 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\H: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\K: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\L: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\M: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\Q: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\Y: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\F: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\J: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\R: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\T: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\U: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\G: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\I: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\N: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\S: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\Z: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\E: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\O: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\P: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\V: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe File opened (read-only) \??\X: 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2836 wrote to memory of 628 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2 PID 2836 wrote to memory of 628 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2 PID 2836 wrote to memory of 628 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2 PID 2836 wrote to memory of 628 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2 PID 2836 wrote to memory of 628 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2 PID 2836 wrote to memory of 628 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 2 PID 2836 wrote to memory of 676 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 3 PID 2836 wrote to memory of 676 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 3 PID 2836 wrote to memory of 676 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 3 PID 2836 wrote to memory of 676 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 3 PID 2836 wrote to memory of 676 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 3 PID 2836 wrote to memory of 676 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 3 PID 2836 wrote to memory of 788 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 8 PID 2836 wrote to memory of 788 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 8 PID 2836 wrote to memory of 788 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 8 PID 2836 wrote to memory of 788 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 8 PID 2836 wrote to memory of 788 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 8 PID 2836 wrote to memory of 788 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 8 PID 2836 wrote to memory of 796 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 9 PID 2836 wrote to memory of 796 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 9 PID 2836 wrote to memory of 796 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 9 PID 2836 wrote to memory of 796 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 9 PID 2836 wrote to memory of 796 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 9 PID 2836 wrote to memory of 796 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 9 PID 2836 wrote to memory of 800 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 15 PID 2836 wrote to memory of 800 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 15 PID 2836 wrote to memory of 800 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 15 PID 2836 wrote to memory of 800 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 15 PID 2836 wrote to memory of 800 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 15 PID 2836 wrote to memory of 800 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 15 PID 2836 wrote to memory of 908 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 14 PID 2836 wrote to memory of 908 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 14 PID 2836 wrote to memory of 908 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 14 PID 2836 wrote to memory of 908 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 14 PID 2836 wrote to memory of 908 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 14 PID 2836 wrote to memory of 908 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 14 PID 2836 wrote to memory of 956 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 11 PID 2836 wrote to memory of 956 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 11 PID 2836 wrote to memory of 956 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 11 PID 2836 wrote to memory of 956 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 11 PID 2836 wrote to memory of 956 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 11 PID 2836 wrote to memory of 956 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 11 PID 2836 wrote to memory of 340 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 10 PID 2836 wrote to memory of 340 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 10 PID 2836 wrote to memory of 340 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 10 PID 2836 wrote to memory of 340 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 10 PID 2836 wrote to memory of 340 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 10 PID 2836 wrote to memory of 340 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 10 PID 2836 wrote to memory of 524 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 12 PID 2836 wrote to memory of 524 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 12 PID 2836 wrote to memory of 524 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 12 PID 2836 wrote to memory of 524 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 12 PID 2836 wrote to memory of 524 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 12 PID 2836 wrote to memory of 524 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 12 PID 2836 wrote to memory of 872 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 13 PID 2836 wrote to memory of 872 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 13 PID 2836 wrote to memory of 872 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 13 PID 2836 wrote to memory of 872 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 13 PID 2836 wrote to memory of 872 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 13 PID 2836 wrote to memory of 872 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 13 PID 2836 wrote to memory of 900 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 16 PID 2836 wrote to memory of 900 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 16 PID 2836 wrote to memory of 900 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 16 PID 2836 wrote to memory of 900 2836 426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe 16
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:340
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:800
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3416
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3504
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4740
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:2012
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:752
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4420
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3804
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3352
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3260
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:796
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1172
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2588
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1224
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1924
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2172
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2152
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2052
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:2024
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1876
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2576
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:4532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:2476
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2268
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:4264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4928
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:920
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2972
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe"C:\Users\Admin\AppData\Local\Temp\426a548249bc3cafcf347ab32636f999c4dcd84598d7add7f3cce5816e978e79.exe"2⤵
- Modifies firewall policy service
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1568
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1412
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1252
Network
-
Remote address:8.8.8.8:53Requestilo.brenz.plIN AResponseilo.brenz.plIN A148.81.111.121
-
Remote address:8.8.8.8:53Requestant.trenz.plIN AResponseant.trenz.plIN A148.81.111.121
-
Remote address:8.8.8.8:53Requestzekikg.comIN AResponse
-
Remote address:8.8.8.8:53Requestwrrllx.comIN AResponse
-
Remote address:8.8.8.8:53Requestgdzdto.comIN AResponse
-
Remote address:8.8.8.8:53Requestszditu.comIN AResponse
-
Remote address:8.8.8.8:53Requestwgqwan.comIN AResponse
-
Remote address:8.8.8.8:53Requestkdulny.comIN AResponse
-
Remote address:8.8.8.8:53Requestyazooo.comIN AResponseyazooo.comIN CNAMEtraff-4.hugedomains.comtraff-4.hugedomains.comIN CNAMEhdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.comhdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.comIN A52.86.6.113hdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.comIN A3.94.41.167
-
Remote address:8.8.8.8:53Requestbokame.comIN AResponsebokame.comIN A38.48.232.74
-
Remote address:8.8.8.8:53Requestyjbulv.comIN AResponse
-
Remote address:8.8.8.8:53Requestyeslpa.comIN AResponse
-
Remote address:8.8.8.8:53Requestlwennz.comIN AResponse
-
Remote address:8.8.8.8:53Requestanqyxx.comIN AResponse
-
Remote address:8.8.8.8:53Requestigltje.comIN AResponse
-
Remote address:8.8.8.8:53Requestdebyqb.comIN AResponse
-
Remote address:8.8.8.8:53Requestqiyyys.comIN AResponse
-
Remote address:8.8.8.8:53Requesthmopgy.comIN AResponse
-
Remote address:8.8.8.8:53Requestxymsuv.comIN AResponse
-
Remote address:8.8.8.8:53Requestrbakdq.comIN AResponse
-
Remote address:8.8.8.8:53Requestceaooa.comIN AResponse
-
Remote address:8.8.8.8:53Requestptjpzp.comIN AResponse
-
Remote address:8.8.8.8:53Requestloeuhr.comIN AResponse
-
Remote address:8.8.8.8:53Requestlwaqvg.comIN AResponse
-
Remote address:8.8.8.8:53Requestsbuple.comIN AResponse
-
Remote address:8.8.8.8:53Requestfdzfrd.comIN AResponse
-
Remote address:8.8.8.8:53Requestfsgeeb.comIN AResponse
-
Remote address:8.8.8.8:53Requestfsgeeb.comIN AResponse
-
Remote address:8.8.8.8:53Requestslykys.comIN AResponse
-
Remote address:8.8.8.8:53Requestslykys.comIN AResponse
-
Remote address:8.8.8.8:53Requestebekqf.comIN AResponse
-
Remote address:8.8.8.8:53Requestbcuuif.comIN AResponse
-
Remote address:8.8.8.8:53Requesteuioys.comIN AResponse
-
Remote address:8.8.8.8:53Requestexiqoq.comIN AResponse
-
Remote address:8.8.8.8:53Requestblznum.comIN AResponse
-
Remote address:8.8.8.8:53Requestghleip.comIN AResponse
-
Remote address:8.8.8.8:53Requestelybfz.comIN AResponse
-
Remote address:8.8.8.8:53Requestukotyo.comIN AResponse
-
Remote address:8.8.8.8:53Requestmteviy.comIN AResponse
-
Remote address:8.8.8.8:53Requestspdyhu.comIN AResponse
-
Remote address:8.8.8.8:53Requestlaolre.comIN AResponse
-
Remote address:8.8.8.8:53Requestiidipu.comIN AResponse
-
Remote address:8.8.8.8:53Requestahtaru.comIN AResponse
-
Remote address:8.8.8.8:53Requesttpovfb.comIN AResponse
-
Remote address:8.8.8.8:53Requestgexxis.comIN AResponse
-
Remote address:8.8.8.8:53Requestaeliej.comIN AResponse
-
Remote address:8.8.8.8:53Requestfuuzon.comIN AResponse
-
Remote address:8.8.8.8:53Requestuheoqv.comIN AResponse
-
Remote address:8.8.8.8:53Requesttiukux.comIN AResponse
-
Remote address:8.8.8.8:53Requestrmygrb.comIN AResponse
-
Remote address:8.8.8.8:53Requestoztrvy.comIN AResponse
-
Remote address:8.8.8.8:53Requestgcpsuo.comIN AResponse
-
Remote address:8.8.8.8:53Requestgcpsuo.comIN AResponse
-
Remote address:8.8.8.8:53Requestyhiisr.comIN AResponse
-
Remote address:8.8.8.8:53Requestupsfcs.comIN AResponse
-
Remote address:8.8.8.8:53Requestxlgusc.comIN AResponse
-
Remote address:8.8.8.8:53Requestdsmjyr.comIN AResponse
-
Remote address:8.8.8.8:53Requestleeuqq.comIN AResponse
-
Remote address:8.8.8.8:53Requestamgcie.comIN AResponseamgcie.comIN A213.186.33.5
-
Remote address:8.8.8.8:53Requestamgcie.comIN AResponseamgcie.comIN A213.186.33.5
-
Remote address:8.8.8.8:53Requestxwmumu.comIN AResponse
-
Remote address:8.8.8.8:53Requestboaioo.comIN AResponse
-
Remote address:8.8.8.8:53Requestoeqcqv.comIN AResponse
-
Remote address:8.8.8.8:53Requestgcxlum.comIN AResponse
-
Remote address:8.8.8.8:53Requestosbhie.comIN AResponse
-
Remote address:8.8.8.8:53Requestaycbzv.comIN AResponse
-
Remote address:8.8.8.8:53Requestsuvxia.comIN AResponse
-
Remote address:8.8.8.8:53Requestaqkgqz.comIN AResponse
-
Remote address:8.8.8.8:53Requestxenkac.comIN AResponse
-
Remote address:8.8.8.8:53Requesteazucw.comIN AResponse
-
Remote address:8.8.8.8:53Requestxojgzo.comIN AResponse
-
Remote address:8.8.8.8:53Requestyewoay.comIN AResponse
-
Remote address:8.8.8.8:53Requestpwteva.comIN AResponse
-
Remote address:8.8.8.8:53Requestzyokeo.comIN AResponse
-
Remote address:8.8.8.8:53Requestehdxdt.comIN AResponse
-
Remote address:8.8.8.8:53Requestaoodox.comIN AResponse
-
Remote address:8.8.8.8:53Requestoyiaze.comIN AResponse
-
Remote address:8.8.8.8:53Requestituomx.comIN AResponse
-
Remote address:8.8.8.8:53Requestapusiy.comIN AResponse
-
Remote address:8.8.8.8:53Requestvebene.comIN AResponsevebene.comIN A198.54.117.242
-
Remote address:8.8.8.8:53Requestvebene.comIN AResponsevebene.comIN A198.54.117.242
-
Remote address:8.8.8.8:53Requestgzbutu.comIN AResponse
-
Remote address:8.8.8.8:53Requestoymiys.comIN AResponse
-
Remote address:8.8.8.8:53Requestyoiygu.comIN AResponse
-
Remote address:8.8.8.8:53Requestnyjmca.comIN AResponse
-
Remote address:8.8.8.8:53Requesteadwla.comIN AResponse
-
Remote address:8.8.8.8:53Requestrxuegi.comIN AResponse
-
Remote address:8.8.8.8:53Requestftxwoz.comIN AResponse
-
Remote address:8.8.8.8:53Requestbckjuf.comIN AResponse
-
Remote address:8.8.8.8:53Requestuyztke.comIN AResponse
-
Remote address:8.8.8.8:53Requestuyztke.comIN AResponse
-
Remote address:8.8.8.8:53Requestioijfn.comIN AResponse
-
Remote address:8.8.8.8:53Requestuzlbfa.comIN AResponse
-
Remote address:8.8.8.8:53Requestpuaiyr.comIN AResponse
-
Remote address:8.8.8.8:53Requestlixkes.comIN AResponse
-
Remote address:8.8.8.8:53Requestceqwkx.comIN AResponse
-
Remote address:8.8.8.8:53Requestmjfoie.comIN AResponse
-
Remote address:8.8.8.8:53Requestshiucv.comIN AResponse
-
Remote address:8.8.8.8:53Requesteahmff.comIN AResponse
-
Remote address:8.8.8.8:53Requestbmawdl.comIN AResponse
-
Remote address:8.8.8.8:53Requestkgmcsq.comIN AResponse
-
Remote address:8.8.8.8:53Requesthcyuuf.comIN AResponse
-
Remote address:8.8.8.8:53Requestwlitfy.comIN AResponse
-
Remote address:8.8.8.8:53Requesthsxhtt.comIN AResponse
-
Remote address:8.8.8.8:53Requestiemlgv.comIN AResponse
-
Remote address:8.8.8.8:53Requestkyidnl.comIN AResponse
-
Remote address:8.8.8.8:53Requestrmkcoa.comIN AResponse
-
Remote address:8.8.8.8:53Requestzmpzic.comIN AResponse
-
260 B 200 B 5 5
-
322 B 7
-
322 B 7
-
260 B 200 B 5 5
-
322 B 7
-
322 B 7
-
322 B 7
-
40 B 1
-
260 B 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
420 B 44 B 9 1
-
190 B 132 B 4 3
-
260 B 200 B 5 5
-
58 B 74 B 1 1
DNS Request
ilo.brenz.pl
DNS Response
148.81.111.121
-
58 B 74 B 1 1
DNS Request
ant.trenz.pl
DNS Response
148.81.111.121
-
56 B 129 B 1 1
DNS Request
zekikg.com
-
56 B 129 B 1 1
DNS Request
wrrllx.com
-
56 B 129 B 1 1
DNS Request
gdzdto.com
-
56 B 129 B 1 1
DNS Request
szditu.com
-
56 B 129 B 1 1
DNS Request
wgqwan.com
-
56 B 129 B 1 1
DNS Request
kdulny.com
-
56 B 186 B 1 1
DNS Request
yazooo.com
DNS Response
52.86.6.1133.94.41.167
-
56 B 72 B 1 1
DNS Request
bokame.com
DNS Response
38.48.232.74
-
56 B 129 B 1 1
DNS Request
yjbulv.com
-
56 B 129 B 1 1
DNS Request
yeslpa.com
-
56 B 129 B 1 1
DNS Request
lwennz.com
-
56 B 129 B 1 1
DNS Request
anqyxx.com
-
56 B 129 B 1 1
DNS Request
igltje.com
-
56 B 129 B 1 1
DNS Request
debyqb.com
-
56 B 129 B 1 1
DNS Request
qiyyys.com
-
56 B 129 B 1 1
DNS Request
hmopgy.com
-
56 B 129 B 1 1
DNS Request
xymsuv.com
-
56 B 129 B 1 1
DNS Request
rbakdq.com
-
56 B 129 B 1 1
DNS Request
ceaooa.com
-
56 B 129 B 1 1
DNS Request
ptjpzp.com
-
56 B 129 B 1 1
DNS Request
loeuhr.com
-
56 B 129 B 1 1
DNS Request
lwaqvg.com
-
56 B 129 B 1 1
DNS Request
sbuple.com
-
56 B 129 B 1 1
DNS Request
fdzfrd.com
-
112 B 258 B 2 2
DNS Request
fsgeeb.com
DNS Request
fsgeeb.com
-
112 B 112 B 2 2
DNS Request
slykys.com
DNS Request
slykys.com
-
56 B 129 B 1 1
DNS Request
ebekqf.com
-
56 B 129 B 1 1
DNS Request
bcuuif.com
-
56 B 129 B 1 1
DNS Request
euioys.com
-
56 B 129 B 1 1
DNS Request
exiqoq.com
-
56 B 129 B 1 1
DNS Request
blznum.com
-
56 B 129 B 1 1
DNS Request
ghleip.com
-
56 B 129 B 1 1
DNS Request
elybfz.com
-
56 B 129 B 1 1
DNS Request
ukotyo.com
-
56 B 129 B 1 1
DNS Request
mteviy.com
-
56 B 129 B 1 1
DNS Request
spdyhu.com
-
56 B 129 B 1 1
DNS Request
laolre.com
-
56 B 129 B 1 1
DNS Request
iidipu.com
-
56 B 129 B 1 1
DNS Request
ahtaru.com
-
56 B 129 B 1 1
DNS Request
tpovfb.com
-
56 B 129 B 1 1
DNS Request
gexxis.com
-
56 B 129 B 1 1
DNS Request
aeliej.com
-
56 B 129 B 1 1
DNS Request
fuuzon.com
-
56 B 129 B 1 1
DNS Request
uheoqv.com
-
56 B 129 B 1 1
DNS Request
tiukux.com
-
56 B 129 B 1 1
DNS Request
rmygrb.com
-
56 B 129 B 1 1
DNS Request
oztrvy.com
-
112 B 258 B 2 2
DNS Request
gcpsuo.com
DNS Request
gcpsuo.com
-
56 B 129 B 1 1
DNS Request
yhiisr.com
-
56 B 129 B 1 1
DNS Request
upsfcs.com
-
56 B 129 B 1 1
DNS Request
xlgusc.com
-
56 B 129 B 1 1
DNS Request
dsmjyr.com
-
56 B 129 B 1 1
DNS Request
leeuqq.com
-
112 B 144 B 2 2
DNS Request
amgcie.com
DNS Request
amgcie.com
DNS Response
213.186.33.5
DNS Response
213.186.33.5
-
56 B 129 B 1 1
DNS Request
xwmumu.com
-
56 B 129 B 1 1
DNS Request
boaioo.com
-
56 B 129 B 1 1
DNS Request
oeqcqv.com
-
56 B 129 B 1 1
DNS Request
gcxlum.com
-
56 B 129 B 1 1
DNS Request
osbhie.com
-
56 B 129 B 1 1
DNS Request
aycbzv.com
-
56 B 129 B 1 1
DNS Request
suvxia.com
-
56 B 129 B 1 1
DNS Request
aqkgqz.com
-
56 B 129 B 1 1
DNS Request
xenkac.com
-
56 B 129 B 1 1
DNS Request
eazucw.com
-
56 B 129 B 1 1
DNS Request
xojgzo.com
-
56 B 129 B 1 1
DNS Request
yewoay.com
-
56 B 129 B 1 1
DNS Request
pwteva.com
-
56 B 129 B 1 1
DNS Request
zyokeo.com
-
56 B 129 B 1 1
DNS Request
ehdxdt.com
-
56 B 129 B 1 1
DNS Request
aoodox.com
-
56 B 129 B 1 1
DNS Request
oyiaze.com
-
56 B 129 B 1 1
DNS Request
ituomx.com
-
56 B 129 B 1 1
DNS Request
apusiy.com
-
112 B 144 B 2 2
DNS Request
vebene.com
DNS Request
vebene.com
DNS Response
198.54.117.242
DNS Response
198.54.117.242
-
56 B 129 B 1 1
DNS Request
gzbutu.com
-
56 B 129 B 1 1
DNS Request
oymiys.com
-
56 B 129 B 1 1
DNS Request
yoiygu.com
-
56 B 129 B 1 1
DNS Request
nyjmca.com
-
56 B 129 B 1 1
DNS Request
eadwla.com
-
56 B 129 B 1 1
DNS Request
rxuegi.com
-
56 B 129 B 1 1
DNS Request
ftxwoz.com
-
56 B 129 B 1 1
DNS Request
bckjuf.com
-
112 B 258 B 2 2
DNS Request
uyztke.com
DNS Request
uyztke.com
-
56 B 129 B 1 1
DNS Request
ioijfn.com
-
56 B 129 B 1 1
DNS Request
uzlbfa.com
-
56 B 129 B 1 1
DNS Request
puaiyr.com
-
56 B 129 B 1 1
DNS Request
lixkes.com
-
56 B 129 B 1 1
DNS Request
ceqwkx.com
-
56 B 129 B 1 1
DNS Request
mjfoie.com
-
56 B 129 B 1 1
DNS Request
shiucv.com
-
56 B 129 B 1 1
DNS Request
eahmff.com
-
56 B 129 B 1 1
DNS Request
bmawdl.com
-
56 B 129 B 1 1
DNS Request
kgmcsq.com
-
56 B 129 B 1 1
DNS Request
hcyuuf.com
-
56 B 129 B 1 1
DNS Request
wlitfy.com
-
56 B 129 B 1 1
DNS Request
hsxhtt.com
-
56 B 129 B 1 1
DNS Request
iemlgv.com
-
56 B 129 B 1 1
DNS Request
kyidnl.com
-
56 B 129 B 1 1
DNS Request
rmkcoa.com
-
56 B 129 B 1 1
DNS Request
zmpzic.com