Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 11:12
Behavioral task
behavioral1
Sample
93f1059dac0c6cexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
93f1059dac0c6cexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
93f1059dac0c6cexeexeexeex.exe
-
Size
126KB
-
MD5
93f1059dac0c6cf2c479fb0082b8abd4
-
SHA1
501bce59628a1bf50bb5c019c0c598d261c00030
-
SHA256
7e72ec0fd0bef70368df45ea039c7f4b8aba55969d99b1e531b65b9356675b86
-
SHA512
2449600547c414d619fb5bc95058a0b89480b8ad9a34b82350a81a213b4c575754747dba0ab65bb20247ac67ea25637a480ae1398fe8306c8b14ee094b04e3e1
-
SSDEEP
1536:gZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAEMqqU+2bbbAV2/S2LNmHks:OBounVyFHFMqqDL2/LgHkc2oYvQd2a
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/2844-133-0x000000000FBA0000-0x000000000FBBB000-memory.dmp family_gandcrab behavioral2/memory/2844-137-0x000000000FBA0000-0x000000000FBBB000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
resource yara_rule behavioral2/memory/2844-133-0x000000000FBA0000-0x000000000FBBB000-memory.dmp upx behavioral2/memory/2844-137-0x000000000FBA0000-0x000000000FBBB000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 93f1059dac0c6cexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\mdtgbxvjlie = "C:\\Users\\Admin\\AppData\\Local\\Temp\\93f1059dac0c6cexeexeexeex.exe" 93f1059dac0c6cexeexeexeex.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\B: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\E: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\P: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\R: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\T: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\A: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\M: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\O: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\Y: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\U: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\V: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\Z: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\G: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\K: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\N: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\Q: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\S: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\H: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\I: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\J: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\L: 93f1059dac0c6cexeexeexeex.exe File opened (read-only) \??\X: 93f1059dac0c6cexeexeexeex.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 93f1059dac0c6cexeexeexeex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 93f1059dac0c6cexeexeexeex.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 93f1059dac0c6cexeexeexeex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2844 93f1059dac0c6cexeexeexeex.exe 2844 93f1059dac0c6cexeexeexeex.exe 2844 93f1059dac0c6cexeexeexeex.exe 2844 93f1059dac0c6cexeexeexeex.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 4664 2844 93f1059dac0c6cexeexeexeex.exe 84 PID 2844 wrote to memory of 4664 2844 93f1059dac0c6cexeexeexeex.exe 84 PID 2844 wrote to memory of 4664 2844 93f1059dac0c6cexeexeexeex.exe 84 PID 2844 wrote to memory of 536 2844 93f1059dac0c6cexeexeexeex.exe 86 PID 2844 wrote to memory of 536 2844 93f1059dac0c6cexeexeexeex.exe 86 PID 2844 wrote to memory of 536 2844 93f1059dac0c6cexeexeexeex.exe 86 PID 2844 wrote to memory of 3768 2844 93f1059dac0c6cexeexeexeex.exe 88 PID 2844 wrote to memory of 3768 2844 93f1059dac0c6cexeexeexeex.exe 88 PID 2844 wrote to memory of 3768 2844 93f1059dac0c6cexeexeexeex.exe 88 PID 2844 wrote to memory of 4136 2844 93f1059dac0c6cexeexeexeex.exe 90 PID 2844 wrote to memory of 4136 2844 93f1059dac0c6cexeexeexeex.exe 90 PID 2844 wrote to memory of 4136 2844 93f1059dac0c6cexeexeexeex.exe 90 PID 2844 wrote to memory of 4172 2844 93f1059dac0c6cexeexeexeex.exe 92 PID 2844 wrote to memory of 4172 2844 93f1059dac0c6cexeexeexeex.exe 92 PID 2844 wrote to memory of 4172 2844 93f1059dac0c6cexeexeexeex.exe 92 PID 2844 wrote to memory of 2236 2844 93f1059dac0c6cexeexeexeex.exe 94 PID 2844 wrote to memory of 2236 2844 93f1059dac0c6cexeexeexeex.exe 94 PID 2844 wrote to memory of 2236 2844 93f1059dac0c6cexeexeexeex.exe 94 PID 2844 wrote to memory of 3440 2844 93f1059dac0c6cexeexeexeex.exe 96 PID 2844 wrote to memory of 3440 2844 93f1059dac0c6cexeexeexeex.exe 96 PID 2844 wrote to memory of 3440 2844 93f1059dac0c6cexeexeexeex.exe 96 PID 2844 wrote to memory of 3916 2844 93f1059dac0c6cexeexeexeex.exe 98 PID 2844 wrote to memory of 3916 2844 93f1059dac0c6cexeexeexeex.exe 98 PID 2844 wrote to memory of 3916 2844 93f1059dac0c6cexeexeexeex.exe 98 PID 2844 wrote to memory of 116 2844 93f1059dac0c6cexeexeexeex.exe 100 PID 2844 wrote to memory of 116 2844 93f1059dac0c6cexeexeexeex.exe 100 PID 2844 wrote to memory of 116 2844 93f1059dac0c6cexeexeexeex.exe 100 PID 2844 wrote to memory of 2724 2844 93f1059dac0c6cexeexeexeex.exe 102 PID 2844 wrote to memory of 2724 2844 93f1059dac0c6cexeexeexeex.exe 102 PID 2844 wrote to memory of 2724 2844 93f1059dac0c6cexeexeexeex.exe 102 PID 2844 wrote to memory of 396 2844 93f1059dac0c6cexeexeexeex.exe 104 PID 2844 wrote to memory of 396 2844 93f1059dac0c6cexeexeexeex.exe 104 PID 2844 wrote to memory of 396 2844 93f1059dac0c6cexeexeexeex.exe 104 PID 2844 wrote to memory of 800 2844 93f1059dac0c6cexeexeexeex.exe 106 PID 2844 wrote to memory of 800 2844 93f1059dac0c6cexeexeexeex.exe 106 PID 2844 wrote to memory of 800 2844 93f1059dac0c6cexeexeexeex.exe 106 PID 2844 wrote to memory of 4388 2844 93f1059dac0c6cexeexeexeex.exe 108 PID 2844 wrote to memory of 4388 2844 93f1059dac0c6cexeexeexeex.exe 108 PID 2844 wrote to memory of 4388 2844 93f1059dac0c6cexeexeexeex.exe 108 PID 2844 wrote to memory of 4360 2844 93f1059dac0c6cexeexeexeex.exe 110 PID 2844 wrote to memory of 4360 2844 93f1059dac0c6cexeexeexeex.exe 110 PID 2844 wrote to memory of 4360 2844 93f1059dac0c6cexeexeexeex.exe 110 PID 2844 wrote to memory of 5016 2844 93f1059dac0c6cexeexeexeex.exe 112 PID 2844 wrote to memory of 5016 2844 93f1059dac0c6cexeexeexeex.exe 112 PID 2844 wrote to memory of 5016 2844 93f1059dac0c6cexeexeexeex.exe 112 PID 2844 wrote to memory of 4528 2844 93f1059dac0c6cexeexeexeex.exe 114 PID 2844 wrote to memory of 4528 2844 93f1059dac0c6cexeexeexeex.exe 114 PID 2844 wrote to memory of 4528 2844 93f1059dac0c6cexeexeexeex.exe 114 PID 2844 wrote to memory of 2928 2844 93f1059dac0c6cexeexeexeex.exe 116 PID 2844 wrote to memory of 2928 2844 93f1059dac0c6cexeexeexeex.exe 116 PID 2844 wrote to memory of 2928 2844 93f1059dac0c6cexeexeexeex.exe 116 PID 2844 wrote to memory of 1384 2844 93f1059dac0c6cexeexeexeex.exe 118 PID 2844 wrote to memory of 1384 2844 93f1059dac0c6cexeexeexeex.exe 118 PID 2844 wrote to memory of 1384 2844 93f1059dac0c6cexeexeexeex.exe 118 PID 2844 wrote to memory of 2980 2844 93f1059dac0c6cexeexeexeex.exe 122 PID 2844 wrote to memory of 2980 2844 93f1059dac0c6cexeexeexeex.exe 122 PID 2844 wrote to memory of 2980 2844 93f1059dac0c6cexeexeexeex.exe 122 PID 2844 wrote to memory of 1788 2844 93f1059dac0c6cexeexeexeex.exe 124 PID 2844 wrote to memory of 1788 2844 93f1059dac0c6cexeexeexeex.exe 124 PID 2844 wrote to memory of 1788 2844 93f1059dac0c6cexeexeexeex.exe 124 PID 2844 wrote to memory of 3708 2844 93f1059dac0c6cexeexeexeex.exe 126 PID 2844 wrote to memory of 3708 2844 93f1059dac0c6cexeexeexeex.exe 126 PID 2844 wrote to memory of 3708 2844 93f1059dac0c6cexeexeexeex.exe 126 PID 2844 wrote to memory of 208 2844 93f1059dac0c6cexeexeexeex.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f1059dac0c6cexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\93f1059dac0c6cexeexeexeex.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:536
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:3768
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:4136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:4172
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2236
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:3440
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3916
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:116
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2724
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:396
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4388
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4360
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:5016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:4528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:2928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:1384
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:2980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:1788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:3708
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:208
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:2564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:780
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2144
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:4484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:4324
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:3960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:552
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2568
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:4104
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4628
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3500
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:2192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:1560
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:4004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2860
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:748
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4316
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:3044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2488
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:992
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4560
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:3544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4564
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:2228
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:5032
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:4028
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:212
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4624
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3624
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1680
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:3744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:3840
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2152
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:352
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:2684
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:392
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:1312
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1460
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:5004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4996
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2372
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:4184
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:2424
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:3944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4724
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4880
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:236
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:4968
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:2100
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:3664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:2768
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:4420
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:2136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:5000
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:4312
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:3584
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:4056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:4864
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns2.soprodns.ru2⤵PID:3832
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵PID:4340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns1.soprodns.ru2⤵PID:1132
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵PID:4988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns2.soprodns.ru2⤵PID:1336
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.coin dns2.soprodns.ru2⤵PID:828
-