Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe
-
Size
250KB
-
MD5
d8c9cd65d4d43699185c36637f25e04b
-
SHA1
f76ceae11ad0a7ee1fd846ba49491add1935ab4a
-
SHA256
89798b4824c070ccb944723fc5c162a34562b9184b02eed7aa153eea8e41ef3d
-
SHA512
1892d9d778396a0e8f1691a25d7fa3c0e88db6b8f6dbd9fe040526f376cfa222cc0225eefd735882dffdf579867eb273e86704ce2fdebf176ba54c67122b901c
-
SSDEEP
3072:7/yK5d0Gj0+nY3uEBLvBNfdUR2/qFnB8o2+vU3WuvIBuj00nReaXkuSQ7cdOdP:7/y20Gj0r+EBFrkvlU3RvIUDOIB
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/880-4-0x0000000000400000-0x0000000000444000-memory.dmp family_gandcrab behavioral1/memory/880-5-0x00000000002B0000-0x00000000002C7000-memory.dmp family_gandcrab behavioral1/memory/880-13-0x0000000000400000-0x0000000000444000-memory.dmp family_gandcrab behavioral1/memory/880-15-0x00000000002B0000-0x00000000002C7000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rdweivgsins = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\ulkldu.exe\"" NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\L: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\M: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\O: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\T: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\A: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\E: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\I: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\U: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\V: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\X: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\G: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\H: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\N: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\B: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\Y: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\R: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\S: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\W: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\Z: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\J: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\P: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe File opened (read-only) \??\Q: NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 2752 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 28 PID 880 wrote to memory of 2752 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 28 PID 880 wrote to memory of 2752 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 28 PID 880 wrote to memory of 2752 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 28 PID 880 wrote to memory of 2724 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 30 PID 880 wrote to memory of 2724 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 30 PID 880 wrote to memory of 2724 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 30 PID 880 wrote to memory of 2724 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 30 PID 880 wrote to memory of 2736 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 32 PID 880 wrote to memory of 2736 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 32 PID 880 wrote to memory of 2736 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 32 PID 880 wrote to memory of 2736 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 32 PID 880 wrote to memory of 2628 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 34 PID 880 wrote to memory of 2628 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 34 PID 880 wrote to memory of 2628 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 34 PID 880 wrote to memory of 2628 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 34 PID 880 wrote to memory of 2548 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 36 PID 880 wrote to memory of 2548 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 36 PID 880 wrote to memory of 2548 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 36 PID 880 wrote to memory of 2548 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 36 PID 880 wrote to memory of 1636 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 38 PID 880 wrote to memory of 1636 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 38 PID 880 wrote to memory of 1636 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 38 PID 880 wrote to memory of 1636 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 38 PID 880 wrote to memory of 2612 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 40 PID 880 wrote to memory of 2612 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 40 PID 880 wrote to memory of 2612 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 40 PID 880 wrote to memory of 2612 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 40 PID 880 wrote to memory of 3032 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 42 PID 880 wrote to memory of 3032 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 42 PID 880 wrote to memory of 3032 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 42 PID 880 wrote to memory of 3032 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 42 PID 880 wrote to memory of 2472 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 44 PID 880 wrote to memory of 2472 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 44 PID 880 wrote to memory of 2472 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 44 PID 880 wrote to memory of 2472 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 44 PID 880 wrote to memory of 2592 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 46 PID 880 wrote to memory of 2592 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 46 PID 880 wrote to memory of 2592 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 46 PID 880 wrote to memory of 2592 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 46 PID 880 wrote to memory of 2756 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 48 PID 880 wrote to memory of 2756 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 48 PID 880 wrote to memory of 2756 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 48 PID 880 wrote to memory of 2756 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 48 PID 880 wrote to memory of 2848 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 50 PID 880 wrote to memory of 2848 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 50 PID 880 wrote to memory of 2848 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 50 PID 880 wrote to memory of 2848 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 50 PID 880 wrote to memory of 2940 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 52 PID 880 wrote to memory of 2940 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 52 PID 880 wrote to memory of 2940 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 52 PID 880 wrote to memory of 2940 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 52 PID 880 wrote to memory of 580 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 54 PID 880 wrote to memory of 580 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 54 PID 880 wrote to memory of 580 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 54 PID 880 wrote to memory of 580 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 54 PID 880 wrote to memory of 2024 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 56 PID 880 wrote to memory of 2024 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 56 PID 880 wrote to memory of 2024 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 56 PID 880 wrote to memory of 2024 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 56 PID 880 wrote to memory of 1816 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 60 PID 880 wrote to memory of 1816 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 60 PID 880 wrote to memory of 1816 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 60 PID 880 wrote to memory of 1816 880 NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.2023-09-06_d8c9cd65d4d43699185c36637f25e04b_mafia_JC.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2724
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2628
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2548
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1636
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:3032
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2472
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2592
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2848
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2024
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1816
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2400
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1176
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1644
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1436
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1556
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1344
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2236
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2372
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2320
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2288
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1664
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1096
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:432
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2316
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1924
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1060
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:640
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2416
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2168
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2068
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2128
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1624
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2060
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1712
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2868
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:3044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1452
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2672
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1748
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2504
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2084
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2540
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2968
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2780
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2856
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:576
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:688
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:588
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1496
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2740
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2256
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1416
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2420
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1632
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1236
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2344
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2364
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2180
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2332
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:996
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:3028
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1144
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1800
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1360
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:3048
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1736
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:612
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2116
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1504
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1892
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:876
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:1960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2708
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:1660
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:3020
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2596
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2204
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2764
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2608
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2776
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2604
-