Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
O8ZHhytWhn.exe

Overview

General Information

Sample Name:O8ZHhytWhn.exe
Analysis ID:694558
MD5:b39febf7440b58a6cd15ae9f01916f98
SHA1:66984e561fc5feead5ef9790f79bffd7778ac1e2
SHA256:9c689986ca8e0b4fd93657ad9ed5c37994ccf591c90d5fba85684f2d0f49e1b9
Tags:exe
Infos:

Detection

Gandcrab, ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected ReflectiveLoader
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Snort IDS alert for network traffic
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to determine the online IP of the system
Found Tor onion address
Uses nslookup.exe to query domains
Machine Learning detection for sample
May check the online IP address of the machine
Performs many domain queries via nslookup
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Queries information about the installed CPU (vendor, model number etc)
Drops PE files
Contains functionality to read the PEB
Found evaded block containing many API calls
Contains functionality to enumerate device drivers
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • O8ZHhytWhn.exe (PID: 5900 cmdline: "C:\Users\user\Desktop\O8ZHhytWhn.exe" MD5: B39FEBF7440B58A6CD15AE9F01916F98)
    • nslookup.exe (PID: 3600 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 3116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5496 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 3220 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4404 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5224 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4508 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5732 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 2980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4540 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 6132 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5896 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 1548 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5864 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 3840 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 588 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4412 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4928 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5972 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 6012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5164 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5644 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 2300 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5860 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 6052 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 540 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 2800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 6072 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 3144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4324 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 1252 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
  • wjaoab.exe (PID: 5444 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe" MD5: A1E6F4D9E1AF5740E07B86A42C6C430B)
  • wjaoab.exe (PID: 2888 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe" MD5: A1E6F4D9E1AF5740E07B86A42C6C430B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
O8ZHhytWhn.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
  • 0xed22:$x1: ReflectiveLoader
O8ZHhytWhn.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
  • 0xe67e:$: DECRYPT.txt
  • 0xe6e4:$: DECRYPT.txt
O8ZHhytWhn.exeJoeSecurity_GandcrabYara detected GandcrabJoe Security
    O8ZHhytWhn.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      O8ZHhytWhn.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
      • 0xed21:$s1: _ReflectiveLoader@
      • 0xed22:$s2: ReflectiveLoader@
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
      • 0xed22:$x1: ReflectiveLoader
      C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
      • 0xe67e:$: DECRYPT.txt
      • 0xe6e4:$: DECRYPT.txt
      C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeJoeSecurity_GandcrabYara detected GandcrabJoe Security
        C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
          C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
          • 0xed21:$s1: _ReflectiveLoader@
          • 0xed22:$s2: ReflectiveLoader@
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          00000019.00000002.311529128.000000000FBCA000.00000002.00000001.01000000.00000006.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
            00000000.00000000.248593701.000000000F1E2000.00000008.00000001.01000000.00000003.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
              00000000.00000002.517623653.000000000F1DA000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                00000019.00000000.308682011.000000000FBD2000.00000008.00000001.01000000.00000006.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
                  00000009.00000000.289875664.000000000FBD2000.00000008.00000001.01000000.00000006.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
                    Click to see the 13 entries
                    SourceRuleDescriptionAuthorStrings
                    9.0.wjaoab.exe.fbc0000.0.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
                    • 0xed22:$x1: ReflectiveLoader
                    9.0.wjaoab.exe.fbc0000.0.unpackSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
                    • 0xe67e:$: DECRYPT.txt
                    • 0xe6e4:$: DECRYPT.txt
                    9.0.wjaoab.exe.fbc0000.0.unpackJoeSecurity_GandcrabYara detected GandcrabJoe Security
                      9.0.wjaoab.exe.fbc0000.0.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                        9.0.wjaoab.exe.fbc0000.0.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
                        • 0xed21:$s1: _ReflectiveLoader@
                        • 0xed22:$s2: ReflectiveLoader@
                        Click to see the 31 entries
                        No Sigma rule has matched
                        Timestamp:192.168.2.78.8.8.859550532026737 08/31/22-23:50:37.016810
                        SID:2026737
                        Source Port:59550
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.852106532026737 08/31/22-23:49:25.641298
                        SID:2026737
                        Source Port:52106
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851142532829498 08/31/22-23:49:32.319799
                        SID:2829498
                        Source Port:51142
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861174532829498 08/31/22-23:50:40.415440
                        SID:2829498
                        Source Port:61174
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.854194532829498 08/31/22-23:50:17.451854
                        SID:2829498
                        Source Port:54194
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862910532026737 08/31/22-23:50:41.844460
                        SID:2026737
                        Source Port:62910
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859114532829498 08/31/22-23:50:50.899719
                        SID:2829498
                        Source Port:59114
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863192532829498 08/31/22-23:50:10.372925
                        SID:2829498
                        Source Port:63192
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858786532026737 08/31/22-23:49:35.365431
                        SID:2026737
                        Source Port:58786
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850026532026737 08/31/22-23:49:12.853058
                        SID:2026737
                        Source Port:50026
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.856776532829498 08/31/22-23:50:31.949356
                        SID:2829498
                        Source Port:56776
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851012532026737 08/31/22-23:49:06.034483
                        SID:2026737
                        Source Port:51012
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862438532026737 08/31/22-23:49:47.214941
                        SID:2026737
                        Source Port:62438
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.860840532829498 08/31/22-23:50:23.078640
                        SID:2829498
                        Source Port:60840
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.864080532829498 08/31/22-23:49:52.783908
                        SID:2829498
                        Source Port:64080
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861175532829498 08/31/22-23:50:40.433841
                        SID:2829498
                        Source Port:61175
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858288532829498 08/31/22-23:49:10.646822
                        SID:2829498
                        Source Port:58288
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.852107532026737 08/31/22-23:49:25.661867
                        SID:2026737
                        Source Port:52107
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.856775532829498 08/31/22-23:50:31.927813
                        SID:2829498
                        Source Port:56775
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862020532026737 08/31/22-23:50:18.955251
                        SID:2026737
                        Source Port:62020
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858751532829498 08/31/22-23:49:44.095609
                        SID:2829498
                        Source Port:58751
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859548532026737 08/31/22-23:50:36.965761
                        SID:2026737
                        Source Port:59548
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863191532829498 08/31/22-23:50:10.354216
                        SID:2829498
                        Source Port:63191
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858750532829498 08/31/22-23:49:44.071935
                        SID:2829498
                        Source Port:58750
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853340532829498 08/31/22-23:49:03.740944
                        SID:2829498
                        Source Port:53340
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851141532829498 08/31/22-23:49:32.298424
                        SID:2829498
                        Source Port:51141
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863296532026737 08/31/22-23:50:48.003146
                        SID:2026737
                        Source Port:63296
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850233532026737 08/31/22-23:49:59.196489
                        SID:2026737
                        Source Port:50233
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862684532829498 08/31/22-23:49:22.306534
                        SID:2829498
                        Source Port:62684
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861183532026737 08/31/22-23:48:55.804714
                        SID:2026737
                        Source Port:61183
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.854195532829498 08/31/22-23:50:17.469831
                        SID:2829498
                        Source Port:54195
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.860841532829498 08/31/22-23:50:23.096845
                        SID:2829498
                        Source Port:60841
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862021532026737 08/31/22-23:50:18.975380
                        SID:2026737
                        Source Port:62021
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.855836532026737 08/31/22-23:50:24.524842
                        SID:2026737
                        Source Port:55836
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851143532829498 08/31/22-23:49:32.344159
                        SID:2829498
                        Source Port:51143
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.864083532829498 08/31/22-23:49:52.867185
                        SID:2829498
                        Source Port:64083
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858788532026737 08/31/22-23:49:35.533597
                        SID:2026737
                        Source Port:58788
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850509532829498 08/31/22-23:48:51.586247
                        SID:2829498
                        Source Port:50509
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862436532026737 08/31/22-23:49:47.175608
                        SID:2026737
                        Source Port:62436
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851440532829498 08/31/22-23:50:03.437869
                        SID:2829498
                        Source Port:51440
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853640532026737 08/31/22-23:50:13.786207
                        SID:2026737
                        Source Port:53640
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862911532026737 08/31/22-23:50:41.864871
                        SID:2026737
                        Source Port:62911
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853339532829498 08/31/22-23:49:03.720004
                        SID:2829498
                        Source Port:53339
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862023532026737 08/31/22-23:50:19.013875
                        SID:2026737
                        Source Port:62023
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.855834532026737 08/31/22-23:50:24.482691
                        SID:2026737
                        Source Port:55834
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858749532829498 08/31/22-23:49:44.051138
                        SID:2829498
                        Source Port:58749
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858286532829498 08/31/22-23:49:10.608212
                        SID:2829498
                        Source Port:58286
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851011532026737 08/31/22-23:49:06.014113
                        SID:2026737
                        Source Port:51011
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851439532829498 08/31/22-23:50:03.414505
                        SID:2829498
                        Source Port:51439
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859849532829498 08/31/22-23:50:46.658424
                        SID:2829498
                        Source Port:59849
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850027532026737 08/31/22-23:49:12.888248
                        SID:2026737
                        Source Port:50027
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859850532829498 08/31/22-23:50:46.682797
                        SID:2829498
                        Source Port:59850
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863294532026737 08/31/22-23:50:47.961479
                        SID:2026737
                        Source Port:63294
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859115532829498 08/31/22-23:50:50.920149
                        SID:2829498
                        Source Port:59115
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862682532829498 08/31/22-23:49:22.268041
                        SID:2829498
                        Source Port:62682
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859551532026737 08/31/22-23:50:37.037427
                        SID:2026737
                        Source Port:59551
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850235532026737 08/31/22-23:49:59.234950
                        SID:2026737
                        Source Port:50235
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861181532026737 08/31/22-23:48:55.077736
                        SID:2026737
                        Source Port:61181
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862022532026737 08/31/22-23:50:18.995399
                        SID:2026737
                        Source Port:62022
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853642532026737 08/31/22-23:50:13.835822
                        SID:2026737
                        Source Port:53642
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850507532829498 08/31/22-23:48:51.544537
                        SID:2829498
                        Source Port:50507
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.856773532829498 08/31/22-23:50:31.838450
                        SID:2829498
                        Source Port:56773
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.854197532829498 08/31/22-23:50:17.513889
                        SID:2829498
                        Source Port:54197
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.860839532829498 08/31/22-23:50:23.058563
                        SID:2829498
                        Source Port:60839
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.855835532026737 08/31/22-23:50:24.503509
                        SID:2026737
                        Source Port:55835
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853338532829498 08/31/22-23:49:03.694333
                        SID:2829498
                        Source Port:53338
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861177532829498 08/31/22-23:50:40.475632
                        SID:2829498
                        Source Port:61177
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850510532829498 08/31/22-23:48:51.605938
                        SID:2829498
                        Source Port:50510
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853639532026737 08/31/22-23:50:13.763933
                        SID:2026737
                        Source Port:53639
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858789532026737 08/31/22-23:49:35.553154
                        SID:2026737
                        Source Port:58789
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859057532026737 08/31/22-23:50:05.762357
                        SID:2026737
                        Source Port:59057
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862913532026737 08/31/22-23:50:41.903498
                        SID:2026737
                        Source Port:62913
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862435532026737 08/31/22-23:49:47.157448
                        SID:2026737
                        Source Port:62435
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853341532829498 08/31/22-23:49:03.761474
                        SID:2829498
                        Source Port:53341
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862683532829498 08/31/22-23:49:22.288385
                        SID:2829498
                        Source Port:62683
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.852109532026737 08/31/22-23:49:25.724789
                        SID:2026737
                        Source Port:52109
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850029532026737 08/31/22-23:49:12.927716
                        SID:2026737
                        Source Port:50029
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.864082532829498 08/31/22-23:49:52.826347
                        SID:2829498
                        Source Port:64082
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859056532026737 08/31/22-23:50:05.744186
                        SID:2026737
                        Source Port:59056
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850508532829498 08/31/22-23:48:51.564977
                        SID:2829498
                        Source Port:50508
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.856774532829498 08/31/22-23:50:31.909568
                        SID:2829498
                        Source Port:56774
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859117532829498 08/31/22-23:50:50.958695
                        SID:2829498
                        Source Port:59117
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.864081532829498 08/31/22-23:49:52.807469
                        SID:2829498
                        Source Port:64081
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.852108532026737 08/31/22-23:49:25.704474
                        SID:2026737
                        Source Port:52108
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862437532026737 08/31/22-23:49:47.194217
                        SID:2026737
                        Source Port:62437
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859116532829498 08/31/22-23:50:50.938342
                        SID:2829498
                        Source Port:59116
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859058532026737 08/31/22-23:50:05.782380
                        SID:2026737
                        Source Port:59058
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859851532829498 08/31/22-23:50:46.705234
                        SID:2829498
                        Source Port:59851
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851010532026737 08/31/22-23:49:05.994077
                        SID:2026737
                        Source Port:51010
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862681532829498 08/31/22-23:49:22.247182
                        SID:2829498
                        Source Port:62681
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851438532829498 08/31/22-23:50:03.395466
                        SID:2829498
                        Source Port:51438
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.862912532026737 08/31/22-23:50:41.885084
                        SID:2026737
                        Source Port:62912
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850028532026737 08/31/22-23:49:12.908519
                        SID:2026737
                        Source Port:50028
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859055532026737 08/31/22-23:50:05.722794
                        SID:2026737
                        Source Port:59055
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.853641532026737 08/31/22-23:50:13.814014
                        SID:2026737
                        Source Port:53641
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.855833532026737 08/31/22-23:50:24.464562
                        SID:2026737
                        Source Port:55833
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863293532026737 08/31/22-23:50:47.940116
                        SID:2026737
                        Source Port:63293
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850236532026737 08/31/22-23:49:59.285144
                        SID:2026737
                        Source Port:50236
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858287532829498 08/31/22-23:49:10.628422
                        SID:2829498
                        Source Port:58287
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851144532829498 08/31/22-23:49:32.366090
                        SID:2829498
                        Source Port:51144
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861176532829498 08/31/22-23:50:40.454136
                        SID:2829498
                        Source Port:61176
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859848532829498 08/31/22-23:50:46.635471
                        SID:2829498
                        Source Port:59848
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861180532026737 08/31/22-23:48:54.987434
                        SID:2026737
                        Source Port:61180
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851441532829498 08/31/22-23:50:03.458729
                        SID:2829498
                        Source Port:51441
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.851009532026737 08/31/22-23:49:05.970413
                        SID:2026737
                        Source Port:51009
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.859549532026737 08/31/22-23:50:36.986127
                        SID:2026737
                        Source Port:59549
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863295532026737 08/31/22-23:50:47.982626
                        SID:2026737
                        Source Port:63295
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.850234532026737 08/31/22-23:49:59.216727
                        SID:2026737
                        Source Port:50234
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.861182532026737 08/31/22-23:48:55.097916
                        SID:2026737
                        Source Port:61182
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858285532829498 08/31/22-23:49:10.587711
                        SID:2829498
                        Source Port:58285
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863189532829498 08/31/22-23:50:10.316381
                        SID:2829498
                        Source Port:63189
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858748532829498 08/31/22-23:49:44.032896
                        SID:2829498
                        Source Port:58748
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.854196532829498 08/31/22-23:50:17.488065
                        SID:2829498
                        Source Port:54196
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.863190532829498 08/31/22-23:50:10.336236
                        SID:2829498
                        Source Port:63190
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.860842532829498 08/31/22-23:50:23.114941
                        SID:2829498
                        Source Port:60842
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.78.8.8.858787532026737 08/31/22-23:49:35.450533
                        SID:2026737
                        Source Port:58787
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: O8ZHhytWhn.exeVirustotal: Detection: 87%Perma Link
                        Source: O8ZHhytWhn.exeMetadefender: Detection: 78%Perma Link
                        Source: O8ZHhytWhn.exeReversingLabs: Detection: 92%
                        Source: O8ZHhytWhn.exeAvira: detected
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeAvira: detection malicious, Label: TR/Dropper.Gen
                        Source: O8ZHhytWhn.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeJoe Sandbox ML: detected
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D4950 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D5880 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D62B0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D82A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D5210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D5670 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC4950 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC62B0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC82A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC5880 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC5210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC5670 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC4950 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC62B0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC82A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC5880 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC5210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC5670 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: O8ZHhytWhn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: O8ZHhytWhn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: z:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: x:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: v:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: t:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: r:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: p:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: n:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: l:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: j:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: h:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: f:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: b:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: y:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: w:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: u:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: s:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: q:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: o:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: m:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: k:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: i:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: g:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: e:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile opened: a:
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:50507 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:50508 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:50509 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:50510 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:61180 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:61181 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:61182 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:61183 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:53338 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:53339 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:53340 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:53341 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:51009 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:51010 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:51011 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:51012 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58285 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58286 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58287 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58288 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50026 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50027 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50028 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50029 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:62681 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:62682 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:62683 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:62684 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:52106 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:52107 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:52108 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:52109 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51141 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51142 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51143 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51144 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:58786 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:58787 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:58788 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:58789 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58748 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58749 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58750 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:58751 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62435 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62436 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62437 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62438 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:64080 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:64081 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:64082 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:64083 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50233 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50234 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50235 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:50236 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51438 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51439 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51440 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:51441 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59055 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59056 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59057 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59058 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:63189 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:63190 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:63191 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:63192 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:53639 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:53640 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:53641 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:53642 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:54194 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:54195 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:54196 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:54197 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62020 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62021 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62022 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62023 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:60839 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:60840 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:60841 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:60842 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:55833 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:55834 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:55835 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:55836 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:56773 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:56774 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:56775 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:56776 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59548 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59549 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59550 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:59551 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:61174 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:61175 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:61176 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:61177 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62910 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62911 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62912 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:62913 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59848 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59849 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59850 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59851 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:63293 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:63294 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:63295 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.7:63296 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59114 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59115 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59116 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.7:59117 -> 8.8.8.8:53
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: O8ZHhytWhn.exe, 00000000.00000000.248593701.000000000F1E2000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: O8ZHhytWhn.exe, 00000000.00000002.517637468.000000000F1E2000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: wjaoab.exe, 00000009.00000000.289875664.000000000FBD2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: wjaoab.exe, 00000019.00000000.308682011.000000000FBD2000.00000008.00000001.01000000.00000006.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: O8ZHhytWhn.exeString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: wjaoab.exe.0.drString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: O8ZHhytWhn.exe, wjaoab.exe.0.drString found in binary or memory: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: O8ZHhytWhn.exe, wjaoab.exe.0.drString found in binary or memory: https://tox.chat/download.html
                        Source: O8ZHhytWhn.exe, wjaoab.exe.0.drString found in binary or memory: https://www.torproject.org/
                        Source: unknownDNS traffic detected: queries for: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D7EF0 lstrcatW,InternetCloseHandle,InternetConnectW,VirtualAlloc,wsprintfW,HttpOpenRequestW,HttpAddRequestHeadersW,HttpSendRequestW,InternetReadFile,InternetReadFile,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,VirtualFree,

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: Yara matchFile source: O8ZHhytWhn.exe, type: SAMPLE
                        Source: Yara matchFile source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000000.248593701.000000000F1E2000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000000.308682011.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000000.289875664.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.293155621.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.517637468.000000000F1E2000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000002.311539070.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: O8ZHhytWhn.exe PID: 5900, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: wjaoab.exe PID: 5444, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: wjaoab.exe PID: 2888, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPED
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: nslookup.exeProcess created: 48

                        System Summary

                        barindex
                        Source: O8ZHhytWhn.exe, type: SAMPLEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: O8ZHhytWhn.exe, type: SAMPLEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPEDMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPEDMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: O8ZHhytWhn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: O8ZHhytWhn.exe, type: SAMPLEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: O8ZHhytWhn.exe, type: SAMPLEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: O8ZHhytWhn.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: O8ZHhytWhn.exe, type: SAMPLEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPEDMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPEDMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPEDMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D1C20
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D1020
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D83C0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC83C0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC1C20
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC1020
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC83C0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC1C20
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC1020
                        Source: O8ZHhytWhn.exeVirustotal: Detection: 87%
                        Source: O8ZHhytWhn.exeMetadefender: Detection: 78%
                        Source: O8ZHhytWhn.exeReversingLabs: Detection: 92%
                        Source: O8ZHhytWhn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: unknownProcess created: C:\Users\user\Desktop\O8ZHhytWhn.exe "C:\Users\user\Desktop\O8ZHhytWhn.exe"
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe "C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe "C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeJump to behavior
                        Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@89/2@278/1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D7330 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D7A10 wsprintfW,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,CreateToolhelp32Snapshot,VirtualFree,Process32FirstW,lstrcmpiW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,Process32NextW,GetLastError,lstrlenW,VirtualFree,VirtualFree,FindCloseChangeNotification,VirtualFree,
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3116:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1840:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5588:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6012:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5708:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2300:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5944:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5184:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5928:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5376:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:160:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2800:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3144:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:588:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4908:120:WilError_01
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeMutant created: \Sessions\1\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=4afbeea82d32d45
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2980:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1352:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4824:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4372:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1836:120:WilError_01
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hosts
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hosts
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hosts
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hosts
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: O8ZHhytWhn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH

                        Data Obfuscation

                        barindex
                        Source: Yara matchFile source: O8ZHhytWhn.exe, type: SAMPLE
                        Source: Yara matchFile source: 9.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 25.0.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.O8ZHhytWhn.exe.f1d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.wjaoab.exe.fbc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000019.00000002.311529128.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.517623653.000000000F1DA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000000.289867124.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.293144665.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000019.00000000.308674547.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.248569401.000000000F1DA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: O8ZHhytWhn.exe PID: 5900, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: wjaoab.exe PID: 5444, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: wjaoab.exe PID: 2888, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, type: DROPPED
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeJump to dropped file
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wzugsdsqebhJump to behavior
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wzugsdsqebhJump to behavior
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wzugsdsqebhJump to behavior
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wzugsdsqebhJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exe TID: 4528Thread sleep count: 40 > 30
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exe TID: 4528Thread sleep time: -40000s >= -30000s
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeEvaded block: after key decision
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeEvaded block: after key decision
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: EnumDeviceDrivers,EnumDeviceDrivers,VirtualAlloc,EnumDeviceDrivers,GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: EnumDeviceDrivers,EnumDeviceDrivers,VirtualAlloc,EnumDeviceDrivers,GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeSystem information queried: ModuleInformation
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D5210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D5EC0 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 9_2_0FBC5EC0 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeCode function: 25_2_0FBC5EC0 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D3AA0 AllocateAndInitializeSid,GetModuleHandleA,GetProcAddress,FreeSid,
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D90A0 cpuid
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Users\user\Desktop\O8ZHhytWhn.exeCode function: 0_2_0F1D7330 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        1
                        Replication Through Removable Media
                        12
                        Native API
                        1
                        Registry Run Keys / Startup Folder
                        11
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping1
                        Security Software Discovery
                        1
                        Replication Through Removable Media
                        11
                        Archive Collected Data
                        Exfiltration Over Other Network Medium2
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                        Data Encrypted for Impact
                        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        Registry Run Keys / Startup Folder
                        1
                        Virtualization/Sandbox Evasion
                        LSASS Memory1
                        Virtualization/Sandbox Evasion
                        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                        Ingress Tool Transfer
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
                        Process Injection
                        Security Account Manager1
                        Process Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                        Non-Application Layer Protocol
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                        Software Packing
                        NTDS11
                        Peripheral Device Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer1
                        Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                        Account Discovery
                        SSHKeyloggingData Transfer Size Limits1
                        Proxy
                        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
                        System Owner/User Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                        Remote System Discovery
                        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                        System Network Configuration Discovery
                        Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                        System Network Connections Discovery
                        Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                        File and Directory Discovery
                        Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                        Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture44
                        System Information Discovery
                        Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 694558 Sample: O8ZHhytWhn.exe Startdate: 31/08/2022 Architecture: WINDOWS Score: 100 57 nomoreransom.coin 2->57 59 nomoreransom.bit 2->59 61 4 other IPs or domains 2->61 65 Snort IDS alert for network traffic 2->65 67 Malicious sample detected (through community Yara rule) 2->67 69 Antivirus / Scanner detection for submitted sample 2->69 71 5 other signatures 2->71 8 O8ZHhytWhn.exe 1 28 2->8         started        13 wjaoab.exe 2->13         started        15 wjaoab.exe 2->15         started        signatures3 process4 dnsIp5 63 ipv4bot.whatismyipaddress.com 8->63 40 C:\Users\user\AppData\Roaming\...\wjaoab.exe, PE32 8->40 dropped 73 Contains functionality to determine the online IP of the system 8->73 75 May check the online IP address of the machine 8->75 77 Uses nslookup.exe to query domains 8->77 79 Performs many domain queries via nslookup 8->79 17 nslookup.exe 1 8->17         started        20 nslookup.exe 1 8->20         started        22 nslookup.exe 1 8->22         started        24 21 other processes 8->24 81 Antivirus detection for dropped file 13->81 83 Found evasive API chain (may stop execution after checking mutex) 13->83 85 Machine Learning detection for dropped file 13->85 file6 signatures7 process8 dnsIp9 42 dns1.soprodns.ru 17->42 45 nomoreransom.coin 17->45 47 8.8.8.8.in-addr.arpa 17->47 26 conhost.exe 17->26         started        51 3 other IPs or domains 20->51 28 conhost.exe 20->28         started        53 3 other IPs or domains 22->53 30 conhost.exe 22->30         started        49 nomoreransom.coin 24->49 55 63 other IPs or domains 24->55 32 conhost.exe 24->32         started        34 conhost.exe 24->34         started        36 conhost.exe 24->36         started        38 17 other processes 24->38 signatures10 87 May check the online IP address of the machine 42->87 process11

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        O8ZHhytWhn.exe87%VirustotalBrowse
                        O8ZHhytWhn.exe78%MetadefenderBrowse
                        O8ZHhytWhn.exe92%ReversingLabsWin32.Ransomware.GandCrab
                        O8ZHhytWhn.exe100%AviraTR/Dropper.Gen
                        O8ZHhytWhn.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe100%AviraTR/Dropper.Gen
                        C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLinkDownload
                        0.0.O8ZHhytWhn.exe.f1d0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        9.0.wjaoab.exe.fbc0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        25.2.wjaoab.exe.fbc0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        9.2.wjaoab.exe.fbc0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        0.2.O8ZHhytWhn.exe.f1d0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        25.0.wjaoab.exe.fbc0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        SourceDetectionScannerLabelLink
                        nomoreransom.coin2%VirustotalBrowse
                        nomoreransom.bit1%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b0%URL Reputationsafe
                        https://tox.chat/download.html0%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        nomoreransom.coin
                        unknown
                        unknowntrueunknown
                        ipv4bot.whatismyipaddress.com
                        unknown
                        unknownfalse
                          high
                          nomoreransom.bit
                          unknown
                          unknowntrueunknown
                          gandcrab.bit
                          unknown
                          unknowntrue
                            unknown
                            dns1.soprodns.ru
                            unknown
                            unknowntrue
                              unknown
                              dns2.soprodns.ru
                              unknown
                              unknowntrue
                                unknown
                                8.8.8.8.in-addr.arpa
                                unknown
                                unknownfalse
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://www.torproject.org/O8ZHhytWhn.exe, wjaoab.exe.0.drfalse
                                    high
                                    http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2bO8ZHhytWhn.exe, wjaoab.exe.0.drtrue
                                    • URL Reputation: safe
                                    unknown
                                    https://tox.chat/download.htmlO8ZHhytWhn.exe, wjaoab.exe.0.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    IP
                                    192.168.2.1
                                    Joe Sandbox Version:35.0.0 Citrine
                                    Analysis ID:694558
                                    Start date and time:2022-08-31 23:47:38 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 8m 27s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:O8ZHhytWhn.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:63
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.rans.troj.evad.winEXE@89/2@278/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 100% (good quality ratio 96%)
                                    • Quality average: 83.5%
                                    • Quality standard deviation: 24.4%
                                    HCA Information:
                                    • Successful, ratio: 99%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, eudb.ris.api.iris.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    23:48:46AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce wzugsdsqebh "C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
                                    23:48:58AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce wzugsdsqebh "C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\O8ZHhytWhn.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):2222
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:D450FF4604F32CB5D2F566F10B1FC222
                                    SHA1:51E30F18F2B90316F51899F09714CFC1B9676948
                                    SHA-256:1FE51B05C44F6C78BD31E501DF8A4D12D290CAB134663219CF3C713A604FCA35
                                    SHA-512:7B4BFAF3E1DAEFA0C140E904C67F4136951F3411BD6C8252CEAFF4F7A7B857817B03DEF803CAE00EDA7CD7DD8A1A0EC8415B9564C344FA1253ECCE1C4A5695AD
                                    Malicious:false
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\O8ZHhytWhn.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):71168
                                    Entropy (8bit):6.4214958624218355
                                    Encrypted:false
                                    SSDEEP:1536:KZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAwfMqqU+2bbbAV2/S2Lkvd9:8BounVyFHpfMqqDL2/Lkvd
                                    MD5:A1E6F4D9E1AF5740E07B86A42C6C430B
                                    SHA1:0463905CBEC8B4BADCFBD2B05B8D6B8C5BE9A56C
                                    SHA-256:0F9F6928B16927DEB69C5128BF1C72F109C31B7478CE52A5A772FE4A62A7D9C8
                                    SHA-512:C4D84F7B77F99C02DC8EE82A01902F7B82A63D2E5F7AF33019D854066879FFEC91CBAB264EF04B24A23135721914D22EA863DA6C10D42A0D49BAD6F913F48769
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Florian Roth
                                    • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Florian Roth
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: ditekSHen
                                    • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: kevoreilly
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This .y.1..m cannot be run in DOS mode....$........Tg..:4..:4..:4..4..:4..4..:4...4..:4..:4..:4...4..:4..;42.:4...4..:4...4..:4...4..:4...4..:4Rich..:4........PE..L....Z.Z.............................K.......................................`............@.............................U...8........@.......................P.......................................................................................text.............................. ..`.rdata...p.......r..................@..@.data........ ......................@....CRT.........0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):6.421564704960313
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:O8ZHhytWhn.exe
                                    File size:71168
                                    MD5:b39febf7440b58a6cd15ae9f01916f98
                                    SHA1:66984e561fc5feead5ef9790f79bffd7778ac1e2
                                    SHA256:9c689986ca8e0b4fd93657ad9ed5c37994ccf591c90d5fba85684f2d0f49e1b9
                                    SHA512:3080283a04ddf66d59cf8309fb2fb1720a094fdfd408b74d8483e1e6f8712b236f8b6f62335e8bdab060ef993e4cdf92822c6cd83483a1876450ba0447e90796
                                    SSDEEP:1536:7ZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAwfMqqU+2bbbAV2/S2Lkvd9:7BounVyFHpfMqqDL2/Lkvd
                                    TLSH:1D636A0EA2E1A193E1F357B9FA757E65446E3D203B289BDB099359852D630F0793B303
                                    File Content Preview:MZ......................@...............................................!..L.!This .j0.#.m cannot be run in DOS mode....$.........Tg..:4..:4..:4...4..:4...4..:4...4..:4..:4..:4...4..:4..;42.:4...4..:4...4..:4...4..:4...4..:4Rich..:4........PE..L....Z.Z...
                                    Icon Hash:00828e8e8686b000
                                    Entrypoint:0x10004bf0
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x10000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                                    Time Stamp:0x5A8C5AD9 [Tue Feb 20 17:28:57 2018 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:1
                                    File Version Major:5
                                    File Version Minor:1
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:1
                                    Import Hash:6b11af918234585a966ca8fab046dc6c
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 0Ch
                                    mov dword ptr [ebp-0Ch], 00000001h
                                    mov eax, dword ptr [ebp+0Ch]
                                    mov dword ptr [ebp-08h], eax
                                    cmp dword ptr [ebp-08h], 01h
                                    jmp 00007F732C73A7B6h
                                    jmp 00007F732C73A7DCh
                                    jmp 00007F732C73A7DAh
                                    push 00000000h
                                    push 00000000h
                                    push 00000000h
                                    push 10004950h
                                    push 00000000h
                                    push 00000000h
                                    call dword ptr [1000A108h]
                                    mov dword ptr [ebp-04h], eax
                                    cmp dword ptr [ebp-04h], 00000000h
                                    je 00007F732C73A7BCh
                                    mov ecx, dword ptr [ebp-04h]
                                    push ecx
                                    call dword ptr [1000A10Ch]
                                    mov eax, dword ptr [ebp-0Ch]
                                    mov esp, ebp
                                    pop ebp
                                    retn 000Ch
                                    int3
                                    int3
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 5Ch
                                    push esi
                                    push 00000044h
                                    lea eax, dword ptr [ebp-58h]
                                    xorps xmm0, xmm0
                                    push 00000000h
                                    push eax
                                    mov esi, ecx
                                    movdqu dqword ptr [ebp-10h], xmm0
                                    call 00007F732C73EB67h
                                    mov eax, dword ptr [10012A6Ch]
                                    add esp, 0Ch
                                    mov dword ptr [ebp-18h], eax
                                    mov dword ptr [ebp-1Ch], eax
                                    mov eax, dword ptr [10012A68h]
                                    or dword ptr [ebp-2Ch], 00000101h
                                    mov dword ptr [ebp-20h], eax
                                    xor eax, eax
                                    mov word ptr [ebp-28h], ax
                                    lea eax, dword ptr [ebp-10h]
                                    push eax
                                    lea eax, dword ptr [ebp-58h]
                                    mov dword ptr [ebp-58h], 00000044h
                                    push eax
                                    push 00000000h
                                    push 00000000h
                                    push 00000000h
                                    push 00000001h
                                    push 00000000h
                                    push 00000000h
                                    push esi
                                    push 00000000h
                                    call dword ptr [1000A164h]
                                    test eax, eax
                                    jne 00007F732C73A7BDh
                                    call dword ptr [1000A064h]
                                    pop esi
                                    mov esp, ebp
                                    pop ebp
                                    ret
                                    push dword ptr [ebp-10h]
                                    Programming Language:
                                    • [ C ] VS2013 build 21005
                                    • [IMP] VS2008 SP1 build 30729
                                    • [EXP] VS2013 build 21005
                                    • [RES] VS2013 build 21005
                                    • [LNK] VS2013 build 21005
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x104e00x55.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x105380xb4.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x1e0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x150000xac4.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0xa0000x1fc.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x82e80x8400False0.4593690814393939data6.340223357377212IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0xa0000x70a60x7200False0.4923245614035088data6.181274430024402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x120000xa800xc00False0.3160807291666667data3.1174892908286225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .CRT0x130000x40x200False0.033203125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0x140000x1e00x200False0.52734375data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x150000xac40xc00False0.7802734375data6.4568381269501165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_MANIFEST0x140600x17dXML 1.0 document textEnglishUnited States
                                    DLLImport
                                    KERNEL32.dllSetFilePointer, GetFileAttributesW, ReadFile, GetLastError, MoveFileW, lstrcpyW, SetFileAttributesW, CreateMutexW, GetDriveTypeW, VerSetConditionMask, WaitForSingleObject, GetTickCount, InitializeCriticalSection, OpenProcess, GetSystemDirectoryW, TerminateThread, Sleep, TerminateProcess, VerifyVersionInfoW, WaitForMultipleObjects, DeleteCriticalSection, ExpandEnvironmentStringsW, lstrlenW, SetHandleInformation, lstrcatA, MultiByteToWideChar, CreatePipe, lstrcmpiA, Process32NextW, CreateToolhelp32Snapshot, LeaveCriticalSection, EnterCriticalSection, FindFirstFileW, lstrcmpW, FindClose, FindNextFileW, GetNativeSystemInfo, GetComputerNameW, GetDiskFreeSpaceW, GetWindowsDirectoryW, GetVolumeInformationW, LoadLibraryA, lstrcmpiW, VirtualFree, CreateThread, CloseHandle, lstrcatW, CreateFileMappingW, ExitThread, CreateFileW, GetModuleFileNameW, WriteFile, GetModuleHandleW, UnmapViewOfFile, MapViewOfFile, GetFileSize, GetEnvironmentVariableW, lstrcpyA, GetModuleHandleA, VirtualAlloc, GetProcAddress, Process32FirstW, GetTempPathW, GetProcessHeap, HeapFree, HeapAlloc, lstrlenA, CreateProcessW, ExitProcess, IsProcessorFeaturePresent
                                    USER32.dllBeginPaint, wsprintfW, TranslateMessage, LoadCursorW, LoadIconW, MessageBoxA, GetMessageW, EndPaint, DestroyWindow, RegisterClassExW, ShowWindow, CreateWindowExW, SendMessageW, DispatchMessageW, DefWindowProcW, UpdateWindow, GetForegroundWindow, SetWindowLongW
                                    GDI32.dllTextOutW
                                    ADVAPI32.dllFreeSid, RegSetValueExW, RegCreateKeyExW, RegCloseKey, CryptExportKey, CryptAcquireContextW, CryptGetKeyParam, CryptReleaseContext, CryptImportKey, CryptEncrypt, CryptGenKey, CryptDestroyKey, GetUserNameW, RegQueryValueExW, RegOpenKeyExW, AllocateAndInitializeSid
                                    SHELL32.dllShellExecuteW, SHGetSpecialFolderPathW, ShellExecuteExW
                                    CRYPT32.dllCryptStringToBinaryA, CryptBinaryToStringA
                                    WININET.dllInternetCloseHandle, HttpAddRequestHeadersW, HttpSendRequestW, InternetConnectW, HttpOpenRequestW, InternetOpenW, InternetReadFile
                                    PSAPI.DLLEnumDeviceDrivers, GetDeviceDriverBaseNameW
                                    NameOrdinalAddress
                                    _ReflectiveLoader@010x10005ec0
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    192.168.2.78.8.8.859550532026737 08/31/22-23:50:37.016810UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5955053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.852106532026737 08/31/22-23:49:25.641298UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5210653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851142532829498 08/31/22-23:49:32.319799UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15114253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861174532829498 08/31/22-23:50:40.415440UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16117453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.854194532829498 08/31/22-23:50:17.451854UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15419453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862910532026737 08/31/22-23:50:41.844460UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6291053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859114532829498 08/31/22-23:50:50.899719UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15911453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863192532829498 08/31/22-23:50:10.372925UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16319253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858786532026737 08/31/22-23:49:35.365431UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5878653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850026532026737 08/31/22-23:49:12.853058UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5002653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.856776532829498 08/31/22-23:50:31.949356UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15677653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851012532026737 08/31/22-23:49:06.034483UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5101253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862438532026737 08/31/22-23:49:47.214941UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6243853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.860840532829498 08/31/22-23:50:23.078640UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16084053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.864080532829498 08/31/22-23:49:52.783908UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16408053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861175532829498 08/31/22-23:50:40.433841UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16117553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858288532829498 08/31/22-23:49:10.646822UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15828853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.852107532026737 08/31/22-23:49:25.661867UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5210753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.856775532829498 08/31/22-23:50:31.927813UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15677553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862020532026737 08/31/22-23:50:18.955251UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6202053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858751532829498 08/31/22-23:49:44.095609UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15875153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859548532026737 08/31/22-23:50:36.965761UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5954853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863191532829498 08/31/22-23:50:10.354216UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16319153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858750532829498 08/31/22-23:49:44.071935UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15875053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853340532829498 08/31/22-23:49:03.740944UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15334053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851141532829498 08/31/22-23:49:32.298424UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15114153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863296532026737 08/31/22-23:50:48.003146UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6329653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850233532026737 08/31/22-23:49:59.196489UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862684532829498 08/31/22-23:49:22.306534UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16268453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861183532026737 08/31/22-23:48:55.804714UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6118353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.854195532829498 08/31/22-23:50:17.469831UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15419553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.860841532829498 08/31/22-23:50:23.096845UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16084153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862021532026737 08/31/22-23:50:18.975380UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6202153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.855836532026737 08/31/22-23:50:24.524842UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5583653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851143532829498 08/31/22-23:49:32.344159UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15114353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.864083532829498 08/31/22-23:49:52.867185UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16408353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858788532026737 08/31/22-23:49:35.533597UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5878853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850509532829498 08/31/22-23:48:51.586247UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15050953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862436532026737 08/31/22-23:49:47.175608UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6243653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851440532829498 08/31/22-23:50:03.437869UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15144053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853640532026737 08/31/22-23:50:13.786207UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5364053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862911532026737 08/31/22-23:50:41.864871UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6291153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853339532829498 08/31/22-23:49:03.720004UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15333953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862023532026737 08/31/22-23:50:19.013875UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6202353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.855834532026737 08/31/22-23:50:24.482691UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5583453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858749532829498 08/31/22-23:49:44.051138UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15874953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858286532829498 08/31/22-23:49:10.608212UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15828653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851011532026737 08/31/22-23:49:06.014113UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5101153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851439532829498 08/31/22-23:50:03.414505UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15143953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859849532829498 08/31/22-23:50:46.658424UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15984953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850027532026737 08/31/22-23:49:12.888248UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5002753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859850532829498 08/31/22-23:50:46.682797UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15985053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863294532026737 08/31/22-23:50:47.961479UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6329453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859115532829498 08/31/22-23:50:50.920149UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15911553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862682532829498 08/31/22-23:49:22.268041UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16268253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859551532026737 08/31/22-23:50:37.037427UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5955153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850235532026737 08/31/22-23:49:59.234950UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861181532026737 08/31/22-23:48:55.077736UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6118153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862022532026737 08/31/22-23:50:18.995399UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6202253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853642532026737 08/31/22-23:50:13.835822UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5364253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850507532829498 08/31/22-23:48:51.544537UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15050753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.856773532829498 08/31/22-23:50:31.838450UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15677353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.854197532829498 08/31/22-23:50:17.513889UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15419753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.860839532829498 08/31/22-23:50:23.058563UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16083953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.855835532026737 08/31/22-23:50:24.503509UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5583553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853338532829498 08/31/22-23:49:03.694333UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15333853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861177532829498 08/31/22-23:50:40.475632UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16117753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850510532829498 08/31/22-23:48:51.605938UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15051053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853639532026737 08/31/22-23:50:13.763933UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5363953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858789532026737 08/31/22-23:49:35.553154UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5878953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859057532026737 08/31/22-23:50:05.762357UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5905753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862913532026737 08/31/22-23:50:41.903498UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6291353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862435532026737 08/31/22-23:49:47.157448UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6243553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853341532829498 08/31/22-23:49:03.761474UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15334153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862683532829498 08/31/22-23:49:22.288385UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16268353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.852109532026737 08/31/22-23:49:25.724789UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5210953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850029532026737 08/31/22-23:49:12.927716UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5002953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.864082532829498 08/31/22-23:49:52.826347UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16408253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859056532026737 08/31/22-23:50:05.744186UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5905653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850508532829498 08/31/22-23:48:51.564977UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15050853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.856774532829498 08/31/22-23:50:31.909568UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15677453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859117532829498 08/31/22-23:50:50.958695UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15911753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.864081532829498 08/31/22-23:49:52.807469UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16408153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.852108532026737 08/31/22-23:49:25.704474UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5210853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862437532026737 08/31/22-23:49:47.194217UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6243753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859116532829498 08/31/22-23:50:50.938342UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15911653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859058532026737 08/31/22-23:50:05.782380UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5905853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859851532829498 08/31/22-23:50:46.705234UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15985153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851010532026737 08/31/22-23:49:05.994077UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5101053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862681532829498 08/31/22-23:49:22.247182UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16268153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851438532829498 08/31/22-23:50:03.395466UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15143853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.862912532026737 08/31/22-23:50:41.885084UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6291253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850028532026737 08/31/22-23:49:12.908519UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5002853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859055532026737 08/31/22-23:50:05.722794UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5905553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.853641532026737 08/31/22-23:50:13.814014UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5364153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.855833532026737 08/31/22-23:50:24.464562UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5583353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863293532026737 08/31/22-23:50:47.940116UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6329353192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850236532026737 08/31/22-23:49:59.285144UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858287532829498 08/31/22-23:49:10.628422UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15828753192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851144532829498 08/31/22-23:49:32.366090UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15114453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861176532829498 08/31/22-23:50:40.454136UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16117653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859848532829498 08/31/22-23:50:46.635471UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15984853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861180532026737 08/31/22-23:48:54.987434UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6118053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851441532829498 08/31/22-23:50:03.458729UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15144153192.168.2.78.8.8.8
                                    192.168.2.78.8.8.851009532026737 08/31/22-23:49:05.970413UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5100953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.859549532026737 08/31/22-23:50:36.986127UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5954953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863295532026737 08/31/22-23:50:47.982626UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6329553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.850234532026737 08/31/22-23:49:59.216727UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023453192.168.2.78.8.8.8
                                    192.168.2.78.8.8.861182532026737 08/31/22-23:48:55.097916UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6118253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858285532829498 08/31/22-23:49:10.587711UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15828553192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863189532829498 08/31/22-23:50:10.316381UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16318953192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858748532829498 08/31/22-23:49:44.032896UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15874853192.168.2.78.8.8.8
                                    192.168.2.78.8.8.854196532829498 08/31/22-23:50:17.488065UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15419653192.168.2.78.8.8.8
                                    192.168.2.78.8.8.863190532829498 08/31/22-23:50:10.336236UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16319053192.168.2.78.8.8.8
                                    192.168.2.78.8.8.860842532829498 08/31/22-23:50:23.114941UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16084253192.168.2.78.8.8.8
                                    192.168.2.78.8.8.858787532026737 08/31/22-23:49:35.450533UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5878753192.168.2.78.8.8.8
                                    TimestampSource PortDest PortSource IPDest IP
                                    Aug 31, 2022 23:48:48.162317038 CEST5658853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:48.180012941 CEST53565888.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:49.311268091 CEST5083553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:49.340321064 CEST53508358.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:49.449572086 CEST5083653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:49.466823101 CEST53508368.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:49.516789913 CEST5083753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:49.536530972 CEST53508378.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:49.537214041 CEST5083853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:49.556749105 CEST53508388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:49.557590008 CEST5083953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:49.575861931 CEST53508398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:49.576618910 CEST5084053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:49.594223022 CEST53508408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:51.461322069 CEST5050553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:51.490272999 CEST53505058.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:51.524420977 CEST5050653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:51.543720007 CEST53505068.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:51.544537067 CEST5050753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:51.564177990 CEST53505078.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:51.564976931 CEST5050853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:51.584604979 CEST53505088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:51.586246967 CEST5050953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:51.604727030 CEST53505098.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:51.605937958 CEST5051053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:51.625611067 CEST53505108.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:53.572961092 CEST6117853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:54.615896940 CEST6117853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:54.773407936 CEST53611788.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:54.869833946 CEST6117953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:54.889055014 CEST53611798.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:54.987433910 CEST6118053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:55.006886005 CEST53611808.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:55.077735901 CEST6118153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:55.097297907 CEST53611818.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:55.097915888 CEST6118253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:55.117695093 CEST53611828.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:55.747175932 CEST53611788.8.8.8192.168.2.7
                                    Aug 31, 2022 23:48:55.804713964 CEST6118353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:48:55.824616909 CEST53611838.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:00.319737911 CEST6392653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:01.169933081 CEST53639268.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:01.353461027 CEST6392753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:01.372771025 CEST53639278.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:01.374028921 CEST6392853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:01.391752958 CEST53639288.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:01.392597914 CEST6392953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:01.412412882 CEST53639298.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:01.422482967 CEST6393053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:01.442105055 CEST53639308.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:01.442715883 CEST6393153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:01.462238073 CEST53639318.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:03.618457079 CEST5333653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:03.646867990 CEST53533368.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:03.674020052 CEST5333753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:03.693329096 CEST53533378.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:03.694333076 CEST5333853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:03.714029074 CEST53533388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:03.720004082 CEST5333953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:03.739958048 CEST53533398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:03.740943909 CEST5334053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:03.760740042 CEST53533408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:03.761473894 CEST5334153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:03.780883074 CEST53533418.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:05.851566076 CEST5100753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:05.927884102 CEST53510078.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:05.950356960 CEST5100853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:05.969724894 CEST53510088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:05.970412970 CEST5100953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:05.988084078 CEST53510098.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:05.994076967 CEST5101053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:06.013634920 CEST53510108.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:06.014112949 CEST5101153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:06.033843040 CEST53510118.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:06.034482956 CEST5101253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:06.052124023 CEST53510128.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:08.298588037 CEST6076553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:08.332787037 CEST53607658.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:08.379491091 CEST6076653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:08.396629095 CEST53607668.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:08.401062012 CEST6076753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:08.420532942 CEST53607678.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:08.421091080 CEST6076853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:08.438788891 CEST53607688.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:08.439529896 CEST6076953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:08.459163904 CEST53607698.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:08.460036039 CEST6077053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:08.479747057 CEST53607708.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:10.506968975 CEST5828353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:10.541820049 CEST53582838.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:10.567323923 CEST5828453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:10.586430073 CEST53582848.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:10.587711096 CEST5828553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:10.607192039 CEST53582858.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:10.608211994 CEST5828653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:10.627860069 CEST53582868.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:10.628422022 CEST5828753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:10.646167040 CEST53582878.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:10.646821976 CEST5828853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:10.664554119 CEST53582888.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:12.772886038 CEST5002453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:12.801616907 CEST53500248.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:12.835031033 CEST5002553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:12.852170944 CEST53500258.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:12.853058100 CEST5002653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:12.872845888 CEST53500268.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:12.888247967 CEST5002753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:12.907861948 CEST53500278.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:12.908519030 CEST5002853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:12.926351070 CEST53500288.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:12.927716017 CEST5002953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:12.945725918 CEST53500298.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:19.245435953 CEST4951653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:19.313703060 CEST53495168.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:19.400525093 CEST4951753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:19.419850111 CEST53495178.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:19.420770884 CEST4951853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:19.440718889 CEST53495188.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:19.441392899 CEST4951953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:19.460870028 CEST53495198.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:19.466649055 CEST4952053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:19.487466097 CEST53495208.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:19.488183022 CEST4952153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:19.506371021 CEST53495218.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:21.671026945 CEST6267953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:22.201103926 CEST53626798.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:22.227818012 CEST6268053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:22.246304989 CEST53626808.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:22.247181892 CEST6268153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:22.266834021 CEST53626818.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:22.268040895 CEST6268253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:22.287790060 CEST53626828.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:22.288384914 CEST6268353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:22.305758953 CEST53626838.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:22.306534052 CEST6268453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:22.324302912 CEST53626848.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:24.462853909 CEST6139253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.454030037 CEST6139253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.577943087 CEST53613928.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:25.622845888 CEST5210553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.640170097 CEST53521058.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:25.641298056 CEST5210653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.661083937 CEST53521068.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:25.661866903 CEST5210753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.681529045 CEST53521078.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:25.704473972 CEST5210853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.724030018 CEST53521088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:25.724788904 CEST5210953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:25.744210958 CEST53521098.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:25.991184950 CEST53613928.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:28.680964947 CEST5900653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:28.717668056 CEST53590068.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:28.837111950 CEST5900753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:28.856168985 CEST53590078.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:28.857135057 CEST5900853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:28.877022028 CEST53590088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:28.877621889 CEST5900953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:28.895523071 CEST53590098.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:28.896074057 CEST5901053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:28.913804054 CEST53590108.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:28.914361000 CEST5901153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:28.934406996 CEST53590118.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:31.635144949 CEST5113953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:32.217390060 CEST53511398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:32.279234886 CEST5114053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:32.296617031 CEST53511408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:32.298424006 CEST5114153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:32.318643093 CEST53511418.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:32.319798946 CEST5114253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:32.339747906 CEST53511428.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:32.344158888 CEST5114353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:32.364142895 CEST53511438.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:32.366090059 CEST5114453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:32.385826111 CEST53511448.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:35.170795918 CEST5878453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:35.200468063 CEST53587848.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:35.292376995 CEST5878553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:35.311513901 CEST53587858.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:35.365431070 CEST5878653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:35.384989977 CEST53587868.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:35.450532913 CEST5878753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:35.468177080 CEST53587878.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:35.533596992 CEST5878853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:35.551315069 CEST53587888.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:35.553153992 CEST5878953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:35.570811987 CEST53587898.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:40.191965103 CEST6460853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.208512068 CEST6460853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.316941023 CEST53646088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:41.362494946 CEST6460953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.379674911 CEST53646098.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:41.382796049 CEST6461053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.400392056 CEST53646108.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:41.401937962 CEST6461153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.419595003 CEST53646118.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:41.420692921 CEST6461253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.440679073 CEST53646128.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:41.441375971 CEST6461353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:41.461257935 CEST53646138.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:42.919545889 CEST53646088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:43.427385092 CEST5874653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:43.962893009 CEST53587468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:44.012053967 CEST5874753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:44.031344891 CEST53587478.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:44.032896042 CEST5874853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:44.050631046 CEST53587488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:44.051137924 CEST5874953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:44.070837975 CEST53587498.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:44.071934938 CEST5875053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:44.091598988 CEST53587508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:44.095608950 CEST5875153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:44.115334988 CEST53587518.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:45.971837044 CEST6243353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.004626036 CEST6243353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.099487066 CEST53624338.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:47.139636993 CEST6243453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.156781912 CEST53624348.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:47.157448053 CEST6243553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.175007105 CEST53624358.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:47.175607920 CEST6243653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.193625927 CEST53624368.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:47.194216967 CEST6243753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.214102030 CEST53624378.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:47.214941025 CEST6243853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:47.232800007 CEST53624388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:47.542625904 CEST53624338.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:49.229926109 CEST6124853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:49.484189034 CEST53612488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:49.510601044 CEST6124953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:49.529911995 CEST53612498.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:49.533186913 CEST6125053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:49.551467896 CEST53612508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:49.552383900 CEST6125153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:49.572386980 CEST53612518.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:49.573700905 CEST6125253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:49.593506098 CEST53612528.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:49.595768929 CEST6125353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:49.613496065 CEST53612538.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:51.551908016 CEST5275053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.563982010 CEST5275053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.714204073 CEST53527508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:52.762547016 CEST6407953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.781574011 CEST53640798.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:52.783907890 CEST6408053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.804019928 CEST53640808.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:52.807468891 CEST6408153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.825433969 CEST53640818.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:52.826347113 CEST6408253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.846256018 CEST53640828.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:52.867185116 CEST6408353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:52.887599945 CEST53640838.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:53.688219070 CEST53527508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:56.650087118 CEST5023153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:58.274665117 CEST53502318.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:59.062505960 CEST5023153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:59.107537985 CEST5023253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:59.124644041 CEST53502328.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:59.147748947 CEST53502318.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:59.196489096 CEST5023353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:59.216067076 CEST53502338.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:59.216727018 CEST5023453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:59.234318972 CEST53502348.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:59.234950066 CEST5023553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:59.252429962 CEST53502358.8.8.8192.168.2.7
                                    Aug 31, 2022 23:49:59.285144091 CEST5023653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:49:59.305018902 CEST53502368.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:01.274703979 CEST5851453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:01.393326044 CEST53585148.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:01.419277906 CEST5851553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:01.436784029 CEST53585158.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:01.437741041 CEST5851653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:01.455447912 CEST53585168.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:01.457930088 CEST5851753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:01.476432085 CEST53585178.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:01.476938963 CEST5851853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:01.494363070 CEST53585188.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:01.495297909 CEST5851953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:01.515038967 CEST53585198.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:03.328814983 CEST5143653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:03.356900930 CEST53514368.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:03.377331972 CEST5143753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:03.394578934 CEST53514378.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:03.395466089 CEST5143853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:03.413331032 CEST53514388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:03.414505005 CEST5143953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:03.434359074 CEST53514398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:03.437869072 CEST5144053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:03.457411051 CEST53514408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:03.458729029 CEST5144153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:03.476334095 CEST53514418.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:05.108340025 CEST5905353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:05.684484959 CEST53590538.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:05.702292919 CEST5905453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:05.721307993 CEST53590548.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:05.722794056 CEST5905553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:05.742141962 CEST53590558.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:05.744185925 CEST5905653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:05.761802912 CEST53590568.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:05.762356997 CEST5905753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:05.781910896 CEST53590578.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:05.782380104 CEST5905853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:05.799871922 CEST53590588.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:07.031923056 CEST5194553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.021806955 CEST5194553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.151724100 CEST53519458.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:08.167407990 CEST5194653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.186973095 CEST53519468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:08.189280033 CEST5194753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.220877886 CEST53519478.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:08.221313000 CEST5194853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.249907017 CEST53519488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:08.251476049 CEST5194953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.271193981 CEST53519498.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:08.274797916 CEST5195053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:08.294326067 CEST53519508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:09.698939085 CEST53519458.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:09.751842022 CEST6318753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:10.289400101 CEST53631878.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:10.296859980 CEST6318853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:10.315807104 CEST53631888.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:10.316380978 CEST6318953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:10.335757971 CEST53631898.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:10.336236000 CEST6319053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:10.353692055 CEST53631908.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:10.354216099 CEST6319153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:10.371742964 CEST53631918.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:10.372925043 CEST6319253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:10.390542984 CEST53631928.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:11.642780066 CEST6476053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:12.630454063 CEST6476053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.644061089 CEST6476053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.730717897 CEST53647608.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:13.744646072 CEST5363853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.763123989 CEST53536388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:13.763932943 CEST5363953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.783987999 CEST53536398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:13.786206961 CEST5364053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.806222916 CEST53536408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:13.814013958 CEST5364153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.831871986 CEST53536418.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:13.835822105 CEST5364253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:13.855473995 CEST53536428.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:14.389233112 CEST53647608.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:14.867403984 CEST53647608.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:15.356404066 CEST5834353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:15.432742119 CEST53583438.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:15.441741943 CEST5834453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:15.458967924 CEST53583448.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:15.459965944 CEST5834553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:15.479576111 CEST53583458.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:15.480093002 CEST5834653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:15.500281096 CEST53583468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:15.500714064 CEST5834753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:15.520478964 CEST53583478.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:15.520885944 CEST5834853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:15.540834904 CEST53583488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:16.850531101 CEST5419253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:17.425961018 CEST53541928.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:17.434011936 CEST5419353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:17.451142073 CEST53541938.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:17.451853991 CEST5419453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:17.469491005 CEST53541948.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:17.469830990 CEST5419553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:17.487525940 CEST53541958.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:17.488065004 CEST5419653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:17.507570982 CEST53541968.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:17.513889074 CEST5419753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:17.533308029 CEST53541978.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:18.887698889 CEST6201853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:18.916414976 CEST53620188.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:18.937438965 CEST6201953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:18.954654932 CEST53620198.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:18.955250978 CEST6202053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:18.974977016 CEST53620208.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:18.975379944 CEST6202153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:18.994760036 CEST53620218.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:18.995398998 CEST6202253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:19.012873888 CEST53620228.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:19.013875008 CEST6202353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:19.031758070 CEST53620238.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:20.492069006 CEST5015553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:20.563419104 CEST53501558.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:20.578113079 CEST5015653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:20.595380068 CEST53501568.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:20.595863104 CEST5015753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:20.615622997 CEST53501578.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:20.616091013 CEST5015853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:20.633987904 CEST53501588.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:20.634430885 CEST6432353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:20.654202938 CEST53643238.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:20.654583931 CEST6432453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:20.672302961 CEST53643248.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:22.412148952 CEST5969553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:23.034744024 CEST53596958.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:23.040985107 CEST6083853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:23.058167934 CEST53608388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:23.058562994 CEST6083953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:23.078299999 CEST53608398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:23.078639984 CEST6084053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:23.096414089 CEST53608408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:23.096844912 CEST6084153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:23.114574909 CEST53608418.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:23.114940882 CEST6084253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:23.134742975 CEST53608428.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:24.405147076 CEST6547853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:24.436777115 CEST53654788.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:24.446861982 CEST5583253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:24.464018106 CEST53558328.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:24.464561939 CEST5583353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:24.482281923 CEST53558338.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:24.482691050 CEST5583453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:24.502979040 CEST53558348.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:24.503509045 CEST5583553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:24.521646976 CEST53558358.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:24.524842024 CEST5583653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:24.544363976 CEST53558368.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:25.783303976 CEST6007953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:26.785877943 CEST6007953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:26.947271109 CEST53600798.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:26.957772017 CEST6008053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:26.987024069 CEST53600808.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:26.987798929 CEST6008153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:27.015486002 CEST53600818.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:27.025521994 CEST6008253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:29.035577059 CEST6008353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:29.053275108 CEST53600838.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:29.053632975 CEST6008453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:29.071413040 CEST53600848.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:30.635474920 CEST5677153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:31.172678947 CEST53567718.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:31.817447901 CEST5677253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:31.836168051 CEST53567728.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:31.838449955 CEST5677353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:31.860229969 CEST53567738.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:31.909568071 CEST5677453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:31.927282095 CEST53567748.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:31.927813053 CEST5677553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:31.948879957 CEST53567758.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:31.949356079 CEST5677653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:31.968821049 CEST53567768.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:34.855798960 CEST5954653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:35.849972963 CEST5954653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:36.850053072 CEST5954653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:36.938282013 CEST53595468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:36.947161913 CEST5954753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:36.964608908 CEST53595478.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:36.965760946 CEST5954853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:36.973332882 CEST53595468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:36.985584021 CEST53595488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:36.986126900 CEST5954953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:37.003935099 CEST53595498.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:37.016809940 CEST5955053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:37.036745071 CEST53595508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:37.037426949 CEST5955153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:37.055305004 CEST53595518.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:38.372488022 CEST5755553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:38.477780104 CEST53595468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:38.951469898 CEST53575558.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:38.961877108 CEST5755653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:38.980972052 CEST53575568.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:38.982656956 CEST5755753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:39.002156019 CEST53575578.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:39.002620935 CEST5755853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:39.022454023 CEST53575588.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:39.022998095 CEST5755953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:39.042603016 CEST53575598.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:39.043083906 CEST5756053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:39.062616110 CEST53575608.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:40.316248894 CEST6117253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:40.345277071 CEST53611728.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:40.395659924 CEST6117353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:40.414843082 CEST53611738.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:40.415440083 CEST6117453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:40.433434963 CEST53611748.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:40.433840990 CEST6117553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:40.453635931 CEST53611758.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:40.454135895 CEST6117653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:40.473654032 CEST53611768.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:40.475631952 CEST6117753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:40.493432045 CEST53611778.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:41.741760969 CEST6290853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:41.813671112 CEST53629088.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:41.824610949 CEST6290953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:41.843774080 CEST53629098.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:41.844460011 CEST6291053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:41.863992929 CEST53629108.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:41.864871025 CEST6291153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:41.884527922 CEST53629118.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:41.885083914 CEST6291253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:41.903028011 CEST53629128.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:41.903497934 CEST6291353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:41.922991037 CEST53629138.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:43.153091908 CEST5283853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:43.720691919 CEST53528388.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:43.728780031 CEST5283953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:43.746124983 CEST53528398.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:43.746818066 CEST5284053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:43.766308069 CEST53528408.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:43.766763926 CEST5284153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:43.786328077 CEST53528418.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:43.786806107 CEST5284253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:43.804389954 CEST53528428.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:43.804909945 CEST5284353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:43.824862003 CEST53528438.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:44.889817953 CEST5984653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:45.880757093 CEST5984653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:46.606601000 CEST53598468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:46.613910913 CEST5984753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:46.633125067 CEST53598478.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:46.635471106 CEST5984853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:46.655035973 CEST53598488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:46.658423901 CEST5984953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:46.676173925 CEST53598498.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:46.682796955 CEST5985053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:46.702325106 CEST53598508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:46.705234051 CEST5985153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:46.724997044 CEST53598518.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:47.795392036 CEST6329153192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:47.913981915 CEST53632918.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:47.921678066 CEST6329253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:47.938807011 CEST53632928.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:47.940115929 CEST6329353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:47.961014032 CEST53632938.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:47.961478949 CEST6329453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:47.982100964 CEST53632948.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:47.982625961 CEST6329553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:48.002609015 CEST53632958.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:48.003145933 CEST6329653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:48.020875931 CEST53632968.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:48.598846912 CEST53598468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:49.092647076 CEST5634553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:49.658869028 CEST53563458.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:49.665900946 CEST5634653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:49.685262918 CEST53563468.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:49.685766935 CEST5634753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:49.703661919 CEST53563478.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:49.704097033 CEST5634853192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:49.723515987 CEST53563488.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:49.724236012 CEST5634953192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:49.746051073 CEST53563498.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:49.746964931 CEST5635053192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:49.766846895 CEST53563508.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:50.837404013 CEST5911253192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:50.874103069 CEST53591128.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:50.881997108 CEST5911353192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:50.899250031 CEST53591138.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:50.899719000 CEST5911453192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:50.919481993 CEST53591148.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:50.920149088 CEST5911553192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:50.937942982 CEST53591158.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:50.938342094 CEST5911653192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:50.958199978 CEST53591168.8.8.8192.168.2.7
                                    Aug 31, 2022 23:50:50.958694935 CEST5911753192.168.2.78.8.8.8
                                    Aug 31, 2022 23:50:50.978470087 CEST53591178.8.8.8192.168.2.7
                                    TimestampSource IPDest IPChecksumCodeType
                                    Aug 31, 2022 23:48:55.747387886 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:49:25.991276979 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:49:42.919677973 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:49:47.542829037 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:49:53.688399076 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:49:59.147907972 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:50:09.702483892 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:50:14.389380932 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:50:36.973524094 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:50:38.478975058 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    Aug 31, 2022 23:50:48.599447966 CEST192.168.2.78.8.8.8d034(Port unreachable)Destination Unreachable
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Aug 31, 2022 23:48:48.162317038 CEST192.168.2.78.8.8.80xa44cStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.311268091 CEST192.168.2.78.8.8.80xe9dbStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.449572086 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:48:49.516789913 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.537214041 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:48:49.557590008 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.576618910 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:48:51.461322069 CEST192.168.2.78.8.8.80xc607Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:51.524420977 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:48:51.544537067 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:51.564976931 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:48:51.586246967 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:51.605937958 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:48:53.572961092 CEST192.168.2.78.8.8.80x9c52Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:54.615896940 CEST192.168.2.78.8.8.80x9c52Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:54.869833946 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:48:54.987433910 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:55.077735901 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:48:55.097915888 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:55.804713964 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:00.319737911 CEST192.168.2.78.8.8.80x58a8Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:01.353461027 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:01.374028921 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:01.392597914 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:01.422482967 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:01.442715883 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:03.618457079 CEST192.168.2.78.8.8.80xda7cStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:03.674020052 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:03.694333076 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:03.720004082 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:03.740943909 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:03.761473894 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:05.851566076 CEST192.168.2.78.8.8.80x4d2cStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:05.950356960 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:05.970412970 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:05.994076967 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:06.014112949 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:06.034482956 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:08.298588037 CEST192.168.2.78.8.8.80xece3Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:08.379491091 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:08.401062012 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:08.421091080 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:08.439529896 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:08.460036039 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:10.506968975 CEST192.168.2.78.8.8.80xeb6bStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:10.567323923 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:10.587711096 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:10.608211994 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:10.628422022 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:10.646821976 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:12.772886038 CEST192.168.2.78.8.8.80xaf5bStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:12.835031033 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:12.853058100 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:12.888247967 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:12.908519030 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:12.927716017 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:19.245435953 CEST192.168.2.78.8.8.80x67b9Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:19.400525093 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:19.420770884 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:19.441392899 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:19.466649055 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:19.488183022 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:21.671026945 CEST192.168.2.78.8.8.80xcf65Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:22.227818012 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:22.247181892 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:22.268040895 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:22.288384914 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:22.306534052 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:24.462853909 CEST192.168.2.78.8.8.80x5f58Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.454030037 CEST192.168.2.78.8.8.80x5f58Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.622845888 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:25.641298056 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.661866903 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:25.704473972 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.724788904 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:28.680964947 CEST192.168.2.78.8.8.80xfd78Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.837111950 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:28.857135057 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.877621889 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:28.896074057 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.914361000 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:31.635144949 CEST192.168.2.78.8.8.80x7b4fStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:32.279234886 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:32.298424006 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:32.319798946 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:32.344158888 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:32.366090059 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:35.170795918 CEST192.168.2.78.8.8.80xff42Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:35.292376995 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:35.365431070 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:35.450532913 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:35.533596992 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:35.553153992 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:40.191965103 CEST192.168.2.78.8.8.80x6fa1Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.208512068 CEST192.168.2.78.8.8.80x6fa1Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.362494946 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:41.382796049 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.401937962 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:41.420692921 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.441375971 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:43.427385092 CEST192.168.2.78.8.8.80x174Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:44.012053967 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:44.032896042 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:44.051137924 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:44.071934938 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:44.095608950 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:45.971837044 CEST192.168.2.78.8.8.80xa5feStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.004626036 CEST192.168.2.78.8.8.80xa5feStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.139636993 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:47.157448053 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.175607920 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:47.194216967 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.214941025 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:49.229926109 CEST192.168.2.78.8.8.80xb1d1Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.510601044 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:49.533186913 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.552383900 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:49.573700905 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.595768929 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:49:51.551908016 CEST192.168.2.78.8.8.80x8ef7Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.563982010 CEST192.168.2.78.8.8.80x8ef7Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.762547016 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:52.783907890 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.807468891 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:52.826347113 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.867185116 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:56.650087118 CEST192.168.2.78.8.8.80x960eStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.062505960 CEST192.168.2.78.8.8.80x960eStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.107537985 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:59.196489096 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.216727018 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:49:59.234950066 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.285144091 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:01.274703979 CEST192.168.2.78.8.8.80x6e5aStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:01.419277906 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:01.437741041 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:01.457930088 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:01.476938963 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:01.495297909 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:03.328814983 CEST192.168.2.78.8.8.80xabf0Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:03.377331972 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:03.395466089 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:03.414505005 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:03.437869072 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:03.458729029 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:05.108340025 CEST192.168.2.78.8.8.80x5057Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:05.702292919 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:05.722794056 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:05.744185925 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:05.762356997 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:05.782380104 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:07.031923056 CEST192.168.2.78.8.8.80x7000Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.021806955 CEST192.168.2.78.8.8.80x7000Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.167407990 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:08.189280033 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.221313000 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:08.251476049 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.274797916 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:09.751842022 CEST192.168.2.78.8.8.80x5e4aStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.296859980 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:10.316380978 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.336236000 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:10.354216099 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.372925043 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:11.642780066 CEST192.168.2.78.8.8.80xdda6Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:12.630454063 CEST192.168.2.78.8.8.80xdda6Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.644061089 CEST192.168.2.78.8.8.80xdda6Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.744646072 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:13.763932943 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.786206961 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:13.814013958 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.835822105 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:15.356404066 CEST192.168.2.78.8.8.80x4a85Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.441741943 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:15.459965944 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.480093002 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:15.500714064 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.520885944 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:16.850531101 CEST192.168.2.78.8.8.80xc285Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:17.434011936 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:17.451853991 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:17.469830990 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:17.488065004 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:17.513889074 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:18.887698889 CEST192.168.2.78.8.8.80x5a96Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:18.937438965 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:18.955250978 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:18.975379944 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:18.995398998 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:19.013875008 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:20.492069006 CEST192.168.2.78.8.8.80x654dStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:20.578113079 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:20.595863104 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:20.616091013 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:20.634430885 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:20.654583931 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:22.412148952 CEST192.168.2.78.8.8.80xb093Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:23.040985107 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:23.058562994 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:23.078639984 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:23.096844912 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:23.114940882 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:24.405147076 CEST192.168.2.78.8.8.80x3993Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:24.446861982 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:24.464561939 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:24.482691050 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:24.503509045 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:24.524842024 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:25.783303976 CEST192.168.2.78.8.8.80x6f26Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:26.785877943 CEST192.168.2.78.8.8.80x6f26Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:26.957772017 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:26.987798929 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:27.025521994 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:29.035577059 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:29.053632975 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:30.635474920 CEST192.168.2.78.8.8.80xc2cbStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:31.817447901 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:31.838449955 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:31.909568071 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:31.927813053 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:31.949356079 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:34.855798960 CEST192.168.2.78.8.8.80x4ac2Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:35.849972963 CEST192.168.2.78.8.8.80x4ac2Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:36.850053072 CEST192.168.2.78.8.8.80x4ac2Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:36.947161913 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:36.965760946 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:36.986126900 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:37.016809940 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:37.037426949 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:38.372488022 CEST192.168.2.78.8.8.80x386bStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:38.961877108 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:38.982656956 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:39.002620935 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:39.022998095 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:39.043083906 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:40.316248894 CEST192.168.2.78.8.8.80x325bStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:40.395659924 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:40.415440083 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:40.433840990 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:40.454135895 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:40.475631952 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:41.741760969 CEST192.168.2.78.8.8.80xb5Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:41.824610949 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:41.844460011 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:41.864871025 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:41.885083914 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:41.903497934 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:43.153091908 CEST192.168.2.78.8.8.80xaf65Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:43.728780031 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:43.746818066 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:43.766763926 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:43.786806107 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:43.804909945 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:44.889817953 CEST192.168.2.78.8.8.80x79c7Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:45.880757093 CEST192.168.2.78.8.8.80x79c7Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:46.613910913 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:46.635471106 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:46.658423901 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:46.682796955 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:46.705234051 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:47.795392036 CEST192.168.2.78.8.8.80xfa2Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:47.921678066 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:47.940115929 CEST192.168.2.78.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:47.961478949 CEST192.168.2.78.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:47.982625961 CEST192.168.2.78.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:48.003145933 CEST192.168.2.78.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:49.092647076 CEST192.168.2.78.8.8.80xe83Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.665900946 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:49.685766935 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.704097033 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:49.724236012 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.746964931 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                    Aug 31, 2022 23:50:50.837404013 CEST192.168.2.78.8.8.80x3be0Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:50.881997108 CEST192.168.2.78.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:50.899719000 CEST192.168.2.78.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:50.920149088 CEST192.168.2.78.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                    Aug 31, 2022 23:50:50.938342094 CEST192.168.2.78.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:50.958694935 CEST192.168.2.78.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Aug 31, 2022 23:48:49.340321064 CEST8.8.8.8192.168.2.70xe9dbName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.466823101 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:48:49.536530972 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.556749105 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:48:49.575861931 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:49.594223022 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:48:51.490272999 CEST8.8.8.8192.168.2.70xc607Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:51.543720007 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:48:51.564177990 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:51.584604979 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:48:51.604727030 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:51.625611067 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:48:54.773407936 CEST8.8.8.8192.168.2.70x9c52Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:54.889055014 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:48:55.006886005 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:55.097297907 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:48:55.117695093 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:55.747175932 CEST8.8.8.8192.168.2.70x9c52Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:48:55.824616909 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:01.169933081 CEST8.8.8.8192.168.2.70x58a8Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:01.372771025 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:01.391752958 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:01.412412882 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:01.442105055 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:01.462238073 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:03.646867990 CEST8.8.8.8192.168.2.70xda7cName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:03.693329096 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:03.714029074 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:03.739958048 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:03.760740042 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:03.780883074 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:05.927884102 CEST8.8.8.8192.168.2.70x4d2cName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:05.969724894 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:05.988084078 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:06.013634920 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:06.033843040 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:06.052124023 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:08.332787037 CEST8.8.8.8192.168.2.70xece3Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:08.396629095 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:08.420532942 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:08.438788891 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:08.459163904 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:08.479747057 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:10.541820049 CEST8.8.8.8192.168.2.70xeb6bName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:10.586430073 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:10.607192039 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:10.627860069 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:10.646167040 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:10.664554119 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:12.801616907 CEST8.8.8.8192.168.2.70xaf5bName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:12.852170944 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:12.872845888 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:12.907861948 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:12.926351070 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:12.945725918 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:19.313703060 CEST8.8.8.8192.168.2.70x67b9Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:19.419850111 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:19.440718889 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:19.460870028 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:19.487466097 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:19.506371021 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:22.201103926 CEST8.8.8.8192.168.2.70xcf65Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:22.246304989 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:22.266834021 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:22.287790060 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:22.305758953 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:22.324302912 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:25.577943087 CEST8.8.8.8192.168.2.70x5f58Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.640170097 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:25.661083937 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.681529045 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:25.724030018 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:25.744210958 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:25.991184950 CEST8.8.8.8192.168.2.70x5f58Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.717668056 CEST8.8.8.8192.168.2.70xfd78Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.856168985 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:28.877022028 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.895523071 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:28.913804054 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:28.934406996 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:32.217390060 CEST8.8.8.8192.168.2.70x7b4fName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:32.296617031 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:32.318643093 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:32.339747906 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:32.364142895 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:32.385826111 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:35.200468063 CEST8.8.8.8192.168.2.70xff42Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:35.311513901 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:35.384989977 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:35.468177080 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:35.551315069 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:35.570811987 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:41.316941023 CEST8.8.8.8192.168.2.70x6fa1Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.379674911 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:41.400392056 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.419595003 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:41.440679073 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:41.461257935 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:42.919545889 CEST8.8.8.8192.168.2.70x6fa1Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:43.962893009 CEST8.8.8.8192.168.2.70x174Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:44.031344891 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:44.050631046 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:44.070837975 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:44.091598988 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:44.115334988 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:47.099487066 CEST8.8.8.8192.168.2.70xa5feName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.156781912 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:47.175007105 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.193625927 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:47.214102030 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:47.232800007 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:47.542625904 CEST8.8.8.8192.168.2.70xa5feName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.484189034 CEST8.8.8.8192.168.2.70xb1d1Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.529911995 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:49.551467896 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.572386980 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:49.593506098 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:49.613496065 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:52.714204073 CEST8.8.8.8192.168.2.70x8ef7Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.781574011 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:52.804019928 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.825433969 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:52.846256018 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:52.887599945 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:53.688219070 CEST8.8.8.8192.168.2.70x8ef7Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:58.274665117 CEST8.8.8.8192.168.2.70x960eName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.124644041 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:49:59.147748947 CEST8.8.8.8192.168.2.70x960eName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.216067076 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.234318972 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:49:59.252429962 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:49:59.305018902 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:01.393326044 CEST8.8.8.8192.168.2.70x6e5aName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:01.436784029 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:01.455447912 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:01.476432085 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:01.494363070 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:01.515038967 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:03.356900930 CEST8.8.8.8192.168.2.70xabf0Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:03.394578934 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:03.413331032 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:03.434359074 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:03.457411051 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:03.476334095 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:05.684484959 CEST8.8.8.8192.168.2.70x5057Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:05.721307993 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:05.742141962 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:05.761802912 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:05.781910896 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:05.799871922 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:08.151724100 CEST8.8.8.8192.168.2.70x7000Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.186973095 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:08.220877886 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.249907017 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:08.271193981 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:08.294326067 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:09.698939085 CEST8.8.8.8192.168.2.70x7000Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.289400101 CEST8.8.8.8192.168.2.70x5e4aName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.315807104 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:10.335757971 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.353692055 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:10.371742964 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:10.390542984 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:13.730717897 CEST8.8.8.8192.168.2.70xdda6Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.763123989 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:13.783987999 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.806222916 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:13.831871986 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:13.855473995 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:14.389233112 CEST8.8.8.8192.168.2.70xdda6Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:14.867403984 CEST8.8.8.8192.168.2.70xdda6Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.432742119 CEST8.8.8.8192.168.2.70x4a85Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.458967924 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:15.479576111 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.500281096 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:15.520478964 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:15.540834904 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:17.425961018 CEST8.8.8.8192.168.2.70xc285Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:17.451142073 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:17.469491005 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:17.487525940 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:17.507570982 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:17.533308029 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:18.916414976 CEST8.8.8.8192.168.2.70x5a96Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:18.954654932 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:18.974977016 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:18.994760036 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:19.012873888 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:19.031758070 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:20.563419104 CEST8.8.8.8192.168.2.70x654dName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:20.595380068 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:20.615622997 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:20.633987904 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:20.654202938 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:20.672302961 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:23.034744024 CEST8.8.8.8192.168.2.70xb093Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:23.058167934 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:23.078299999 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:23.096414089 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:23.114574909 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:23.134742975 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:24.436777115 CEST8.8.8.8192.168.2.70x3993Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:24.464018106 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:24.482281923 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:24.502979040 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:24.521646976 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:24.544363976 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:26.947271109 CEST8.8.8.8192.168.2.70x6f26Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:26.987024069 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:27.015486002 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:29.053275108 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:29.071413040 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:31.172678947 CEST8.8.8.8192.168.2.70xc2cbName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:31.836168051 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:31.860229969 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:31.927282095 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:31.948879957 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:31.968821049 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:36.938282013 CEST8.8.8.8192.168.2.70x4ac2Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:36.964608908 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:36.973332882 CEST8.8.8.8192.168.2.70x4ac2Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:36.985584021 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:37.003935099 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:37.036745071 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:37.055305004 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:38.477780104 CEST8.8.8.8192.168.2.70x4ac2Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:38.951469898 CEST8.8.8.8192.168.2.70x386bName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:38.980972052 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:39.002156019 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:39.022454023 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:39.042603016 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:39.062616110 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:40.345277071 CEST8.8.8.8192.168.2.70x325bName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:40.414843082 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:40.433434963 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:40.453635931 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:40.473654032 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:40.493432045 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:41.813671112 CEST8.8.8.8192.168.2.70xb5Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:41.843774080 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:41.863992929 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:41.884527922 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:41.903028011 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:41.922991037 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:43.720691919 CEST8.8.8.8192.168.2.70xaf65Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:43.746124983 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:43.766308069 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:43.786328077 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:43.804389954 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:43.824862003 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:46.606601000 CEST8.8.8.8192.168.2.70x79c7Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:46.633125067 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:46.655035973 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:46.676173925 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:46.702325106 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:46.724997044 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:47.913981915 CEST8.8.8.8192.168.2.70xfa2Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:47.938807011 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:47.961014032 CEST8.8.8.8192.168.2.70x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:47.982100964 CEST8.8.8.8192.168.2.70x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:48.002609015 CEST8.8.8.8192.168.2.70x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:48.020875931 CEST8.8.8.8192.168.2.70x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:48.598846912 CEST8.8.8.8192.168.2.70x79c7Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.658869028 CEST8.8.8.8192.168.2.70xe83Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.685262918 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:49.703661919 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.723515987 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:49.746051073 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:49.766846895 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:50.874103069 CEST8.8.8.8192.168.2.70x3be0Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:50.899250031 CEST8.8.8.8192.168.2.70x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                    Aug 31, 2022 23:50:50.919481993 CEST8.8.8.8192.168.2.70x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:50.937942982 CEST8.8.8.8192.168.2.70x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                    Aug 31, 2022 23:50:50.958199978 CEST8.8.8.8192.168.2.70x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                    Aug 31, 2022 23:50:50.978470087 CEST8.8.8.8192.168.2.70x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)

                                    Click to jump to process

                                    Target ID:0
                                    Start time:23:48:39
                                    Start date:31/08/2022
                                    Path:C:\Users\user\Desktop\O8ZHhytWhn.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\O8ZHhytWhn.exe"
                                    Imagebase:0xf1d0000
                                    File size:71168 bytes
                                    MD5 hash:B39FEBF7440B58A6CD15AE9F01916F98
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000000.00000000.248593701.000000000F1E2000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000002.517623653.000000000F1DA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000000.00000002.517637468.000000000F1E2000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000000.248569401.000000000F1DA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:3
                                    Start time:23:48:48
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    Target ID:4
                                    Start time:23:48:48
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:5
                                    Start time:23:48:50
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    Target ID:6
                                    Start time:23:48:50
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:7
                                    Start time:23:48:52
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    Target ID:8
                                    Start time:23:48:52
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:9
                                    Start time:23:48:56
                                    Start date:31/08/2022
                                    Path:C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
                                    Imagebase:0xfbc0000
                                    File size:71168 bytes
                                    MD5 hash:A1E6F4D9E1AF5740E07B86A42C6C430B
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000009.00000000.289875664.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000009.00000000.289867124.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000009.00000002.293155621.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000009.00000002.293144665.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Florian Roth
                                    • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Florian Roth
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: Joe Security
                                    • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: ditekSHen
                                    • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe, Author: kevoreilly
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    Reputation:low

                                    Target ID:10
                                    Start time:23:48:58
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    Target ID:13
                                    Start time:23:48:59
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:16
                                    Start time:23:49:02
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:18
                                    Start time:23:49:02
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:21
                                    Start time:23:49:04
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:22
                                    Start time:23:49:05
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:23
                                    Start time:23:49:06
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:24
                                    Start time:23:49:07
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:25
                                    Start time:23:49:07
                                    Start date:31/08/2022
                                    Path:C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\wjaoab.exe"
                                    Imagebase:0xfbc0000
                                    File size:71168 bytes
                                    MD5 hash:A1E6F4D9E1AF5740E07B86A42C6C430B
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000002.311529128.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000019.00000000.308682011.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000000.308674547.000000000FBCA000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000019.00000002.311539070.000000000FBD2000.00000008.00000001.01000000.00000006.sdmp, Author: Joe Security

                                    Target ID:26
                                    Start time:23:49:09
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:27
                                    Start time:23:49:09
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:28
                                    Start time:23:49:11
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                    Imagebase:0x7ff6ef7a0000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:30
                                    Start time:23:49:12
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:31
                                    Start time:23:49:14
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:32
                                    Start time:23:49:16
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:33
                                    Start time:23:49:20
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:34
                                    Start time:23:49:20
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:36
                                    Start time:23:49:23
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:37
                                    Start time:23:49:23
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:38
                                    Start time:23:49:26
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:39
                                    Start time:23:49:27
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:40
                                    Start time:23:49:29
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:41
                                    Start time:23:49:30
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:42
                                    Start time:23:49:33
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:43
                                    Start time:23:49:33
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:44
                                    Start time:23:49:36
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:45
                                    Start time:23:49:39
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:47
                                    Start time:23:49:42
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:48
                                    Start time:23:49:42
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:50
                                    Start time:23:49:45
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:51
                                    Start time:23:49:45
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:52
                                    Start time:23:49:48
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:53
                                    Start time:23:49:48
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:54
                                    Start time:23:49:50
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:55
                                    Start time:23:49:50
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:56
                                    Start time:23:49:53
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:57
                                    Start time:23:49:54
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:58
                                    Start time:23:50:00
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:59
                                    Start time:23:50:00
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:60
                                    Start time:23:50:02
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                    Imagebase:0x2f0000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:61
                                    Start time:23:50:02
                                    Start date:31/08/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6edaf0000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:62
                                    Start time:23:50:04
                                    Start date:31/08/2022
                                    Path:C:\Windows\SysWOW64\nslookup.exe
                                    Wow64 process (32bit):true
                                    Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                    Imagebase:0x10000
                                    File size:78336 bytes
                                    MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    No disassembly