Analysis
-
max time kernel
31s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 05:44
Static task
static1
Behavioral task
behavioral1
Sample
2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe
-
Size
250KB
-
MD5
b7d479cf717d58bd74e0f88d9f1197d8
-
SHA1
e60ca164952efd8259456a3af6b65e6be46d860a
-
SHA256
410b18476f6c01090b2fa0b3c84d82984af73ed3dc197f7fc82f7f76a5067270
-
SHA512
d4d0e60b03cff8c3aa9b8aa2c8696dba6baa449098824b12579d8dd4f49636e8e494d47291fe65288818f1e0954d7583c056198817da505a38207d14aed2d099
-
SSDEEP
3072:E/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOdP:E/y20Gj0r+EBFrkvlU3RvIUDOIB
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/2368-4-0x0000000000400000-0x0000000000444000-memory.dmp family_gandcrab behavioral1/memory/2368-6-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab behavioral1/memory/2368-14-0x0000000000400000-0x0000000000444000-memory.dmp family_gandcrab behavioral1/memory/2368-16-0x0000000000220000-0x0000000000237000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\liobgoaqqyr = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\rgewnq.exe\"" 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\G: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\J: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\O: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\T: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\X: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\B: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\R: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\S: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\U: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\Z: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\H: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\M: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\V: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\W: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\Y: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\Q: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\A: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\I: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\K: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\L: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\N: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe File opened (read-only) \??\P: 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2560 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 28 PID 2368 wrote to memory of 2560 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 28 PID 2368 wrote to memory of 2560 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 28 PID 2368 wrote to memory of 2560 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 28 PID 2368 wrote to memory of 2412 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 30 PID 2368 wrote to memory of 2412 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 30 PID 2368 wrote to memory of 2412 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 30 PID 2368 wrote to memory of 2412 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 30 PID 2368 wrote to memory of 2440 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 32 PID 2368 wrote to memory of 2440 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 32 PID 2368 wrote to memory of 2440 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 32 PID 2368 wrote to memory of 2440 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 32 PID 2368 wrote to memory of 2492 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 34 PID 2368 wrote to memory of 2492 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 34 PID 2368 wrote to memory of 2492 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 34 PID 2368 wrote to memory of 2492 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 34 PID 2368 wrote to memory of 2468 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 36 PID 2368 wrote to memory of 2468 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 36 PID 2368 wrote to memory of 2468 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 36 PID 2368 wrote to memory of 2468 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 36 PID 2368 wrote to memory of 2448 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 38 PID 2368 wrote to memory of 2448 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 38 PID 2368 wrote to memory of 2448 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 38 PID 2368 wrote to memory of 2448 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 38 PID 2368 wrote to memory of 2884 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 40 PID 2368 wrote to memory of 2884 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 40 PID 2368 wrote to memory of 2884 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 40 PID 2368 wrote to memory of 2884 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 40 PID 2368 wrote to memory of 2116 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 43 PID 2368 wrote to memory of 2116 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 43 PID 2368 wrote to memory of 2116 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 43 PID 2368 wrote to memory of 2116 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 43 PID 2368 wrote to memory of 664 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 45 PID 2368 wrote to memory of 664 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 45 PID 2368 wrote to memory of 664 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 45 PID 2368 wrote to memory of 664 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 45 PID 2368 wrote to memory of 1940 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 47 PID 2368 wrote to memory of 1940 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 47 PID 2368 wrote to memory of 1940 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 47 PID 2368 wrote to memory of 1940 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 47 PID 2368 wrote to memory of 1176 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 49 PID 2368 wrote to memory of 1176 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 49 PID 2368 wrote to memory of 1176 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 49 PID 2368 wrote to memory of 1176 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 49 PID 2368 wrote to memory of 1464 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 50 PID 2368 wrote to memory of 1464 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 50 PID 2368 wrote to memory of 1464 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 50 PID 2368 wrote to memory of 1464 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 50 PID 2368 wrote to memory of 1716 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 53 PID 2368 wrote to memory of 1716 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 53 PID 2368 wrote to memory of 1716 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 53 PID 2368 wrote to memory of 1716 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 53 PID 2368 wrote to memory of 2756 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 55 PID 2368 wrote to memory of 2756 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 55 PID 2368 wrote to memory of 2756 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 55 PID 2368 wrote to memory of 2756 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 55 PID 2368 wrote to memory of 2728 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 57 PID 2368 wrote to memory of 2728 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 57 PID 2368 wrote to memory of 2728 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 57 PID 2368 wrote to memory of 2728 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 57 PID 2368 wrote to memory of 1936 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 60 PID 2368 wrote to memory of 1936 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 60 PID 2368 wrote to memory of 1936 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 60 PID 2368 wrote to memory of 1936 2368 2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\2023-08-26_b7d479cf717d58bd74e0f88d9f1197d8_mafia_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2560
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2412
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2440
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2492
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2468
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2448
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2884
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2116
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1176
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1464
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1936
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1392
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2692
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2016
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1084
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2316
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2272
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2840
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:3036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2260
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:396
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2240
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2696
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1748
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:3068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1092
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2040
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2080
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2200
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2852
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2324
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2868
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1452
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2584
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2532
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1892
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1492
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2428
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1972
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2400
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2384
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1056
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1724
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1460
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2764
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:796
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1928
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1548
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1060
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1628
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:3060
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2824
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1488
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:3052
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:932
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2296
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2232
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:668
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1288
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1360
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:552
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2172
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2372
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2220
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2684
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1744
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1456
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2508
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2248
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2628
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2568
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2416
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2892
-