Analysis
-
max time kernel
191s -
max time network
230s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-08-2023 11:30
Static task
static1
Behavioral task
behavioral1
Sample
54392febdd644775e629da6921a03f21_mafia_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
54392febdd644775e629da6921a03f21_mafia_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
54392febdd644775e629da6921a03f21_mafia_JC.exe
-
Size
255KB
-
MD5
54392febdd644775e629da6921a03f21
-
SHA1
aa91504551afe5b3bc9762c3ba4948da72bf62f9
-
SHA256
24ee606ff7626721067066be4383516286752476efc6688875f4d15c105b80f9
-
SHA512
f7bf4d203dccd3ba099229749b363239e52857cc3568a4e41923ac7f5e79b83e60f88a0c81e9402fe34a65c53ce84b2e0602e8743b0dc65a4c04ae3644fe1590
-
SSDEEP
3072:ryR64m3uiNEib+3NlcpX0XEtnvJzfQcHa8fiLtPy0AV5ODgnVqTLA4OmsWF:iH6Gh3vK0XEtJDHhfyylODgnMo4nsM
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/3008-57-0x0000000000400000-0x0000000000558000-memory.dmp family_gandcrab behavioral1/memory/3008-60-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab behavioral1/memory/3008-66-0x0000000000400000-0x0000000000558000-memory.dmp family_gandcrab behavioral1/memory/3008-67-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\msocvzqyubg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\skbxgl.exe\"" 54392febdd644775e629da6921a03f21_mafia_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\E: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\G: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\X: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\Y: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\B: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\J: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\L: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\N: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\O: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\P: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\Q: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\R: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\V: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\H: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\I: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\S: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\U: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\Z: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\K: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\M: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\T: 54392febdd644775e629da6921a03f21_mafia_JC.exe File opened (read-only) \??\W: 54392febdd644775e629da6921a03f21_mafia_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2440 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 29 PID 3008 wrote to memory of 2440 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 29 PID 3008 wrote to memory of 2440 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 29 PID 3008 wrote to memory of 2440 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 29 PID 3008 wrote to memory of 1192 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 31 PID 3008 wrote to memory of 1192 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 31 PID 3008 wrote to memory of 1192 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 31 PID 3008 wrote to memory of 1192 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 31 PID 3008 wrote to memory of 1932 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 34 PID 3008 wrote to memory of 1932 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 34 PID 3008 wrote to memory of 1932 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 34 PID 3008 wrote to memory of 1932 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 34 PID 3008 wrote to memory of 312 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 36 PID 3008 wrote to memory of 312 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 36 PID 3008 wrote to memory of 312 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 36 PID 3008 wrote to memory of 312 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 36 PID 3008 wrote to memory of 3024 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 38 PID 3008 wrote to memory of 3024 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 38 PID 3008 wrote to memory of 3024 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 38 PID 3008 wrote to memory of 3024 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 38 PID 3008 wrote to memory of 2056 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 40 PID 3008 wrote to memory of 2056 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 40 PID 3008 wrote to memory of 2056 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 40 PID 3008 wrote to memory of 2056 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 40 PID 3008 wrote to memory of 2016 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 42 PID 3008 wrote to memory of 2016 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 42 PID 3008 wrote to memory of 2016 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 42 PID 3008 wrote to memory of 2016 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 42 PID 3008 wrote to memory of 1076 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 44 PID 3008 wrote to memory of 1076 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 44 PID 3008 wrote to memory of 1076 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 44 PID 3008 wrote to memory of 1076 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 44 PID 3008 wrote to memory of 3040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 46 PID 3008 wrote to memory of 3040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 46 PID 3008 wrote to memory of 3040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 46 PID 3008 wrote to memory of 3040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 46 PID 3008 wrote to memory of 2040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 48 PID 3008 wrote to memory of 2040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 48 PID 3008 wrote to memory of 2040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 48 PID 3008 wrote to memory of 2040 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 48 PID 3008 wrote to memory of 2904 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 50 PID 3008 wrote to memory of 2904 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 50 PID 3008 wrote to memory of 2904 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 50 PID 3008 wrote to memory of 2904 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 50 PID 3008 wrote to memory of 3036 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 52 PID 3008 wrote to memory of 3036 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 52 PID 3008 wrote to memory of 3036 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 52 PID 3008 wrote to memory of 3036 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 52 PID 3008 wrote to memory of 1916 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 54 PID 3008 wrote to memory of 1916 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 54 PID 3008 wrote to memory of 1916 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 54 PID 3008 wrote to memory of 1916 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 54 PID 3008 wrote to memory of 808 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 56 PID 3008 wrote to memory of 808 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 56 PID 3008 wrote to memory of 808 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 56 PID 3008 wrote to memory of 808 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 56 PID 3008 wrote to memory of 896 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 58 PID 3008 wrote to memory of 896 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 58 PID 3008 wrote to memory of 896 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 58 PID 3008 wrote to memory of 896 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 58 PID 3008 wrote to memory of 2332 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 60 PID 3008 wrote to memory of 2332 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 60 PID 3008 wrote to memory of 2332 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 60 PID 3008 wrote to memory of 2332 3008 54392febdd644775e629da6921a03f21_mafia_JC.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\54392febdd644775e629da6921a03f21_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\54392febdd644775e629da6921a03f21_mafia_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2440
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:1192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:1932
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:312
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:3024
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1076
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:3040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2904
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:3036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1916
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:808
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:896
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2332
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1972
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2308
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:1404
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2344
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1164
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:1308
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1792
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2896
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:1980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:992
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2216
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2312
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2260
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:1436
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2304
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2616
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:3068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2660
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2476
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:1976
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1584
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2972
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:572
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1532
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:1992
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2952
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1276
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2620
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1764
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2812
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2292
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2264
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1884
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2128
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1544
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2892
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:828
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:1964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2508
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2168
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2224
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2248
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2636
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:1548
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2188
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:2984
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns1.corp-servers.ru2⤵PID:2796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.corp-servers.ru2⤵PID:2444
-
-
C:\Windows\SysWOW64\nslookup.exenslookup zonealarm.bit ns2.corp-servers.ru2⤵PID:1716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.corp-servers.ru2⤵PID:2740
-