Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 02:30 UTC
Behavioral task
behavioral1
Sample
2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe
-
Size
167KB
-
MD5
e0aa5dad1156a7bf96c5d516e0e65e2e
-
SHA1
e28121899aecfad7406811a51a0c5bc8b359e29f
-
SHA256
ae2c6195bd01c093fd74dabd9df9ace3fc59a418fb3b4e386b1287fd204bbf47
-
SHA512
569694bb6fd48d96206ba9cd6e7442909780ef9a48fc2e00914fededc126bc36e051e4570b7ad67dff3f4381739826f9fd0a933fe7fcd4ada5d684e8192c60c1
-
SSDEEP
3072:DYHVHd2NFMqqDL2/mr3IdE8we0Avu5r++ygLIaa4jRv9OtNZped:DyZqqDL6oREzZpK
Malware Config
Signatures
-
GandCrab payload 2 IoCs
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x000000000042C000-memory.dmp family_gandcrab behavioral2/memory/3700-4-0x0000000000400000-0x000000000042C000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\iedskxlaesh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe" 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\N: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\O: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\R: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\V: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\Z: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\A: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\B: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\J: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\K: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\L: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\M: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\Y: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\E: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\H: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\S: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\T: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\I: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\P: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\W: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\X: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\Q: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe File opened (read-only) \??\U: 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe -
resource yara_rule behavioral2/memory/3700-0-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/memory/3700-4-0x0000000000400000-0x000000000042C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3448 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 87 PID 3700 wrote to memory of 3448 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 87 PID 3700 wrote to memory of 3448 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 87 PID 3700 wrote to memory of 1636 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 97 PID 3700 wrote to memory of 1636 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 97 PID 3700 wrote to memory of 1636 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 97 PID 3700 wrote to memory of 3192 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 102 PID 3700 wrote to memory of 3192 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 102 PID 3700 wrote to memory of 3192 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 102 PID 3700 wrote to memory of 4348 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 108 PID 3700 wrote to memory of 4348 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 108 PID 3700 wrote to memory of 4348 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 108 PID 3700 wrote to memory of 212 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 114 PID 3700 wrote to memory of 212 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 114 PID 3700 wrote to memory of 212 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 114 PID 3700 wrote to memory of 1340 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 118 PID 3700 wrote to memory of 1340 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 118 PID 3700 wrote to memory of 1340 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 118 PID 3700 wrote to memory of 3964 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 123 PID 3700 wrote to memory of 3964 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 123 PID 3700 wrote to memory of 3964 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 123 PID 3700 wrote to memory of 2420 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 127 PID 3700 wrote to memory of 2420 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 127 PID 3700 wrote to memory of 2420 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 127 PID 3700 wrote to memory of 1076 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 131 PID 3700 wrote to memory of 1076 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 131 PID 3700 wrote to memory of 1076 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 131 PID 3700 wrote to memory of 3708 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 140 PID 3700 wrote to memory of 3708 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 140 PID 3700 wrote to memory of 3708 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 140 PID 3700 wrote to memory of 1792 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 147 PID 3700 wrote to memory of 1792 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 147 PID 3700 wrote to memory of 1792 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 147 PID 3700 wrote to memory of 1176 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 151 PID 3700 wrote to memory of 1176 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 151 PID 3700 wrote to memory of 1176 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 151 PID 3700 wrote to memory of 3304 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 155 PID 3700 wrote to memory of 3304 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 155 PID 3700 wrote to memory of 3304 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 155 PID 3700 wrote to memory of 5084 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 162 PID 3700 wrote to memory of 5084 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 162 PID 3700 wrote to memory of 5084 3700 2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe 162
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3192
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:2420
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
C:\Windows\SysWOW64\nslookup.exenslookup gandcrab.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Windows\SysWOW64\nslookup.exenslookup nomoreransom.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Windows\SysWOW64\nslookup.exenslookup emsisoft.bit dns1.soprodns.ru2⤵
- System Location Discovery: System Language Discovery
PID:5084
-
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestipv4bot.whatismyipaddress.comIN AResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request55.36.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request212.20.149.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request75.117.19.2.in-addr.arpaIN PTRResponse75.117.19.2.in-addr.arpaIN PTRa2-19-117-75deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAA
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN A
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAA
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.58.199.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360264291_1OMXAE3VFGJI9A76K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239360264291_1OMXAE3VFGJI9A76K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 401499
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: FDB701BD900F42D6BE48F66E4690BE6F Ref B: LON601060103062 Ref C: 2024-10-15T02:32:51Z
date: Tue, 15 Oct 2024 02:32:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418595_19TRV8HP5YIGTZD3I&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239340418595_19TRV8HP5YIGTZD3I&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 787151
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 29846D36C57840A5A1785F47F99C11C9 Ref B: LON601060103062 Ref C: 2024-10-15T02:32:51Z
date: Tue, 15 Oct 2024 02:32:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239360264303_1FV8HLP8B8WOIRSCV&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239360264303_1FV8HLP8B8WOIRSCV&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 585223
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 5BA86C51210D4E36BF450FE3537E5A5D Ref B: LON601060103062 Ref C: 2024-10-15T02:32:51Z
date: Tue, 15 Oct 2024 02:32:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301035_1FUDWJ8GFFIFDV49E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301035_1FUDWJ8GFFIFDV49E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 1054100
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: EA2EC0D930BA42C7B36F20E7A697B6F7 Ref B: LON601060103062 Ref C: 2024-10-15T02:32:51Z
date: Tue, 15 Oct 2024 02:32:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418596_1ZW2YDLAK01V77NJD&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239340418596_1ZW2YDLAK01V77NJD&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 604398
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: F1E97A202098462E9F96A95BB8D4D475 Ref B: LON601060103062 Ref C: 2024-10-15T02:32:51Z
date: Tue, 15 Oct 2024 02:32:51 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301468_1K7Q0DK1RQ5AV6436&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301468_1K7Q0DK1RQ5AV6436&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 1020983
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 973FC4C021F64F8F96361F576DFD3845 Ref B: LON601060103062 Ref C: 2024-10-15T02:32:53Z
date: Tue, 15 Oct 2024 02:32:53 GMT
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AResponse
-
Remote address:8.8.8.8:53Requestgandcrab.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AResponse
-
Remote address:8.8.8.8:53Requestnomoreransom.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestdns1.soprodns.ruIN AResponse
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AResponse
-
Remote address:8.8.8.8:53Requestemsisoft.bitIN AAAAResponse
-
Remote address:8.8.8.8:53Request10.173.189.20.in-addr.arpaIN PTRResponse
-
1.4kB 6.8kB 15 10
-
1.3kB 6.8kB 14 10
-
150.171.27.10:443https://tse1.mm.bing.net/th?id=OADD2.10239317301468_1K7Q0DK1RQ5AV6436&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2157.4kB 4.6MB 3371 3361
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360264291_1OMXAE3VFGJI9A76K&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418595_19TRV8HP5YIGTZD3I&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239360264303_1FV8HLP8B8WOIRSCV&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301035_1FUDWJ8GFFIFDV49E&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418596_1ZW2YDLAK01V77NJD&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301468_1K7Q0DK1RQ5AV6436&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200 -
1.2kB 6.9kB 15 11
-
1.2kB 6.9kB 15 11
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
20.160.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
8.8.8.8:53ipv4bot.whatismyipaddress.comdns2024-10-15_e0aa5dad1156a7bf96c5d516e0e65e2e_gandcrab.exe75 B 134 B 1 1
DNS Request
ipv4bot.whatismyipaddress.com
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
71 B 157 B 1 1
DNS Request
55.36.223.20.in-addr.arpa
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
72 B 146 B 1 1
DNS Request
212.20.149.52.in-addr.arpa
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
70 B 133 B 1 1
DNS Request
75.117.19.2.in-addr.arpa
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
124 B 123 B 2 1
DNS Request
dns1.soprodns.ru
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
43.58.199.20.in-addr.arpa
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.27.10150.171.28.10
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
124 B 246 B 2 2
DNS Request
dns1.soprodns.ru
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
58 B 133 B 1 1
DNS Request
gandcrab.bit
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 137 B 1 1
DNS Request
nomoreransom.bit
-
62 B 123 B 1 1
DNS Request
dns1.soprodns.ru
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
58 B 133 B 1 1
DNS Request
emsisoft.bit
-
72 B 158 B 1 1
DNS Request
10.173.189.20.in-addr.arpa