Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gI5xZdIxUs.exe

Overview

General Information

Sample Name:gI5xZdIxUs.exe
Analysis ID:694566
MD5:98a12ec721c098842fbfd7384d5a72ae
SHA1:9dfd7d1746c8ae943f3dced0f85f0e3c6f5084f3
SHA256:f83457d173841c7e944bc60b00c197ca93c864893c71902cf1b1a36decdd30a4
Tags:exe
Infos:

Detection

Gandcrab, ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected ReflectiveLoader
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Snort IDS alert for network traffic
Contains functionality to determine the online IP of the system
Found Tor onion address
Uses nslookup.exe to query domains
Machine Learning detection for sample
May check the online IP address of the machine
Performs many domain queries via nslookup
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Too many similar processes found
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Queries information about the installed CPU (vendor, model number etc)
Drops PE files
Contains functionality to read the PEB
Found evaded block containing many API calls
Contains functionality to enumerate device drivers
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • gI5xZdIxUs.exe (PID: 5280 cmdline: "C:\Users\user\Desktop\gI5xZdIxUs.exe" MD5: 98A12EC721C098842FBFD7384D5A72AE)
    • nslookup.exe (PID: 5960 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4684 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4596 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 6112 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 1916 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5244 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 6028 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5116 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 680 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5124 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4972 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5604 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 736 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 6060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4460 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 4560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 6052 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5424 cmdline: nslookup nomoreransom.coin dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 4364 cmdline: nslookup nomoreransom.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 5188 cmdline: nslookup gandcrab.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 1960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 1164 cmdline: nslookup nomoreransom.coin dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 1092 cmdline: nslookup nomoreransom.bit dns1.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5844 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • nslookup.exe (PID: 968 cmdline: nslookup gandcrab.bit dns2.soprodns.ru MD5: 8E82529D1475D67615ADCB4E1B8F4EEC)
      • conhost.exe (PID: 5636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • isqmkp.exe (PID: 5464 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe" MD5: F4758788F11A0DE8D11EB4B8C515FFBD)
  • isqmkp.exe (PID: 1572 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe" MD5: F4758788F11A0DE8D11EB4B8C515FFBD)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
gI5xZdIxUs.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
  • 0xed22:$x1: ReflectiveLoader
gI5xZdIxUs.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
  • 0xe67e:$: DECRYPT.txt
  • 0xe6e4:$: DECRYPT.txt
gI5xZdIxUs.exeJoeSecurity_GandcrabYara detected GandcrabJoe Security
    gI5xZdIxUs.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      gI5xZdIxUs.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
      • 0xed21:$s1: _ReflectiveLoader@
      • 0xed22:$s2: ReflectiveLoader@
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
      • 0xed22:$x1: ReflectiveLoader
      C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
      • 0xe67e:$: DECRYPT.txt
      • 0xe6e4:$: DECRYPT.txt
      C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeJoeSecurity_GandcrabYara detected GandcrabJoe Security
        C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
          C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
          • 0xed21:$s1: _ReflectiveLoader@
          • 0xed22:$s2: ReflectiveLoader@
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          00000014.00000000.322631215.000000000F9DA000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
            0000000E.00000002.315651936.000000000F9DA000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
              0000000E.00000000.307654244.000000000F9E2000.00000008.00000001.01000000.00000005.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
                00000001.00000000.272296797.000000000FC6A000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                  0000000E.00000000.307645700.000000000F9DA000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                    Click to see the 14 entries
                    SourceRuleDescriptionAuthorStrings
                    14.2.isqmkp.exe.f9d0000.0.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
                    • 0xed22:$x1: ReflectiveLoader
                    14.2.isqmkp.exe.f9d0000.0.unpackSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
                    • 0xe67e:$: DECRYPT.txt
                    • 0xe6e4:$: DECRYPT.txt
                    14.2.isqmkp.exe.f9d0000.0.unpackJoeSecurity_GandcrabYara detected GandcrabJoe Security
                      14.2.isqmkp.exe.f9d0000.0.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                        14.2.isqmkp.exe.f9d0000.0.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
                        • 0xed21:$s1: _ReflectiveLoader@
                        • 0xed22:$s2: ReflectiveLoader@
                        Click to see the 31 entries
                        No Sigma rule has matched
                        Timestamp:192.168.2.38.8.8.860754532829498 08/31/22-23:58:43.044195
                        SID:2829498
                        Source Port:60754
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850789532829498 08/31/22-23:59:48.239260
                        SID:2829498
                        Source Port:50789
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858305532829498 08/31/22-23:59:32.365598
                        SID:2829498
                        Source Port:58305
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865389532829498 08/31/22-23:59:40.892307
                        SID:2829498
                        Source Port:65389
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.849203532026737 08/31/22-23:59:56.322889
                        SID:2026737
                        Source Port:49203
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856952532026737 08/31/22-23:58:46.555077
                        SID:2026737
                        Source Port:56952
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853051532829498 08/31/22-23:59:12.297576
                        SID:2829498
                        Source Port:53051
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853431532829498 08/31/22-23:59:18.287185
                        SID:2829498
                        Source Port:53431
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865022532829498 08/31/22-23:58:54.690068
                        SID:2829498
                        Source Port:65022
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.861420532829498 08/31/22-23:59:01.493233
                        SID:2829498
                        Source Port:61420
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.851994532829498 08/31/22-23:59:24.206869
                        SID:2829498
                        Source Port:51994
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860478532829498 08/31/22-23:59:59.939438
                        SID:2829498
                        Source Port:60478
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865019532829498 08/31/22-23:58:54.630989
                        SID:2829498
                        Source Port:65019
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850230532026737 09/01/22-00:00:07.433896
                        SID:2026737
                        Source Port:50230
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860093532026737 08/31/22-23:59:14.413883
                        SID:2026737
                        Source Port:60093
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858122532026737 08/31/22-23:59:27.247839
                        SID:2026737
                        Source Port:58122
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865515532026737 08/31/22-23:59:20.761806
                        SID:2026737
                        Source Port:65515
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852958532829498 08/31/22-23:58:07.331283
                        SID:2829498
                        Source Port:52958
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.854156532026737 08/31/22-23:59:42.281210
                        SID:2026737
                        Source Port:54156
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865110532829498 08/31/22-23:58:33.358759
                        SID:2829498
                        Source Port:65110
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853430532829498 08/31/22-23:59:18.269254
                        SID:2829498
                        Source Port:53430
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858121532026737 08/31/22-23:59:27.189978
                        SID:2026737
                        Source Port:58121
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865021532829498 08/31/22-23:58:54.669703
                        SID:2829498
                        Source Port:65021
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858306532829498 08/31/22-23:59:32.396919
                        SID:2829498
                        Source Port:58306
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.864126532026737 08/31/22-23:59:50.649034
                        SID:2026737
                        Source Port:64126
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858695532026737 08/31/22-23:58:36.600606
                        SID:2026737
                        Source Port:58695
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.861418532829498 08/31/22-23:59:01.454658
                        SID:2829498
                        Source Port:61418
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865516532026737 08/31/22-23:59:20.780161
                        SID:2026737
                        Source Port:65516
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865111532829498 08/31/22-23:58:33.379307
                        SID:2829498
                        Source Port:65111
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865388532829498 08/31/22-23:59:40.874321
                        SID:2829498
                        Source Port:65388
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858694532026737 08/31/22-23:58:36.580328
                        SID:2026737
                        Source Port:58694
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.854155532026737 08/31/22-23:59:42.262891
                        SID:2026737
                        Source Port:54155
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852957532829498 08/31/22-23:58:07.312591
                        SID:2829498
                        Source Port:52957
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.849204532026737 08/31/22-23:59:56.342973
                        SID:2026737
                        Source Port:49204
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860586532026737 08/31/22-23:58:15.043750
                        SID:2026737
                        Source Port:60586
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850231532026737 09/01/22-00:00:07.455721
                        SID:2026737
                        Source Port:50231
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852959532829498 08/31/22-23:58:07.365561
                        SID:2829498
                        Source Port:52959
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.862054532829498 08/31/22-23:58:21.744663
                        SID:2829498
                        Source Port:62054
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.859641532026737 08/31/22-23:58:24.944174
                        SID:2026737
                        Source Port:59641
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.859638532026737 08/31/22-23:58:24.884406
                        SID:2026737
                        Source Port:59638
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865198532026737 08/31/22-23:59:03.441447
                        SID:2026737
                        Source Port:65198
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865109532829498 08/31/22-23:58:33.338202
                        SID:2829498
                        Source Port:65109
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852457532829498 09/01/22-00:00:11.310934
                        SID:2829498
                        Source Port:52457
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860587532026737 08/31/22-23:58:15.064663
                        SID:2026737
                        Source Port:60587
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853470532026737 08/31/22-23:58:56.772805
                        SID:2026737
                        Source Port:53470
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856620532026737 09/01/22-00:00:02.142088
                        SID:2026737
                        Source Port:56620
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858693532026737 08/31/22-23:58:36.550637
                        SID:2026737
                        Source Port:58693
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858696532026737 08/31/22-23:58:36.619047
                        SID:2026737
                        Source Port:58696
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856954532026737 08/31/22-23:58:46.594398
                        SID:2026737
                        Source Port:56954
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.849205532026737 08/31/22-23:59:56.360951
                        SID:2026737
                        Source Port:49205
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856619532026737 09/01/22-00:00:02.120945
                        SID:2026737
                        Source Port:56619
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.851995532829498 08/31/22-23:59:24.227191
                        SID:2829498
                        Source Port:51995
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.861421532829498 08/31/22-23:59:01.511754
                        SID:2829498
                        Source Port:61421
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852960532829498 08/31/22-23:58:07.384051
                        SID:2829498
                        Source Port:52960
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865390532829498 08/31/22-23:59:40.910653
                        SID:2829498
                        Source Port:65390
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853053532829498 08/31/22-23:59:12.348894
                        SID:2829498
                        Source Port:53053
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.854158532026737 08/31/22-23:59:42.322126
                        SID:2026737
                        Source Port:54158
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860753532829498 08/31/22-23:58:43.024087
                        SID:2829498
                        Source Port:60753
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.857391532829498 09/01/22-00:00:05.158775
                        SID:2829498
                        Source Port:57391
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858303532829498 08/31/22-23:59:32.323930
                        SID:2829498
                        Source Port:58303
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860584532026737 08/31/22-23:58:15.004694
                        SID:2026737
                        Source Port:60584
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858123532026737 08/31/22-23:59:27.268863
                        SID:2026737
                        Source Port:58123
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860091532026737 08/31/22-23:59:14.371988
                        SID:2026737
                        Source Port:60091
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865200532026737 08/31/22-23:59:03.482704
                        SID:2026737
                        Source Port:65200
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853433532829498 08/31/22-23:59:18.325585
                        SID:2829498
                        Source Port:53433
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850787532829498 08/31/22-23:59:48.189200
                        SID:2829498
                        Source Port:50787
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860751532829498 08/31/22-23:58:42.984219
                        SID:2829498
                        Source Port:60751
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850786532829498 08/31/22-23:59:48.168544
                        SID:2829498
                        Source Port:50786
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853468532026737 08/31/22-23:58:56.731128
                        SID:2026737
                        Source Port:53468
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.849206532026737 08/31/22-23:59:56.381031
                        SID:2026737
                        Source Port:49206
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860475532829498 08/31/22-23:59:59.877731
                        SID:2829498
                        Source Port:60475
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.863448532026737 08/31/22-23:59:36.563649
                        SID:2026737
                        Source Port:63448
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.851997532829498 08/31/22-23:59:24.265731
                        SID:2829498
                        Source Port:51997
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856618532026737 09/01/22-00:00:02.100951
                        SID:2026737
                        Source Port:56618
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853471532026737 08/31/22-23:58:56.793274
                        SID:2026737
                        Source Port:53471
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853054532829498 08/31/22-23:59:12.369224
                        SID:2829498
                        Source Port:53054
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852458532829498 09/01/22-00:00:11.330853
                        SID:2829498
                        Source Port:52458
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865513532026737 08/31/22-23:59:20.720500
                        SID:2026737
                        Source Port:65513
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860828532829498 08/31/22-23:59:53.952246
                        SID:2829498
                        Source Port:60828
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.864124532026737 08/31/22-23:59:50.605079
                        SID:2026737
                        Source Port:64124
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.862052532829498 08/31/22-23:58:21.699516
                        SID:2829498
                        Source Port:62052
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.857390532829498 09/01/22-00:00:05.138814
                        SID:2829498
                        Source Port:57390
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850233532026737 09/01/22-00:00:07.502496
                        SID:2026737
                        Source Port:50233
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860090532026737 08/31/22-23:59:14.353291
                        SID:2026737
                        Source Port:60090
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852459532829498 09/01/22-00:00:11.350932
                        SID:2829498
                        Source Port:52459
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860827532829498 08/31/22-23:59:53.930680
                        SID:2829498
                        Source Port:60827
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853469532026737 08/31/22-23:58:56.749513
                        SID:2026737
                        Source Port:53469
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850232532026737 09/01/22-00:00:07.481526
                        SID:2026737
                        Source Port:50232
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865387532829498 08/31/22-23:59:40.854236
                        SID:2829498
                        Source Port:65387
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.863451532026737 08/31/22-23:59:36.620733
                        SID:2026737
                        Source Port:63451
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.864125532026737 08/31/22-23:59:50.625202
                        SID:2026737
                        Source Port:64125
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860476532829498 08/31/22-23:59:59.898864
                        SID:2829498
                        Source Port:60476
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.854157532026737 08/31/22-23:59:42.301537
                        SID:2026737
                        Source Port:54157
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.857392532829498 09/01/22-00:00:05.176878
                        SID:2829498
                        Source Port:57392
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.852460532829498 09/01/22-00:00:11.371195
                        SID:2829498
                        Source Port:52460
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.857389532829498 09/01/22-00:00:05.118977
                        SID:2829498
                        Source Port:57389
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856043532829498 08/31/22-23:58:21.768917
                        SID:2829498
                        Source Port:56043
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853052532829498 08/31/22-23:59:12.328339
                        SID:2829498
                        Source Port:53052
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.861419532829498 08/31/22-23:59:01.474961
                        SID:2829498
                        Source Port:61419
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.851996532829498 08/31/22-23:59:24.245596
                        SID:2829498
                        Source Port:51996
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.853432532829498 08/31/22-23:59:18.305428
                        SID:2829498
                        Source Port:53432
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860585532026737 08/31/22-23:58:15.025136
                        SID:2026737
                        Source Port:60585
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.863450532026737 08/31/22-23:59:36.602428
                        SID:2026737
                        Source Port:63450
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860477532829498 08/31/22-23:59:59.919053
                        SID:2829498
                        Source Port:60477
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856951532026737 08/31/22-23:58:46.526858
                        SID:2026737
                        Source Port:56951
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865112532829498 08/31/22-23:58:33.402809
                        SID:2829498
                        Source Port:65112
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865020532829498 08/31/22-23:58:54.651252
                        SID:2829498
                        Source Port:65020
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.863449532026737 08/31/22-23:59:36.584182
                        SID:2026737
                        Source Port:63449
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865201532026737 08/31/22-23:59:03.503720
                        SID:2026737
                        Source Port:65201
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860830532829498 08/31/22-23:59:53.997132
                        SID:2829498
                        Source Port:60830
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.859640532026737 08/31/22-23:58:24.925442
                        SID:2026737
                        Source Port:59640
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.864123532026737 08/31/22-23:59:50.576561
                        SID:2026737
                        Source Port:64123
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.850788532829498 08/31/22-23:59:48.220006
                        SID:2829498
                        Source Port:50788
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860092532026737 08/31/22-23:59:14.392903
                        SID:2026737
                        Source Port:60092
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858124532026737 08/31/22-23:59:27.287358
                        SID:2026737
                        Source Port:58124
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865199532026737 08/31/22-23:59:03.462712
                        SID:2026737
                        Source Port:65199
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.859639532026737 08/31/22-23:58:24.905091
                        SID:2026737
                        Source Port:59639
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856953532026737 08/31/22-23:58:46.573613
                        SID:2026737
                        Source Port:56953
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.858304532829498 08/31/22-23:59:32.344904
                        SID:2829498
                        Source Port:58304
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860752532829498 08/31/22-23:58:43.003278
                        SID:2829498
                        Source Port:60752
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.865514532026737 08/31/22-23:59:20.740564
                        SID:2026737
                        Source Port:65514
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.860829532829498 08/31/22-23:59:53.975918
                        SID:2829498
                        Source Port:60829
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.862053532829498 08/31/22-23:58:21.721380
                        SID:2829498
                        Source Port:62053
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected
                        Timestamp:192.168.2.38.8.8.856621532026737 09/01/22-00:00:02.160962
                        SID:2026737
                        Source Port:56621
                        Destination Port:53
                        Protocol:UDP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: gI5xZdIxUs.exeVirustotal: Detection: 85%Perma Link
                        Source: gI5xZdIxUs.exeMetadefender: Detection: 74%Perma Link
                        Source: gI5xZdIxUs.exeReversingLabs: Detection: 92%
                        Source: gI5xZdIxUs.exeAvira: detected
                        Source: dns1.soprodns.ruVirustotal: Detection: 5%Perma Link
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeAvira: detection malicious, Label: TR/Dropper.Gen
                        Source: gI5xZdIxUs.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeJoe Sandbox ML: detected
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpackAvira: Label: TR/Dropper.Gen
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC65880 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC682A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC662B0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC64950 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC68150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC65670 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC65210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D4950 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D5880 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D62B0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D82A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D5210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D5670 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D4950 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D5880 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D62B0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D82A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D5210 lstrlenA,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D8150 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D5670 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                        Source: gI5xZdIxUs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: gI5xZdIxUs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: z:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: x:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: v:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: t:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: r:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: p:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: n:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: l:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: j:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: h:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: f:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: b:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: y:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: w:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: u:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: s:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: q:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: o:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: m:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: k:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: i:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: g:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: e:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile opened: a:
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52957 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52958 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52959 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52960 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60584 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60585 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60586 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60587 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:62052 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:62053 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:62054 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:56043 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:59638 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:59639 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:59640 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:59641 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65109 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65110 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65111 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65112 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58693 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58694 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58695 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58696 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60751 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60752 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60753 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60754 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56951 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56952 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56953 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56954 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65019 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65020 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65021 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65022 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:53468 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:53469 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:53470 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:53471 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:61418 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:61419 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:61420 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:61421 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65198 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65199 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65200 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65201 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53051 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53052 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53053 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53054 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60090 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60091 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60092 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:60093 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53430 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53431 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53432 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:53433 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65513 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65514 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65515 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:65516 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:51994 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:51995 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:51996 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:51997 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58121 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58122 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58123 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:58124 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:58303 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:58304 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:58305 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:58306 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:63448 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:63449 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:63450 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:63451 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65387 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65388 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65389 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:65390 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:54155 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:54156 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:54157 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:54158 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:50786 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:50787 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:50788 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:50789 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:64123 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:64124 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:64125 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:64126 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60827 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60828 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60829 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60830 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:49203 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:49204 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:49205 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:49206 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60475 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60476 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60477 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:60478 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56618 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56619 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56620 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:56621 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:57389 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:57390 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:57391 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:57392 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:50230 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:50231 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:50232 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.3:50233 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52457 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52458 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52459 -> 8.8.8.8:53
                        Source: TrafficSnort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.3:52460 -> 8.8.8.8:53
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6E90 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                        Source: gI5xZdIxUs.exe, 00000001.00000002.537565986.000000000FC72000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: gI5xZdIxUs.exe, 00000001.00000000.272303387.000000000FC72000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: isqmkp.exe, 0000000E.00000000.307654244.000000000F9E2000.00000008.00000001.01000000.00000005.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: isqmkp.exe, 00000014.00000002.325494839.000000000F9E2000.00000008.00000001.01000000.00000005.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: gI5xZdIxUs.exeString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: isqmkp.exe.1.drString found in binary or memory: 4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeDNS query: name: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: gI5xZdIxUs.exe, isqmkp.exe.1.drString found in binary or memory: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
                        Source: gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/
                        Source: gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/4
                        Source: gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/a
                        Source: gI5xZdIxUs.exe, isqmkp.exe.1.drString found in binary or memory: https://tox.chat/download.html
                        Source: gI5xZdIxUs.exe, isqmkp.exe.1.drString found in binary or memory: https://www.torproject.org/
                        Source: unknownDNS traffic detected: queries for: ipv4bot.whatismyipaddress.com
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC67EF0 lstrcatW,InternetCloseHandle,InternetConnectW,VirtualAlloc,wsprintfW,HttpOpenRequestW,HttpAddRequestHeadersW,HttpSendRequestW,InternetReadFile,InternetReadFile,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,VirtualFree,
                        Source: gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: Yara matchFile source: gI5xZdIxUs.exe, type: SAMPLE
                        Source: Yara matchFile source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000E.00000000.307654244.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.325494839.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000000.322638424.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.315662109.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.537565986.000000000FC72000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.272303387.000000000FC72000.00000008.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: gI5xZdIxUs.exe PID: 5280, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: isqmkp.exe PID: 5464, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: isqmkp.exe PID: 1572, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPED
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6530 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                        Source: nslookup.exeProcess created: 42

                        System Summary

                        barindex
                        Source: gI5xZdIxUs.exe, type: SAMPLEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: gI5xZdIxUs.exe, type: SAMPLEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPEDMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPEDMatched rule: Gandcrab Payload Author: kevoreilly
                        Source: gI5xZdIxUs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: gI5xZdIxUs.exe, type: SAMPLEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: gI5xZdIxUs.exe, type: SAMPLEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: gI5xZdIxUs.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: gI5xZdIxUs.exe, type: SAMPLEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: Process Memory Space: gI5xZdIxUs.exe PID: 5280, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPEDMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPEDMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPEDMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC683C0
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC61C20
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC61020
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D83C0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D1C20
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D1020
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D83C0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D1C20
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D1020
                        Source: gI5xZdIxUs.exeVirustotal: Detection: 85%
                        Source: gI5xZdIxUs.exeMetadefender: Detection: 74%
                        Source: gI5xZdIxUs.exeReversingLabs: Detection: 92%
                        Source: gI5xZdIxUs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: unknownProcess created: C:\Users\user\Desktop\gI5xZdIxUs.exe "C:\Users\user\Desktop\gI5xZdIxUs.exe"
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe "C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe "C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Windows\SysWOW64\nslookup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeJump to behavior
                        Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@85/2@305/0
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC67330 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC646F0 CreateToolhelp32Snapshot,VirtualAlloc,Process32FirstW,CloseHandle,lstrcmpiW,OpenProcess,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,Process32NextW,VirtualFree,FindCloseChangeNotification,
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1920:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1552:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5484:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5636:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5984:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1784:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4560:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1000:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5844:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4624:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5388:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1960:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5552:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:792:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1012:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5556:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6060:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_01
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:496:120:WilError_01
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=342245cbb89b1482
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\SysWOW64\nslookup.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: gI5xZdIxUs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH

                        Data Obfuscation

                        barindex
                        Source: Yara matchFile source: gI5xZdIxUs.exe, type: SAMPLE
                        Source: Yara matchFile source: 14.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.2.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.0.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 20.0.isqmkp.exe.f9d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.gI5xZdIxUs.exe.fc60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000014.00000000.322631215.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.315651936.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000000.272296797.000000000FC6A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000000.307645700.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000014.00000002.325486891.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000002.537541962.000000000FC6A000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: gI5xZdIxUs.exe PID: 5280, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: isqmkp.exe PID: 5464, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: isqmkp.exe PID: 1572, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, type: DROPPED
                        Source: gI5xZdIxUs.exeStatic PE information: section name: .l2
                        Source: isqmkp.exe.1.drStatic PE information: section name: .l2
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC682A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeJump to dropped file
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce bwduumgtptlJump to behavior
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce bwduumgtptlJump to behavior
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce bwduumgtptlJump to behavior
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce bwduumgtptlJump to behavior
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exe TID: 5052Thread sleep count: 39 > 30
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exe TID: 5052Thread sleep time: -39000s >= -30000s
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeEvaded block: after key decision
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeEvaded block: after key decision
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: EnumDeviceDrivers,EnumDeviceDrivers,VirtualAlloc,EnumDeviceDrivers,GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: EnumDeviceDrivers,EnumDeviceDrivers,VirtualAlloc,EnumDeviceDrivers,GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC66A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6C90 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D6A40 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeSystem information queried: ModuleInformation
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeAPI call chain: ExitProcess graph end node
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeAPI call chain: ExitProcess graph end node
                        Source: gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllx
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC682A0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC633E0 lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrcpyA,ExitProcess,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC65EC0 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 14_2_0F9D5EC0 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeCode function: 20_2_0F9D5EC0 mov eax, dword ptr fs:[00000030h]
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.coin dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns2.soprodns.ru
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC63AA0 AllocateAndInitializeSid,GetModuleHandleA,GetProcAddress,FreeSid,
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC690A0 cpuid
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Users\user\Desktop\gI5xZdIxUs.exeCode function: 1_2_0FC67330 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        1
                        Replication Through Removable Media
                        2
                        Native API
                        1
                        Registry Run Keys / Startup Folder
                        11
                        Process Injection
                        1
                        Software Packing
                        1
                        Input Capture
                        11
                        Peripheral Device Discovery
                        1
                        Replication Through Removable Media
                        11
                        Archive Collected Data
                        Exfiltration Over Other Network Medium1
                        Ingress Tool Transfer
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                        Data Encrypted for Impact
                        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        Registry Run Keys / Startup Folder
                        1
                        Masquerading
                        LSASS Memory1
                        Account Discovery
                        Remote Desktop Protocol1
                        Input Capture
                        Exfiltration Over Bluetooth2
                        Encrypted Channel
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                        Virtualization/Sandbox Evasion
                        Security Account Manager1
                        System Network Connections Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                        Non-Application Layer Protocol
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                        Process Injection
                        NTDS1
                        File and Directory Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer1
                        Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets44
                        System Information Discovery
                        SSHKeyloggingData Transfer Size Limits1
                        Proxy
                        Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials11
                        Security Software Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                        Process Discovery
                        Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                        System Owner/User Discovery
                        Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                        Remote System Discovery
                        Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                        Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture2
                        System Network Configuration Discovery
                        Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 694566 Sample: gI5xZdIxUs.exe Startdate: 31/08/2022 Architecture: WINDOWS Score: 100 57 nomoreransom.coin 2->57 59 nomoreransom.bit 2->59 61 4 other IPs or domains 2->61 65 Snort IDS alert for network traffic 2->65 67 Multi AV Scanner detection for domain / URL 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 6 other signatures 2->71 8 gI5xZdIxUs.exe 1 28 2->8         started        13 isqmkp.exe 2->13         started        15 isqmkp.exe 2->15         started        signatures3 process4 dnsIp5 63 ipv4bot.whatismyipaddress.com 8->63 40 C:\Users\user\AppData\Roaming\...\isqmkp.exe, PE32 8->40 dropped 73 Contains functionality to determine the online IP of the system 8->73 75 May check the online IP address of the machine 8->75 77 Uses nslookup.exe to query domains 8->77 79 Performs many domain queries via nslookup 8->79 17 nslookup.exe 1 8->17         started        20 nslookup.exe 1 8->20         started        22 nslookup.exe 1 8->22         started        24 18 other processes 8->24 81 Antivirus detection for dropped file 13->81 83 Machine Learning detection for dropped file 13->83 file6 signatures7 process8 dnsIp9 42 dns1.soprodns.ru 17->42 45 nomoreransom.coin 17->45 47 8.8.8.8.in-addr.arpa 17->47 26 conhost.exe 17->26         started        51 3 other IPs or domains 20->51 28 conhost.exe 20->28         started        53 3 other IPs or domains 22->53 30 conhost.exe 22->30         started        49 nomoreransom.coin 24->49 55 53 other IPs or domains 24->55 32 conhost.exe 24->32         started        34 conhost.exe 24->34         started        36 conhost.exe 24->36         started        38 15 other processes 24->38 signatures10 85 May check the online IP address of the machine 42->85 process11

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        gI5xZdIxUs.exe86%VirustotalBrowse
                        gI5xZdIxUs.exe74%MetadefenderBrowse
                        gI5xZdIxUs.exe93%ReversingLabsWin32.Ransomware.GandCrab
                        gI5xZdIxUs.exe100%AviraTR/Dropper.Gen
                        gI5xZdIxUs.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe100%AviraTR/Dropper.Gen
                        C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLinkDownload
                        1.2.gI5xZdIxUs.exe.fc60000.0.unpack100%AviraTR/Dropper.GenDownload File
                        14.0.isqmkp.exe.f9d0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        20.2.isqmkp.exe.f9d0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        14.2.isqmkp.exe.f9d0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        1.0.gI5xZdIxUs.exe.fc60000.0.unpack100%AviraTR/Dropper.GenDownload File
                        20.0.isqmkp.exe.f9d0000.0.unpack100%AviraTR/Dropper.GenDownload File
                        SourceDetectionScannerLabelLink
                        nomoreransom.coin2%VirustotalBrowse
                        nomoreransom.bit1%VirustotalBrowse
                        gandcrab.bit2%VirustotalBrowse
                        dns1.soprodns.ru5%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b0%URL Reputationsafe
                        https://tox.chat/download.html0%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        nomoreransom.coin
                        unknown
                        unknowntrueunknown
                        ipv4bot.whatismyipaddress.com
                        unknown
                        unknownfalse
                          high
                          nomoreransom.bit
                          unknown
                          unknowntrueunknown
                          gandcrab.bit
                          unknown
                          unknowntrueunknown
                          dns1.soprodns.ru
                          unknown
                          unknowntrueunknown
                          dns2.soprodns.ru
                          unknown
                          unknowntrue
                            unknown
                            8.8.8.8.in-addr.arpa
                            unknown
                            unknownfalse
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://ipv4bot.whatismyipaddress.com/agI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://www.torproject.org/gI5xZdIxUs.exe, isqmkp.exe.1.drfalse
                                  high
                                  http://ipv4bot.whatismyipaddress.com/4gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2bgI5xZdIxUs.exe, isqmkp.exe.1.drtrue
                                    • URL Reputation: safe
                                    unknown
                                    http://ipv4bot.whatismyipaddress.com/gI5xZdIxUs.exe, 00000001.00000002.537080039.0000000000C7A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://tox.chat/download.htmlgI5xZdIxUs.exe, isqmkp.exe.1.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      No contacted IP infos
                                      Joe Sandbox Version:35.0.0 Citrine
                                      Analysis ID:694566
                                      Start date and time:2022-08-31 23:56:48 +02:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 9m 5s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:gI5xZdIxUs.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:62
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.rans.troj.evad.winEXE@85/2@305/0
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:
                                      • Successful, ratio: 100% (good quality ratio 96%)
                                      • Quality average: 83.6%
                                      • Quality standard deviation: 24.5%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 20.82.228.9
                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, store-images.s-microsoft.com, neus2c-displaycatalog.frontdoor.bigcatalog.commerce.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      23:57:59AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce bwduumgtptl "C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
                                      23:58:08AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce bwduumgtptl "C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\gI5xZdIxUs.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2218
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:F97F9E17EAFDD0105A4E11BAFDE04B40
                                      SHA1:BA06A7ABE986A61B71889B80A6F9B02B22D40667
                                      SHA-256:4783424121E6C2F870DC931B374D20C62C764EDDC5769D2F536609ADC1226ABB
                                      SHA-512:778C4AAB55F6F0FE44DBC9A97F53B59EC8ED2E35901F77AFEBAEA57C738AD301412760709AB909B51335DDD7676CD8F8C1410C5751F2EF5CC74282BCD6C5F50E
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\gI5xZdIxUs.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):101710
                                      Entropy (8bit):5.97549755837271
                                      Encrypted:false
                                      SSDEEP:1536:dZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAwfMqqU+2bbbAV2/S2LkvdQ:BBounVyFHpfMqqDL2/LkvdmYvQd2a
                                      MD5:F4758788F11A0DE8D11EB4B8C515FFBD
                                      SHA1:04C1326C595D62977F53037F91B3FB863D4039BA
                                      SHA-256:DFCE3F5E421DEAF40DAB26ABDF67D5873968DB47B6DDE38787B90FF2CEAB3C96
                                      SHA-512:49C27F1DFA7C78C99C9055772D04BC89CEA41DF2DF027A400C915195FC82E8904FD89974F30CC7FD484A998DB0AE4B6F5440B5BA02FC56D2BB1ECE98117FBC38
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Florian Roth
                                      • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Florian Roth
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Joe Security
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Joe Security
                                      • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: ditekSHen
                                      • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: kevoreilly
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      Preview:MZ......................@...............................................!..L.!This .R.Y6.m cannot be run in DOS mode....$........Tg..:4..:4..:4..4..:4..4..:4...4..:4..:4..:4...4..:4..;42.:4...4..:4...4..:4...4..:4...4..:4Rich..:4........PE..L....Z.Z.............................K.......................................p............@.............................U...8........`.......................P.......................................................................................text.............................. ..`.rdata...p.......r..................@..@.data........ ......................@....CRT.........0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B.l2..........`......................@..@........................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):5.9754370991350365
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:gI5xZdIxUs.exe
                                      File size:101710
                                      MD5:98a12ec721c098842fbfd7384d5a72ae
                                      SHA1:9dfd7d1746c8ae943f3dced0f85f0e3c6f5084f3
                                      SHA256:f83457d173841c7e944bc60b00c197ca93c864893c71902cf1b1a36decdd30a4
                                      SHA512:a0b74851a36115822bf619a1a767cd76f57539a87dbbd4d452f309839f903ad7d94937a46acdcbc1e41bb50e381fe0fd2394122ec1260f05722a578030973ed8
                                      SSDEEP:1536:YZZZZZZZZZZZZpXzzzzzzzzzzzzV9rXounV98hbHnAwfMqqU+2bbbAV2/S2LkvdQ:WBounVyFHpfMqqDL2/LkvdmYvQd2a
                                      TLSH:F8A3490972E1A0A3E1E20679E5756EE5456E3C103F2496EB3993378D69728F0AD3B703
                                      File Content Preview:MZ......................@...............................................!..L.!This .<].e.m cannot be run in DOS mode....$.........Tg..:4..:4..:4...4..:4...4..:4...4..:4..:4..:4...4..:4..;42.:4...4..:4...4..:4...4..:4...4..:4Rich..:4........PE..L....Z.Z...
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x10004bf0
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x10000000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                                      Time Stamp:0x5A8C5AD9 [Tue Feb 20 17:28:57 2018 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:6b11af918234585a966ca8fab046dc6c
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 0Ch
                                      mov dword ptr [ebp-0Ch], 00000001h
                                      mov eax, dword ptr [ebp+0Ch]
                                      mov dword ptr [ebp-08h], eax
                                      cmp dword ptr [ebp-08h], 01h
                                      jmp 00007F0364768A56h
                                      jmp 00007F0364768A7Ch
                                      jmp 00007F0364768A7Ah
                                      push 00000000h
                                      push 00000000h
                                      push 00000000h
                                      push 10004950h
                                      push 00000000h
                                      push 00000000h
                                      call dword ptr [1000A108h]
                                      mov dword ptr [ebp-04h], eax
                                      cmp dword ptr [ebp-04h], 00000000h
                                      je 00007F0364768A5Ch
                                      mov ecx, dword ptr [ebp-04h]
                                      push ecx
                                      call dword ptr [1000A10Ch]
                                      mov eax, dword ptr [ebp-0Ch]
                                      mov esp, ebp
                                      pop ebp
                                      retn 000Ch
                                      int3
                                      int3
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 5Ch
                                      push esi
                                      push 00000044h
                                      lea eax, dword ptr [ebp-58h]
                                      xorps xmm0, xmm0
                                      push 00000000h
                                      push eax
                                      mov esi, ecx
                                      movdqu dqword ptr [ebp-10h], xmm0
                                      call 00007F036476CE07h
                                      mov eax, dword ptr [10012A6Ch]
                                      add esp, 0Ch
                                      mov dword ptr [ebp-18h], eax
                                      mov dword ptr [ebp-1Ch], eax
                                      mov eax, dword ptr [10012A68h]
                                      or dword ptr [ebp-2Ch], 00000101h
                                      mov dword ptr [ebp-20h], eax
                                      xor eax, eax
                                      mov word ptr [ebp-28h], ax
                                      lea eax, dword ptr [ebp-10h]
                                      push eax
                                      lea eax, dword ptr [ebp-58h]
                                      mov dword ptr [ebp-58h], 00000044h
                                      push eax
                                      push 00000000h
                                      push 00000000h
                                      push 00000000h
                                      push 00000001h
                                      push 00000000h
                                      push 00000000h
                                      push esi
                                      push 00000000h
                                      call dword ptr [1000A164h]
                                      test eax, eax
                                      jne 00007F0364768A5Dh
                                      call dword ptr [1000A064h]
                                      pop esi
                                      mov esp, ebp
                                      pop ebp
                                      ret
                                      push dword ptr [ebp-10h]
                                      Programming Language:
                                      • [ C ] VS2013 build 21005
                                      • [IMP] VS2008 SP1 build 30729
                                      • [EXP] VS2013 build 21005
                                      • [RES] VS2013 build 21005
                                      • [LNK] VS2013 build 21005
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x104e00x55.rdata
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x105380xb4.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x200.l2
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x150000xac4.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0xa0000x1fc.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x82e80x8400False0.4593690814393939data6.340223357377212IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0xa0000x70a60x7200False0.4923245614035088data6.181274430024402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x120000xa800xc00False0.3160807291666667data3.1174892908286225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .CRT0x130000x40x200False0.033203125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .rsrc0x140000x1e00x200False0.52734375data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x150000xac40xc00False0.7802734375data6.4568381269501165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      .l20x160000x2000x200False0.52734375data4.7137725829467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_MANIFEST0x160600x17dXML 1.0 document textEnglishUnited States
                                      DLLImport
                                      KERNEL32.dllSetFilePointer, GetFileAttributesW, ReadFile, GetLastError, MoveFileW, lstrcpyW, SetFileAttributesW, CreateMutexW, GetDriveTypeW, VerSetConditionMask, WaitForSingleObject, GetTickCount, InitializeCriticalSection, OpenProcess, GetSystemDirectoryW, TerminateThread, Sleep, TerminateProcess, VerifyVersionInfoW, WaitForMultipleObjects, DeleteCriticalSection, ExpandEnvironmentStringsW, lstrlenW, SetHandleInformation, lstrcatA, MultiByteToWideChar, CreatePipe, lstrcmpiA, Process32NextW, CreateToolhelp32Snapshot, LeaveCriticalSection, EnterCriticalSection, FindFirstFileW, lstrcmpW, FindClose, FindNextFileW, GetNativeSystemInfo, GetComputerNameW, GetDiskFreeSpaceW, GetWindowsDirectoryW, GetVolumeInformationW, LoadLibraryA, lstrcmpiW, VirtualFree, CreateThread, CloseHandle, lstrcatW, CreateFileMappingW, ExitThread, CreateFileW, GetModuleFileNameW, WriteFile, GetModuleHandleW, UnmapViewOfFile, MapViewOfFile, GetFileSize, GetEnvironmentVariableW, lstrcpyA, GetModuleHandleA, VirtualAlloc, GetProcAddress, Process32FirstW, GetTempPathW, GetProcessHeap, HeapFree, HeapAlloc, lstrlenA, CreateProcessW, ExitProcess, IsProcessorFeaturePresent
                                      USER32.dllBeginPaint, wsprintfW, TranslateMessage, LoadCursorW, LoadIconW, MessageBoxA, GetMessageW, EndPaint, DestroyWindow, RegisterClassExW, ShowWindow, CreateWindowExW, SendMessageW, DispatchMessageW, DefWindowProcW, UpdateWindow, GetForegroundWindow, SetWindowLongW
                                      GDI32.dllTextOutW
                                      ADVAPI32.dllFreeSid, RegSetValueExW, RegCreateKeyExW, RegCloseKey, CryptExportKey, CryptAcquireContextW, CryptGetKeyParam, CryptReleaseContext, CryptImportKey, CryptEncrypt, CryptGenKey, CryptDestroyKey, GetUserNameW, RegQueryValueExW, RegOpenKeyExW, AllocateAndInitializeSid
                                      SHELL32.dllShellExecuteW, SHGetSpecialFolderPathW, ShellExecuteExW
                                      CRYPT32.dllCryptStringToBinaryA, CryptBinaryToStringA
                                      WININET.dllInternetCloseHandle, HttpAddRequestHeadersW, HttpSendRequestW, InternetConnectW, HttpOpenRequestW, InternetOpenW, InternetReadFile
                                      PSAPI.DLLEnumDeviceDrivers, GetDeviceDriverBaseNameW
                                      NameOrdinalAddress
                                      _ReflectiveLoader@010x10005ec0
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.38.8.8.860754532829498 08/31/22-23:58:43.044195UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16075453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850789532829498 08/31/22-23:59:48.239260UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15078953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858305532829498 08/31/22-23:59:32.365598UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15830553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865389532829498 08/31/22-23:59:40.892307UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16538953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.849203532026737 08/31/22-23:59:56.322889UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)4920353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856952532026737 08/31/22-23:58:46.555077UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5695253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853051532829498 08/31/22-23:59:12.297576UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15305153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853431532829498 08/31/22-23:59:18.287185UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15343153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865022532829498 08/31/22-23:58:54.690068UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16502253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.861420532829498 08/31/22-23:59:01.493233UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16142053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.851994532829498 08/31/22-23:59:24.206869UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15199453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860478532829498 08/31/22-23:59:59.939438UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16047853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865019532829498 08/31/22-23:58:54.630989UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16501953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850230532026737 09/01/22-00:00:07.433896UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860093532026737 08/31/22-23:59:14.413883UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6009353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858122532026737 08/31/22-23:59:27.247839UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5812253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865515532026737 08/31/22-23:59:20.761806UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6551553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852958532829498 08/31/22-23:58:07.331283UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15295853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.854156532026737 08/31/22-23:59:42.281210UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5415653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865110532829498 08/31/22-23:58:33.358759UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16511053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853430532829498 08/31/22-23:59:18.269254UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15343053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858121532026737 08/31/22-23:59:27.189978UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5812153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865021532829498 08/31/22-23:58:54.669703UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16502153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858306532829498 08/31/22-23:59:32.396919UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15830653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.864126532026737 08/31/22-23:59:50.649034UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6412653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858695532026737 08/31/22-23:58:36.600606UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5869553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.861418532829498 08/31/22-23:59:01.454658UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16141853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865516532026737 08/31/22-23:59:20.780161UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6551653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865111532829498 08/31/22-23:58:33.379307UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16511153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865388532829498 08/31/22-23:59:40.874321UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16538853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858694532026737 08/31/22-23:58:36.580328UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5869453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.854155532026737 08/31/22-23:59:42.262891UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5415553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852957532829498 08/31/22-23:58:07.312591UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15295753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.849204532026737 08/31/22-23:59:56.342973UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)4920453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860586532026737 08/31/22-23:58:15.043750UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6058653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850231532026737 09/01/22-00:00:07.455721UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852959532829498 08/31/22-23:58:07.365561UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15295953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.862054532829498 08/31/22-23:58:21.744663UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16205453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.859641532026737 08/31/22-23:58:24.944174UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5964153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.859638532026737 08/31/22-23:58:24.884406UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5963853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865198532026737 08/31/22-23:59:03.441447UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6519853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865109532829498 08/31/22-23:58:33.338202UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16510953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852457532829498 09/01/22-00:00:11.310934UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15245753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860587532026737 08/31/22-23:58:15.064663UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6058753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853470532026737 08/31/22-23:58:56.772805UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5347053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856620532026737 09/01/22-00:00:02.142088UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5662053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858693532026737 08/31/22-23:58:36.550637UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5869353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858696532026737 08/31/22-23:58:36.619047UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5869653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856954532026737 08/31/22-23:58:46.594398UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5695453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.849205532026737 08/31/22-23:59:56.360951UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)4920553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856619532026737 09/01/22-00:00:02.120945UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5661953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.851995532829498 08/31/22-23:59:24.227191UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15199553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.861421532829498 08/31/22-23:59:01.511754UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16142153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852960532829498 08/31/22-23:58:07.384051UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15296053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865390532829498 08/31/22-23:59:40.910653UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16539053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853053532829498 08/31/22-23:59:12.348894UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15305353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.854158532026737 08/31/22-23:59:42.322126UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5415853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860753532829498 08/31/22-23:58:43.024087UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16075353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.857391532829498 09/01/22-00:00:05.158775UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15739153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858303532829498 08/31/22-23:59:32.323930UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15830353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860584532026737 08/31/22-23:58:15.004694UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6058453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858123532026737 08/31/22-23:59:27.268863UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5812353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860091532026737 08/31/22-23:59:14.371988UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6009153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865200532026737 08/31/22-23:59:03.482704UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6520053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853433532829498 08/31/22-23:59:18.325585UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15343353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850787532829498 08/31/22-23:59:48.189200UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15078753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860751532829498 08/31/22-23:58:42.984219UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16075153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850786532829498 08/31/22-23:59:48.168544UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15078653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853468532026737 08/31/22-23:58:56.731128UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5346853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.849206532026737 08/31/22-23:59:56.381031UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)4920653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860475532829498 08/31/22-23:59:59.877731UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16047553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.863448532026737 08/31/22-23:59:36.563649UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6344853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.851997532829498 08/31/22-23:59:24.265731UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15199753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856618532026737 09/01/22-00:00:02.100951UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5661853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853471532026737 08/31/22-23:58:56.793274UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5347153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853054532829498 08/31/22-23:59:12.369224UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15305453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852458532829498 09/01/22-00:00:11.330853UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15245853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865513532026737 08/31/22-23:59:20.720500UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6551353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860828532829498 08/31/22-23:59:53.952246UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16082853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.864124532026737 08/31/22-23:59:50.605079UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6412453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.862052532829498 08/31/22-23:58:21.699516UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16205253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.857390532829498 09/01/22-00:00:05.138814UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15739053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850233532026737 09/01/22-00:00:07.502496UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860090532026737 08/31/22-23:59:14.353291UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6009053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852459532829498 09/01/22-00:00:11.350932UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15245953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860827532829498 08/31/22-23:59:53.930680UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16082753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853469532026737 08/31/22-23:58:56.749513UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5346953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850232532026737 09/01/22-00:00:07.481526UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5023253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865387532829498 08/31/22-23:59:40.854236UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16538753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.863451532026737 08/31/22-23:59:36.620733UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6345153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.864125532026737 08/31/22-23:59:50.625202UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6412553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860476532829498 08/31/22-23:59:59.898864UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16047653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.854157532026737 08/31/22-23:59:42.301537UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5415753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.857392532829498 09/01/22-00:00:05.176878UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15739253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.852460532829498 09/01/22-00:00:11.371195UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15246053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.857389532829498 09/01/22-00:00:05.118977UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15738953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856043532829498 08/31/22-23:58:21.768917UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15604353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853052532829498 08/31/22-23:59:12.328339UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15305253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.861419532829498 08/31/22-23:59:01.474961UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16141953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.851996532829498 08/31/22-23:59:24.245596UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15199653192.168.2.38.8.8.8
                                      192.168.2.38.8.8.853432532829498 08/31/22-23:59:18.305428UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15343253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860585532026737 08/31/22-23:58:15.025136UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6058553192.168.2.38.8.8.8
                                      192.168.2.38.8.8.863450532026737 08/31/22-23:59:36.602428UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6345053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860477532829498 08/31/22-23:59:59.919053UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16047753192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856951532026737 08/31/22-23:58:46.526858UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5695153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865112532829498 08/31/22-23:58:33.402809UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16511253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865020532829498 08/31/22-23:58:54.651252UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16502053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.863449532026737 08/31/22-23:59:36.584182UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6344953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865201532026737 08/31/22-23:59:03.503720UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6520153192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860830532829498 08/31/22-23:59:53.997132UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16083053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.859640532026737 08/31/22-23:58:24.925442UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5964053192.168.2.38.8.8.8
                                      192.168.2.38.8.8.864123532026737 08/31/22-23:59:50.576561UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6412353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.850788532829498 08/31/22-23:59:48.220006UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15078853192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860092532026737 08/31/22-23:59:14.392903UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6009253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858124532026737 08/31/22-23:59:27.287358UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5812453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865199532026737 08/31/22-23:59:03.462712UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6519953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.859639532026737 08/31/22-23:58:24.905091UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5963953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856953532026737 08/31/22-23:58:46.573613UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5695353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.858304532829498 08/31/22-23:59:32.344904UDP2829498ETPRO TROJAN GandCrab DNS Lookup 15830453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860752532829498 08/31/22-23:58:43.003278UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16075253192.168.2.38.8.8.8
                                      192.168.2.38.8.8.865514532026737 08/31/22-23:59:20.740564UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)6551453192.168.2.38.8.8.8
                                      192.168.2.38.8.8.860829532829498 08/31/22-23:59:53.975918UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16082953192.168.2.38.8.8.8
                                      192.168.2.38.8.8.862053532829498 08/31/22-23:58:21.721380UDP2829498ETPRO TROJAN GandCrab DNS Lookup 16205353192.168.2.38.8.8.8
                                      192.168.2.38.8.8.856621532026737 09/01/22-00:00:02.160962UDP2026737ET TROJAN Observed GandCrab Domain (gandcrab .bit)5662153192.168.2.38.8.8.8
                                      TimestampSource PortDest PortSource IPDest IP
                                      Aug 31, 2022 23:58:02.760505915 CEST4930253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:02.778575897 CEST53493028.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:04.036793947 CEST5397553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:04.649065018 CEST53539758.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:04.671662092 CEST5397653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:04.690844059 CEST53539768.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:04.692158937 CEST5397753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:04.712151051 CEST53539778.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:04.718662977 CEST5397853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:04.738368988 CEST53539788.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:04.739443064 CEST5397953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:04.757306099 CEST53539798.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:04.757896900 CEST5398053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:04.775638103 CEST53539808.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:07.165702105 CEST5295553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:07.250682116 CEST53529558.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:07.294450998 CEST5295653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:07.311570883 CEST53529568.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:07.312591076 CEST5295753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:07.330202103 CEST53529578.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:07.331283092 CEST5295853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:07.351011992 CEST53529588.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:07.365561008 CEST5295953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:07.383272886 CEST53529598.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:07.384051085 CEST5296053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:07.404005051 CEST53529608.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:13.881591082 CEST6058253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:14.902959108 CEST6058253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:14.937246084 CEST53605828.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:14.982489109 CEST6058353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:15.000052929 CEST53605838.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:15.004693985 CEST6058453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:15.024588108 CEST53605848.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:15.025135994 CEST6058553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:15.043148041 CEST53605858.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:15.043750048 CEST6058653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:15.064032078 CEST53605868.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:15.064662933 CEST6058753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:15.082518101 CEST53605878.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:17.123805046 CEST5713453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.161257982 CEST5713453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.234639883 CEST53571348.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.235239029 CEST53571348.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.284126997 CEST5713553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.303237915 CEST53571358.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.304316998 CEST5713653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.324134111 CEST53571368.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.324816942 CEST5713753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.344474077 CEST53571378.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.345424891 CEST5713853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.363096952 CEST53571388.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.371185064 CEST5713953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:18.391031981 CEST53571398.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:18.899728060 CEST53605828.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:20.518393040 CEST6205053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.514583111 CEST6205053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.646465063 CEST53620508.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:21.674954891 CEST6205153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.675831079 CEST53620508.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:21.698769093 CEST53620518.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:21.699516058 CEST6205253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.720890999 CEST53620528.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:21.721379995 CEST6205353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.744118929 CEST53620538.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:21.744663000 CEST6205453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.768213034 CEST53620548.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:21.768917084 CEST5604353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:21.789768934 CEST53560438.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:23.738740921 CEST5963653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.732259989 CEST5963653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.804043055 CEST53596368.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:24.850137949 CEST5963753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.869385004 CEST53596378.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:24.884406090 CEST5963853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.904200077 CEST53596388.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:24.905091047 CEST5963953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.924804926 CEST53596398.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:24.925441980 CEST5964053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.943135023 CEST53596408.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:24.944174051 CEST5964153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:24.964257956 CEST53596418.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:27.219465017 CEST5563853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:27.255918026 CEST53556388.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:27.292717934 CEST5563953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:27.311678886 CEST53556398.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:27.316054106 CEST5564053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:27.336108923 CEST53556408.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:27.336745024 CEST5564153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:27.355282068 CEST53556418.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:27.361900091 CEST5564253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:27.381726027 CEST53556428.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:27.382469893 CEST5564353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:27.402415991 CEST53556438.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:28.756191015 CEST53596368.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:32.660929918 CEST6076753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:33.272780895 CEST53607678.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:33.320008993 CEST6510853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:33.337179899 CEST53651088.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:33.338202000 CEST6510953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:33.357716084 CEST53651098.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:33.358758926 CEST6511053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:33.378457069 CEST53651108.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:33.379307032 CEST6511153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:33.398911953 CEST53651118.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:33.402808905 CEST6511253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:33.424699068 CEST53651128.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:35.661753893 CEST5869153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:36.474462986 CEST53586918.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:36.532491922 CEST5869253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:36.549562931 CEST53586928.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:36.550637007 CEST5869353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:36.570236921 CEST53586938.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:36.580327988 CEST5869453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:36.600003004 CEST53586948.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:36.600605965 CEST5869553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:36.618398905 CEST53586958.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:36.619046926 CEST5869653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:36.638629913 CEST53586968.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:38.594002962 CEST5330553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.608630896 CEST5330553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.644859076 CEST53533058.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:39.711462975 CEST5943453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.735524893 CEST53594348.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:39.736547947 CEST5943553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.759757996 CEST53594358.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:39.762542009 CEST5943653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.798645973 CEST53594368.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:39.799617052 CEST5943753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.823673964 CEST53594378.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:39.827074051 CEST5943853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:39.854238987 CEST53594388.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:40.380073071 CEST53533058.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:41.899421930 CEST6074953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:42.906723976 CEST6074953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:42.943233967 CEST53607498.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:42.963799000 CEST6075053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:42.983344078 CEST53607508.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:42.984219074 CEST6075153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:43.002011061 CEST53607518.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:43.003278017 CEST6075253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:43.023278952 CEST53607528.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:43.024086952 CEST6075353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:43.043633938 CEST53607538.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:43.044194937 CEST6075453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:43.062766075 CEST53607548.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:43.196578026 CEST53607498.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:45.860322952 CEST5694953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:46.470341921 CEST53569498.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:46.506845951 CEST5695053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:46.525938988 CEST53569508.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:46.526858091 CEST5695153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:46.544490099 CEST53569518.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:46.555077076 CEST5695253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:46.573009968 CEST53569528.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:46.573612928 CEST5695353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:46.593744993 CEST53569538.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:46.594398022 CEST5695453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:46.614161015 CEST53569548.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:52.439661980 CEST5384453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:52.489172935 CEST53538448.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:52.509126902 CEST5384553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:52.528167963 CEST53538458.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:52.529035091 CEST5384653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:52.548969030 CEST53538468.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:52.552397013 CEST5384753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:52.570151091 CEST53538478.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:52.570688963 CEST5384853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:52.590229988 CEST53538488.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:52.590786934 CEST5384953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:52.608671904 CEST53538498.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:54.559582949 CEST6501753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:54.588342905 CEST53650178.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:54.611123085 CEST6501853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:54.628262997 CEST53650188.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:54.630989075 CEST6501953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:54.650563002 CEST53650198.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:54.651252031 CEST6502053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:54.668998957 CEST53650208.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:54.669703007 CEST6502153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:54.689425945 CEST53650218.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:54.690068007 CEST6502253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:54.709500074 CEST53650228.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:56.637871027 CEST5346653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:56.674391985 CEST53534668.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:56.711035013 CEST5346753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:56.730349064 CEST53534678.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:56.731127977 CEST5346853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:56.748970032 CEST53534688.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:56.749512911 CEST5346953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:56.769344091 CEST53534698.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:56.772804976 CEST5347053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:56.792510033 CEST53534708.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:56.793273926 CEST5347153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:56.812910080 CEST53534718.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:59.232460976 CEST5362353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:59.266350985 CEST53536238.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:59.292783976 CEST5362453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:59.311882973 CEST53536248.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:59.312763929 CEST5362553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:59.332475901 CEST53536258.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:59.338818073 CEST5362653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:59.356389046 CEST53536268.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:59.357353926 CEST5362753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:59.374880075 CEST53536278.8.8.8192.168.2.3
                                      Aug 31, 2022 23:58:59.376303911 CEST5362853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:58:59.394289017 CEST53536288.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:01.363595963 CEST6141653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:01.399610996 CEST53614168.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:01.436424971 CEST6141753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:01.453686953 CEST53614178.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:01.454658031 CEST6141853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:01.474419117 CEST53614188.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:01.474961042 CEST6141953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:01.492651939 CEST53614198.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:01.493232965 CEST6142053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:01.511037111 CEST53614208.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:01.511754036 CEST6142153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:01.529551029 CEST53614218.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:03.366775036 CEST6519653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:03.405114889 CEST53651968.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:03.423759937 CEST6519753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:03.440768003 CEST53651978.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:03.441447020 CEST6519853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:03.461023092 CEST53651988.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:03.462712049 CEST6519953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:03.482172012 CEST53651998.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:03.482703924 CEST6520053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:03.502460003 CEST53652008.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:03.503720045 CEST6520153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:03.521188974 CEST53652018.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:05.917948008 CEST5870853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:06.501457930 CEST53587088.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:06.518330097 CEST5870953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:06.537347078 CEST53587098.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:06.541033030 CEST5871053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:06.560595989 CEST53587108.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:06.561108112 CEST5871153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:06.581572056 CEST53587118.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:06.582118988 CEST5871253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:06.599746943 CEST53587128.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:06.600199938 CEST5871353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:06.617580891 CEST53587138.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:11.520944118 CEST5304953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:12.252245903 CEST53530498.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:12.277647972 CEST5305053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:12.296758890 CEST53530508.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:12.297575951 CEST5305153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:12.317811966 CEST53530518.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:12.328339100 CEST5305253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:12.348246098 CEST53530528.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:12.348893881 CEST5305353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:12.368700981 CEST53530538.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:12.369224072 CEST5305453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:12.389571905 CEST53530548.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:14.234563112 CEST6008853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:14.311661005 CEST53600888.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:14.331684113 CEST6008953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:14.352329969 CEST53600898.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:14.353291035 CEST6009053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:14.371464014 CEST53600908.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:14.371988058 CEST6009153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:14.392226934 CEST53600918.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:14.392903090 CEST6009253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:14.412553072 CEST53600928.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:14.413882971 CEST6009353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:14.435400963 CEST53600938.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:15.707844973 CEST6356253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:15.756638050 CEST53635628.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:15.767276049 CEST6356353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:15.786377907 CEST53635638.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:15.789041996 CEST6356453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:15.808978081 CEST53635648.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:15.809427023 CEST6356553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:15.827245951 CEST53635658.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:15.838541031 CEST6356653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:15.856257915 CEST53635668.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:15.856786013 CEST6356753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:15.874497890 CEST53635678.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:17.091232061 CEST5342853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.080478907 CEST5342853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.240111113 CEST53534288.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:18.249520063 CEST5342953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.268676043 CEST53534298.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:18.269253969 CEST5343053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.286752939 CEST53534308.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:18.287184954 CEST5343153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.304971933 CEST53534318.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:18.305428028 CEST5343253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.325037003 CEST53534328.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:18.325584888 CEST5343353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:18.345073938 CEST53534338.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:18.697067022 CEST53534288.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:19.656590939 CEST6551153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.653614998 CEST6551153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.690124035 CEST53655118.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:20.699863911 CEST6551253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.719475031 CEST53655128.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:20.720499992 CEST6551353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.740108013 CEST53655138.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:20.740564108 CEST6551453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.757486105 CEST53655118.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:20.760489941 CEST53655148.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:20.761806011 CEST6551553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.779664040 CEST53655158.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:20.780160904 CEST6551653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:20.799532890 CEST53655168.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:22.015532970 CEST5982053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:22.145498037 CEST53598208.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:22.154289007 CEST5982153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:22.173274994 CEST53598218.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:22.173866034 CEST5982253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:22.191287994 CEST53598228.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:22.195880890 CEST5982353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:22.215575933 CEST53598238.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:22.215950966 CEST5982453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:22.235313892 CEST53598248.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:22.235685110 CEST5982553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:22.255491972 CEST53598258.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:23.593552113 CEST6482353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:24.179404020 CEST53648238.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:24.188785076 CEST5199353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:24.206090927 CEST53519938.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:24.206868887 CEST5199453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:24.226692915 CEST53519948.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:24.227190971 CEST5199553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:24.245124102 CEST53519958.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:24.245595932 CEST5199653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:24.265338898 CEST53519968.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:24.265731096 CEST5199753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:24.285284042 CEST53519978.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:25.542416096 CEST5811953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:26.630718946 CEST5811953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:27.165951967 CEST53581198.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:27.172085047 CEST5812053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:27.189124107 CEST53581208.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:27.189977884 CEST5812153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:27.209870100 CEST53581218.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:27.247838974 CEST5812253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:27.267399073 CEST53581228.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:27.268862963 CEST5812353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:27.286777020 CEST53581238.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:27.287358046 CEST5812453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:27.307277918 CEST53581248.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:27.705112934 CEST53581198.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:28.925348043 CEST4916653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.260584116 CEST4916653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.836324930 CEST53491668.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:30.844980955 CEST4916753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.862699986 CEST53491678.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:30.866137028 CEST4916853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.884212971 CEST53491688.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:30.884764910 CEST4916953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.904670000 CEST53491698.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:30.905071974 CEST4917053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.922668934 CEST53491708.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:30.923072100 CEST4917153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:30.942532063 CEST53491718.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.146146059 CEST53491668.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.225573063 CEST5830153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:32.299428940 CEST53583018.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.305984020 CEST5830253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:32.323093891 CEST53583028.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.323930025 CEST5830353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:32.343451023 CEST53583038.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.344903946 CEST5830453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:32.364872932 CEST53583048.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.365597963 CEST5830553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:32.385454893 CEST53583058.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:32.396919012 CEST5830653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:32.415087938 CEST53583068.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:33.635987043 CEST6344653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:34.632500887 CEST6344653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:35.644903898 CEST6344653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:36.530746937 CEST53634468.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:36.543714046 CEST6344753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:36.563038111 CEST53634478.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:36.563648939 CEST6344853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:36.583677053 CEST53634488.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:36.584182024 CEST6344953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:36.602057934 CEST53634498.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:36.602427959 CEST6345053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:36.620131016 CEST53634508.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:36.620733023 CEST6345153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:36.640644073 CEST53634518.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:36.792453051 CEST53634468.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:37.851984024 CEST4987453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:38.863599062 CEST4987453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:39.088445902 CEST53634468.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.439719915 CEST53498748.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.448174953 CEST4987553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:39.465456009 CEST53498758.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.465929985 CEST4987653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:39.483722925 CEST53498768.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.484544992 CEST4987753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:39.503002882 CEST53498778.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.503390074 CEST4987853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:39.521054029 CEST53498788.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.521467924 CEST4987953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:39.540900946 CEST53498798.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:39.567404985 CEST53498748.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:40.790900946 CEST6538553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:40.827275038 CEST53653858.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:40.836529016 CEST6538653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:40.853662968 CEST53653868.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:40.854235888 CEST6538753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:40.873889923 CEST53653878.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:40.874320984 CEST6538853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:40.891818047 CEST53653888.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:40.892307043 CEST6538953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:40.909749031 CEST53653898.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:40.910653114 CEST6539053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:40.930310965 CEST53653908.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:42.179858923 CEST5415353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:42.224383116 CEST53541538.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:42.235496044 CEST5415453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:42.254621983 CEST53541548.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:42.262891054 CEST5415553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:42.280628920 CEST53541558.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:42.281209946 CEST5415653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:42.301055908 CEST53541568.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:42.301537037 CEST5415753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:42.321456909 CEST53541578.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:42.322125912 CEST5415853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:42.341794014 CEST53541588.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:43.590250015 CEST6460253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:44.583146095 CEST6460253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.599035978 CEST6460253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.634243011 CEST53646028.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:45.651026011 CEST6460353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.670564890 CEST53646038.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:45.671057940 CEST6460453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.691019058 CEST53646048.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:45.691448927 CEST6460553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.711270094 CEST53646058.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:45.711695910 CEST6460653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.729429960 CEST53646068.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:45.737027884 CEST6460753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:45.756819010 CEST53646078.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:45.793020010 CEST53646028.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:46.698057890 CEST53646028.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:47.058562040 CEST5078453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.075234890 CEST5078453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.139800072 CEST53507848.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:48.150029898 CEST5078553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.167660952 CEST53507858.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:48.168544054 CEST5078653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.188586950 CEST53507868.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:48.189199924 CEST5078753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.209095001 CEST53507878.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:48.220005989 CEST5078853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.238341093 CEST53507888.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:48.239259958 CEST5078953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:48.259392023 CEST53507898.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:48.697335958 CEST53507848.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:49.506455898 CEST6412153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.521322966 CEST6412153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.544496059 CEST53641218.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:50.556144953 CEST6412253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.575448990 CEST53641228.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:50.576560974 CEST6412353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.592947006 CEST53641218.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:50.596391916 CEST53641238.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:50.605078936 CEST6412453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.624696016 CEST53641248.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:50.625201941 CEST6412553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.648333073 CEST53641258.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:50.649034023 CEST6412653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:50.668668032 CEST53641268.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:51.926340103 CEST6496753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:51.954930067 CEST53649678.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:51.969147921 CEST6496853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:51.988468885 CEST53649688.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:51.989362001 CEST6496953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:52.008342981 CEST53649698.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:52.023263931 CEST6497053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:52.042766094 CEST53649708.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:52.043279886 CEST6497153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:52.062791109 CEST53649718.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:52.063211918 CEST6497253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:52.083273888 CEST53649728.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:53.315284014 CEST6082553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:53.888886929 CEST53608258.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:53.910933018 CEST6082653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:53.930005074 CEST53608268.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:53.930680037 CEST6082753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:53.951704979 CEST53608278.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:53.952245951 CEST6082853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:53.972112894 CEST53608288.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:53.975918055 CEST6082953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:53.996426105 CEST53608298.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:53.997132063 CEST6083053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:54.017124891 CEST53608308.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:55.249011993 CEST4920153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.259572983 CEST4920153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.294773102 CEST53492018.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:56.303123951 CEST4920253192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.322354078 CEST53492028.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:56.322889090 CEST4920353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.342601061 CEST53492038.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:56.342972994 CEST4920453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.360450983 CEST53492048.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:56.360950947 CEST4920553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.380527020 CEST53492058.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:56.381031036 CEST4920653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:56.400538921 CEST53492068.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:56.951119900 CEST53492018.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:57.561789036 CEST6493653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:57.635045052 CEST53649368.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:57.647419930 CEST6493753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:57.666646004 CEST53649378.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:57.667177916 CEST6493853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:57.687072039 CEST53649388.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:57.687539101 CEST6493953192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:57.705380917 CEST53649398.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:57.705862045 CEST6494053192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:57.725605011 CEST53649408.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:57.726016045 CEST6494153192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:57.745647907 CEST53649418.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:58.812098026 CEST6047353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.818274021 CEST6047353192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.852207899 CEST53604738.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:59.859764099 CEST6047453192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.877156019 CEST53604748.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:59.877731085 CEST6047553192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.898338079 CEST53604758.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:59.898864031 CEST6047653192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.918551922 CEST53604768.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:59.919053078 CEST6047753192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.938997030 CEST53604778.8.8.8192.168.2.3
                                      Aug 31, 2022 23:59:59.939438105 CEST6047853192.168.2.38.8.8.8
                                      Aug 31, 2022 23:59:59.959988117 CEST53604788.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:01.037652969 CEST5937453192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.037312031 CEST5937453192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.071805954 CEST53593748.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:02.080656052 CEST5661753192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.100327969 CEST53566178.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:02.100950956 CEST5661853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.120507956 CEST53566188.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:02.120944977 CEST5661953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.141537905 CEST53566198.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:02.142087936 CEST5662053192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.160455942 CEST53566208.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:02.160962105 CEST5662153192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:02.179536104 CEST53566218.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:02.700483084 CEST53593748.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.267693043 CEST6118453192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:03.343596935 CEST53611848.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.353477001 CEST6118553192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:03.370637894 CEST53611858.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.371157885 CEST6118653192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:03.390731096 CEST53611868.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.391253948 CEST6118753192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:03.410953045 CEST53611878.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.411292076 CEST6118853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:03.430705070 CEST53611888.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.431119919 CEST6118953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:03.450587988 CEST53611898.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:03.829907894 CEST53604738.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:04.517784119 CEST5738753192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:05.091319084 CEST53573878.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:05.099412918 CEST5738853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:05.118396044 CEST53573888.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:05.118977070 CEST5738953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:05.138398886 CEST53573898.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:05.138813972 CEST5739053192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:05.158288956 CEST53573908.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:05.158775091 CEST5739153192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:05.176443100 CEST53573918.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:05.176877975 CEST5739253192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:05.194662094 CEST53573928.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:06.266103029 CEST5022853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.256401062 CEST5022853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.399528980 CEST53502288.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:07.412708044 CEST5022953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.432984114 CEST53502298.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:07.433896065 CEST5023053192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.454828024 CEST53502308.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:07.455720901 CEST5023153192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.479063988 CEST53502318.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:07.481525898 CEST5023253192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.501718998 CEST53502328.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:07.502496004 CEST5023353192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:07.524806976 CEST53502338.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:07.918035030 CEST53502288.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:08.675157070 CEST5326953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.687948942 CEST5326953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.840522051 CEST53532698.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:09.849908113 CEST5327053192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.867008924 CEST53532708.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:09.867791891 CEST5327153192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.887459040 CEST53532718.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:09.889720917 CEST5982853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.910227060 CEST53598288.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:09.911396027 CEST5982953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.933176994 CEST53598298.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:09.936009884 CEST5983053192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:09.956068039 CEST53598308.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.257081985 CEST5110553192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:11.285418034 CEST53511058.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.291388988 CEST5245653192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:11.304387093 CEST53532698.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.310426950 CEST53524568.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.310934067 CEST5245753192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:11.330421925 CEST53524578.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.330852985 CEST5245853192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:11.350558043 CEST53524588.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.350931883 CEST5245953192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:11.370852947 CEST53524598.8.8.8192.168.2.3
                                      Sep 1, 2022 00:00:11.371195078 CEST5246053192.168.2.38.8.8.8
                                      Sep 1, 2022 00:00:11.388839006 CEST53524608.8.8.8192.168.2.3
                                      TimestampSource IPDest IPChecksumCodeType
                                      Aug 31, 2022 23:58:18.899866104 CEST192.168.2.38.8.8.8cff3(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:58:21.675904036 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:58:28.756336927 CEST192.168.2.38.8.8.8cff3(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:58:40.380204916 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:58:43.196728945 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:18.697181940 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:20.757663965 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:27.705205917 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:32.146743059 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:36.792562962 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:39.088548899 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:45.793106079 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:46.698131084 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:48.699120045 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:50.593031883 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Aug 31, 2022 23:59:56.952230930 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Sep 1, 2022 00:00:02.702019930 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Sep 1, 2022 00:00:03.830478907 CEST192.168.2.38.8.8.8cff3(Port unreachable)Destination Unreachable
                                      Sep 1, 2022 00:00:07.922203064 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      Sep 1, 2022 00:00:11.304521084 CEST192.168.2.38.8.8.8d030(Port unreachable)Destination Unreachable
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                      Aug 31, 2022 23:58:02.760505915 CEST192.168.2.38.8.8.80xfb1fStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.036793947 CEST192.168.2.38.8.8.80x837dStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.671662092 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:04.692158937 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.718662977 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:04.739443064 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.757896900 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:07.165702105 CEST192.168.2.38.8.8.80xc956Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:07.294450998 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:07.312591076 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:07.331283092 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:07.365561008 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:07.384051085 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:13.881591082 CEST192.168.2.38.8.8.80x17Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:14.902959108 CEST192.168.2.38.8.8.80x17Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:14.982489109 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:15.004693985 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:15.025135994 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:15.043750048 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:15.064662933 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:17.123805046 CEST192.168.2.38.8.8.80xbb4fStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.161257982 CEST192.168.2.38.8.8.80xbb4fStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.284126997 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:18.304316998 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.324816942 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:18.345424891 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.371185064 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:20.518393040 CEST192.168.2.38.8.8.80xccdbStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.514583111 CEST192.168.2.38.8.8.80xccdbStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.674954891 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:21.699516058 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.721379995 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:21.744663000 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.768917084 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:23.738740921 CEST192.168.2.38.8.8.80xea6eStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.732259989 CEST192.168.2.38.8.8.80xea6eStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.850137949 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:24.884406090 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.905091047 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:24.925441980 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.944174051 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:27.219465017 CEST192.168.2.38.8.8.80xa774Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:27.292717934 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:27.316054106 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:27.336745024 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:27.361900091 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:27.382469893 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:32.660929918 CEST192.168.2.38.8.8.80xaf62Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.320008993 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:33.338202000 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.358758926 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:33.379307032 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.402808905 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:35.661753893 CEST192.168.2.38.8.8.80xd7cbStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:36.532491922 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:36.550637007 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:36.580327988 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:36.600605965 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:36.619046926 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:38.594002962 CEST192.168.2.38.8.8.80x3115Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.608630896 CEST192.168.2.38.8.8.80x3115Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.711462975 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:39.736547947 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.762542009 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:39.799617052 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.827074051 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:41.899421930 CEST192.168.2.38.8.8.80x4b60Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:42.906723976 CEST192.168.2.38.8.8.80x4b60Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:42.963799000 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:42.984219074 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:43.003278017 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:43.024086952 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:43.044194937 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:45.860322952 CEST192.168.2.38.8.8.80xc71cStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.506845951 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:46.526858091 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.555077076 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:46.573612928 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.594398022 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:52.439661980 CEST192.168.2.38.8.8.80x4a62Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:52.509126902 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:52.529035091 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:52.552397013 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:52.570688963 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:52.590786934 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:54.559582949 CEST192.168.2.38.8.8.80xcea6Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:54.611123085 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:54.630989075 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:54.651252031 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:54.669703007 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:54.690068007 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:56.637871027 CEST192.168.2.38.8.8.80x98daStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:56.711035013 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:56.731127977 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:56.749512911 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:56.772804976 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:56.793273926 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:58:59.232460976 CEST192.168.2.38.8.8.80xbf18Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:59.292783976 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:59.312763929 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:59.338818073 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:58:59.357353926 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:59.376303911 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:01.363595963 CEST192.168.2.38.8.8.80x33a6Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:01.436424971 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:01.454658031 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:01.474961042 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:01.493232965 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:01.511754036 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:03.366775036 CEST192.168.2.38.8.8.80x4894Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:03.423759937 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:03.441447020 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:03.462712049 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:03.482703924 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:03.503720045 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:05.917948008 CEST192.168.2.38.8.8.80x428cStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:06.518330097 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:06.541033030 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:06.561108112 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:06.582118988 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:06.600199938 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:11.520944118 CEST192.168.2.38.8.8.80xf42eStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:12.277647972 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:12.297575951 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:12.328339100 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:12.348893881 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:12.369224072 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:14.234563112 CEST192.168.2.38.8.8.80x4340Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:14.331684113 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:14.353291035 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:14.371988058 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:14.392903090 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:14.413882971 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:15.707844973 CEST192.168.2.38.8.8.80xca4bStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:15.767276049 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:15.789041996 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:15.809427023 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:15.838541031 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:15.856786013 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:17.091232061 CEST192.168.2.38.8.8.80x160bStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.080478907 CEST192.168.2.38.8.8.80x160bStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.249520063 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:18.269253969 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.287184954 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:18.305428028 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.325584888 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:19.656590939 CEST192.168.2.38.8.8.80x9891Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.653614998 CEST192.168.2.38.8.8.80x9891Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.699863911 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:20.720499992 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.740564108 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:20.761806011 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.780160904 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:22.015532970 CEST192.168.2.38.8.8.80xc448Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:22.154289007 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:22.173866034 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:22.195880890 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:22.215950966 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:22.235685110 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:23.593552113 CEST192.168.2.38.8.8.80x9641Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:24.188785076 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:24.206868887 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:24.227190971 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:24.245595932 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:24.265731096 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:25.542416096 CEST192.168.2.38.8.8.80x72c8Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:26.630718946 CEST192.168.2.38.8.8.80x72c8Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:27.172085047 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:27.189977884 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:27.247838974 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:27.268862963 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:27.287358046 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:28.925348043 CEST192.168.2.38.8.8.80xbe66Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.260584116 CEST192.168.2.38.8.8.80xbe66Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.844980955 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:30.866137028 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.884764910 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:30.905071974 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.923072100 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:32.225573063 CEST192.168.2.38.8.8.80xc8b1Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.305984020 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:32.323930025 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.344903946 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:32.365597963 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.396919012 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:33.635987043 CEST192.168.2.38.8.8.80x6b6bStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:34.632500887 CEST192.168.2.38.8.8.80x6b6bStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:35.644903898 CEST192.168.2.38.8.8.80x6b6bStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:36.543714046 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:36.563648939 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:36.584182024 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:36.602427959 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:36.620733023 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:37.851984024 CEST192.168.2.38.8.8.80xbe0fStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:38.863599062 CEST192.168.2.38.8.8.80xbe0fStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.448174953 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:39.465929985 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.484544992 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:39.503390074 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.521467924 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:40.790900946 CEST192.168.2.38.8.8.80x3976Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.836529016 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:40.854235888 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.874320984 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:40.892307043 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.910653114 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:42.179858923 CEST192.168.2.38.8.8.80x94a7Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:42.235496044 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:42.262891054 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:42.281209946 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:42.301537037 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:42.322125912 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:43.590250015 CEST192.168.2.38.8.8.80x70aeStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:44.583146095 CEST192.168.2.38.8.8.80x70aeStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.599035978 CEST192.168.2.38.8.8.80x70aeStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.651026011 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:45.671057940 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.691448927 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:45.711695910 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.737027884 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:47.058562040 CEST192.168.2.38.8.8.80xed4Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.075234890 CEST192.168.2.38.8.8.80xed4Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.150029898 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:48.168544054 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.189199924 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:48.220005989 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.239259958 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:49.506455898 CEST192.168.2.38.8.8.80xae84Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.521322966 CEST192.168.2.38.8.8.80xae84Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.556144953 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:50.576560974 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.605078936 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:50.625201941 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.649034023 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:51.926340103 CEST192.168.2.38.8.8.80x4be7Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:51.969147921 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:51.989362001 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:52.023263931 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:52.043279886 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:52.063211918 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:53.315284014 CEST192.168.2.38.8.8.80x8b86Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:53.910933018 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:53.930680037 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:53.952245951 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:53.975918055 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:53.997132063 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:55.249011993 CEST192.168.2.38.8.8.80x1e6dStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.259572983 CEST192.168.2.38.8.8.80x1e6dStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.303123951 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:56.322889090 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.342972994 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:56.360950947 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.381031036 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:57.561789036 CEST192.168.2.38.8.8.80x2252Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.647419930 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:57.667177916 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.687539101 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:57.705862045 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.726016045 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Aug 31, 2022 23:59:58.812098026 CEST192.168.2.38.8.8.80x82c8Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.818274021 CEST192.168.2.38.8.8.80x82c8Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.859764099 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:59.877731085 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.898864031 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Aug 31, 2022 23:59:59.919053078 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.939438105 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:01.037652969 CEST192.168.2.38.8.8.80xb09Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.037312031 CEST192.168.2.38.8.8.80xb09Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.080656052 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:02.100950956 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.120944977 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:02.142087936 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.160962105 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:03.267693043 CEST192.168.2.38.8.8.80xa990Standard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.353477001 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:03.371157885 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.391253948 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Sep 1, 2022 00:00:03.411292076 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.431119919 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Sep 1, 2022 00:00:04.517784119 CEST192.168.2.38.8.8.80x31aStandard query (0)dns1.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.099412918 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:05.118977070 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.138813972 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:05.158775091 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.176877975 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:06.266103029 CEST192.168.2.38.8.8.80xd96aStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.256401062 CEST192.168.2.38.8.8.80xd96aStandard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.412708044 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:07.433896065 CEST192.168.2.38.8.8.80x2Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.455720901 CEST192.168.2.38.8.8.80x3Standard query (0)gandcrab.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:07.481525898 CEST192.168.2.38.8.8.80x4Standard query (0)gandcrab.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.502496004 CEST192.168.2.38.8.8.80x5Standard query (0)gandcrab.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:08.675157070 CEST192.168.2.38.8.8.80xa920Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.687948942 CEST192.168.2.38.8.8.80xa920Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.849908113 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:09.867791891 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.889720917 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Sep 1, 2022 00:00:09.911396027 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.coinA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.936009884 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.coin28IN (0x0001)
                                      Sep 1, 2022 00:00:11.257081985 CEST192.168.2.38.8.8.80xa868Standard query (0)dns2.soprodns.ruA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.291388988 CEST192.168.2.38.8.8.80x1Standard query (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:11.310934067 CEST192.168.2.38.8.8.80x2Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.330852985 CEST192.168.2.38.8.8.80x3Standard query (0)nomoreransom.bit28IN (0x0001)
                                      Sep 1, 2022 00:00:11.350931883 CEST192.168.2.38.8.8.80x4Standard query (0)nomoreransom.bitA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.371195078 CEST192.168.2.38.8.8.80x5Standard query (0)nomoreransom.bit28IN (0x0001)
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                      Aug 31, 2022 23:58:04.649065018 CEST8.8.8.8192.168.2.30x837dName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.690844059 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:04.712151051 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.738368988 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:04.757306099 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:04.775638103 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:07.250682116 CEST8.8.8.8192.168.2.30xc956Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:07.311570883 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:07.330202103 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:07.351011992 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:07.383272886 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:07.404005051 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:14.937246084 CEST8.8.8.8192.168.2.30x17Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:15.000052929 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:15.024588108 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:15.043148041 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:15.064032078 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:15.082518101 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:18.234639883 CEST8.8.8.8192.168.2.30xbb4fName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.235239029 CEST8.8.8.8192.168.2.30xbb4fName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.303237915 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:18.324134111 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.344474077 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:18.363096952 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:18.391031981 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:18.899728060 CEST8.8.8.8192.168.2.30x17Server failure (2)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.646465063 CEST8.8.8.8192.168.2.30xccdbName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.675831079 CEST8.8.8.8192.168.2.30xccdbName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.698769093 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:21.720890999 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.744118929 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:21.768213034 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:21.789768934 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:24.804043055 CEST8.8.8.8192.168.2.30xea6eName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.869385004 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:24.904200077 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.924804926 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:24.943135023 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:24.964257956 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:27.255918026 CEST8.8.8.8192.168.2.30xa774Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:27.311678886 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:27.336108923 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:27.355282068 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:27.381726027 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:27.402415991 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:28.756191015 CEST8.8.8.8192.168.2.30xea6eServer failure (2)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.272780895 CEST8.8.8.8192.168.2.30xaf62Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.337179899 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:33.357716084 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.378457069 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:33.398911953 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:33.424699068 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:36.474462986 CEST8.8.8.8192.168.2.30xd7cbName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:36.549562931 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:36.570236921 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:36.600003004 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:36.618398905 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:36.638629913 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:39.644859076 CEST8.8.8.8192.168.2.30x3115Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.735524893 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:39.759757996 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.798645973 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:39.823673964 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:39.854238987 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:40.380073071 CEST8.8.8.8192.168.2.30x3115Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:42.943233967 CEST8.8.8.8192.168.2.30x4b60Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:42.983344078 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:43.002011061 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:43.023278952 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:43.043633938 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:43.062766075 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:43.196578026 CEST8.8.8.8192.168.2.30x4b60Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.470341921 CEST8.8.8.8192.168.2.30xc71cName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.525938988 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:46.544490099 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.573009968 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:46.593744993 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:46.614161015 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:52.489172935 CEST8.8.8.8192.168.2.30x4a62Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:52.528167963 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:52.548969030 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:52.570151091 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:52.590229988 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:52.608671904 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:54.588342905 CEST8.8.8.8192.168.2.30xcea6Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:54.628262997 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:54.650563002 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:54.668998957 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:54.689425945 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:54.709500074 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:56.674391985 CEST8.8.8.8192.168.2.30x98daName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:56.730349064 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:56.748970032 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:56.769344091 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:56.792510033 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:56.812910080 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:59.266350985 CEST8.8.8.8192.168.2.30xbf18Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:59.311882973 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:58:59.332475901 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:59.356389046 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:58:59.374880075 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:58:59.394289017 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:01.399610996 CEST8.8.8.8192.168.2.30x33a6Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:01.453686953 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:01.474419117 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:01.492651939 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:01.511037111 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:01.529551029 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:03.405114889 CEST8.8.8.8192.168.2.30x4894Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:03.440768003 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:03.461023092 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:03.482172012 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:03.502460003 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:03.521188974 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:06.501457930 CEST8.8.8.8192.168.2.30x428cName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:06.537347078 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:06.560595989 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:06.581572056 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:06.599746943 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:06.617580891 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:12.252245903 CEST8.8.8.8192.168.2.30xf42eName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:12.296758890 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:12.317811966 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:12.348246098 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:12.368700981 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:12.389571905 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:14.311661005 CEST8.8.8.8192.168.2.30x4340Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:14.352329969 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:14.371464014 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:14.392226934 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:14.412553072 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:14.435400963 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:15.756638050 CEST8.8.8.8192.168.2.30xca4bName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:15.786377907 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:15.808978081 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:15.827245951 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:15.856257915 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:15.874497890 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:18.240111113 CEST8.8.8.8192.168.2.30x160bName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.268676043 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:18.286752939 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.304971933 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:18.325037003 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:18.345073938 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:18.697067022 CEST8.8.8.8192.168.2.30x160bName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.690124035 CEST8.8.8.8192.168.2.30x9891Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.719475031 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:20.740108013 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.757486105 CEST8.8.8.8192.168.2.30x9891Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.760489941 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:20.779664040 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:20.799532890 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:22.145498037 CEST8.8.8.8192.168.2.30xc448Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:22.173274994 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:22.191287994 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:22.215575933 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:22.235313892 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:22.255491972 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:24.179404020 CEST8.8.8.8192.168.2.30x9641Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:24.206090927 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:24.226692915 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:24.245124102 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:24.265338898 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:24.285284042 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:27.165951967 CEST8.8.8.8192.168.2.30x72c8Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:27.189124107 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:27.209870100 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:27.267399073 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:27.286777020 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:27.307277918 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:27.705112934 CEST8.8.8.8192.168.2.30x72c8Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.836324930 CEST8.8.8.8192.168.2.30xbe66Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.862699986 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:30.884212971 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.904670000 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:30.922668934 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:30.942532063 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:32.146146059 CEST8.8.8.8192.168.2.30xbe66Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.299428940 CEST8.8.8.8192.168.2.30xc8b1Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.323093891 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:32.343451023 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.364872932 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:32.385454893 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:32.415087938 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:36.530746937 CEST8.8.8.8192.168.2.30x6b6bName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:36.563038111 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:36.583677053 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:36.602057934 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:36.620131016 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:36.640644073 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:36.792453051 CEST8.8.8.8192.168.2.30x6b6bName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.088445902 CEST8.8.8.8192.168.2.30x6b6bName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.439719915 CEST8.8.8.8192.168.2.30xbe0fName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.465456009 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:39.483722925 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.503002882 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:39.521054029 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:39.540900946 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:39.567404985 CEST8.8.8.8192.168.2.30xbe0fName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.827275038 CEST8.8.8.8192.168.2.30x3976Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.853662968 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:40.873889923 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.891818047 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:40.909749031 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:40.930310965 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:42.224383116 CEST8.8.8.8192.168.2.30x94a7Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:42.254621983 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:42.280628920 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:42.301055908 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:42.321456909 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:42.341794014 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:45.634243011 CEST8.8.8.8192.168.2.30x70aeName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.670564890 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:45.691019058 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.711270094 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:45.729429960 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:45.756819010 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:45.793020010 CEST8.8.8.8192.168.2.30x70aeName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:46.698057890 CEST8.8.8.8192.168.2.30x70aeName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.139800072 CEST8.8.8.8192.168.2.30xed4Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.167660952 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:48.188586950 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.209095001 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:48.238341093 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:48.259392023 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:48.697335958 CEST8.8.8.8192.168.2.30xed4Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.544496059 CEST8.8.8.8192.168.2.30xae84Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.575448990 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:50.592947006 CEST8.8.8.8192.168.2.30xae84Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.596391916 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.624696016 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:50.648333073 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:50.668668032 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:51.954930067 CEST8.8.8.8192.168.2.30x4be7Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:51.988468885 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:52.008342981 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:52.042766094 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:52.062791109 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:52.083273888 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:53.888886929 CEST8.8.8.8192.168.2.30x8b86Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:53.930005074 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:53.951704979 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:53.972112894 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:53.996426105 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:54.017124891 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:56.294773102 CEST8.8.8.8192.168.2.30x1e6dName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.322354078 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:56.342601061 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.360450983 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:56.380527020 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:56.400538921 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:56.951119900 CEST8.8.8.8192.168.2.30x1e6dName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.635045052 CEST8.8.8.8192.168.2.30x2252Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.666646004 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:57.687072039 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.705380917 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:57.725605011 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:57.745647907 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:59.852207899 CEST8.8.8.8192.168.2.30x82c8Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.877156019 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Aug 31, 2022 23:59:59.898338079 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.918551922 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Aug 31, 2022 23:59:59.938997030 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Aug 31, 2022 23:59:59.959988117 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:02.071805954 CEST8.8.8.8192.168.2.30xb09Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.100327969 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:02.120507956 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.141537905 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:02.160455942 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:02.179536104 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:02.700483084 CEST8.8.8.8192.168.2.30xb09Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.343596935 CEST8.8.8.8192.168.2.30xa990Name error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.370637894 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:03.390731096 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.410953045 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:03.430705070 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:03.450587988 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:03.829907894 CEST8.8.8.8192.168.2.30x82c8Server failure (2)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.091319084 CEST8.8.8.8192.168.2.30x31aName error (3)dns1.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.118396044 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:05.138398886 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.158288956 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:05.176443100 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:05.194662094 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:07.399528980 CEST8.8.8.8192.168.2.30xd96aName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.432984114 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:07.454828024 CEST8.8.8.8192.168.2.30x2Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.479063988 CEST8.8.8.8192.168.2.30x3Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:07.501718998 CEST8.8.8.8192.168.2.30x4Name error (3)gandcrab.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:07.524806976 CEST8.8.8.8192.168.2.30x5Name error (3)gandcrab.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:07.918035030 CEST8.8.8.8192.168.2.30xd96aName error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.840522051 CEST8.8.8.8192.168.2.30xa920Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.867008924 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:09.887459040 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.910227060 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:09.933176994 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.coinnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:09.956068039 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.coinnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:11.285418034 CEST8.8.8.8192.168.2.30xa868Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.304387093 CEST8.8.8.8192.168.2.30xa920Name error (3)dns2.soprodns.runonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.310426950 CEST8.8.8.8192.168.2.30x1No error (0)8.8.8.8.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                      Sep 1, 2022 00:00:11.330421925 CEST8.8.8.8192.168.2.30x2Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.350558043 CEST8.8.8.8192.168.2.30x3Name error (3)nomoreransom.bitnonenone28IN (0x0001)
                                      Sep 1, 2022 00:00:11.370852947 CEST8.8.8.8192.168.2.30x4Name error (3)nomoreransom.bitnonenoneA (IP address)IN (0x0001)
                                      Sep 1, 2022 00:00:11.388839006 CEST8.8.8.8192.168.2.30x5Name error (3)nomoreransom.bitnonenone28IN (0x0001)

                                      Click to jump to process

                                      Target ID:1
                                      Start time:23:57:53
                                      Start date:31/08/2022
                                      Path:C:\Users\user\Desktop\gI5xZdIxUs.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\gI5xZdIxUs.exe"
                                      Imagebase:0xfc60000
                                      File size:101710 bytes
                                      MD5 hash:98A12EC721C098842FBFD7384D5A72AE
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000000.272296797.000000000FC6A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.537541962.000000000FC6A000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000001.00000002.537565986.000000000FC72000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000001.00000000.272303387.000000000FC72000.00000008.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:5
                                      Start time:23:58:02
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Target ID:7
                                      Start time:23:58:03
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:11
                                      Start time:23:58:05
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Target ID:13
                                      Start time:23:58:06
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:14
                                      Start time:23:58:08
                                      Start date:31/08/2022
                                      Path:C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
                                      Imagebase:0xf9d0000
                                      File size:101710 bytes
                                      MD5 hash:F4758788F11A0DE8D11EB4B8C515FFBD
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000E.00000002.315651936.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000E.00000000.307654244.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000E.00000000.307645700.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000E.00000002.315662109.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Florian Roth
                                      • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Florian Roth
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Joe Security
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: Joe Security
                                      • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: ditekSHen
                                      • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe, Author: kevoreilly
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      Reputation:low

                                      Target ID:15
                                      Start time:23:58:08
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Target ID:16
                                      Start time:23:58:13
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:17
                                      Start time:23:58:16
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate

                                      Target ID:18
                                      Start time:23:58:16
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      Target ID:20
                                      Start time:23:58:17
                                      Start date:31/08/2022
                                      Path:C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\Microsoft\isqmkp.exe"
                                      Imagebase:0xf9d0000
                                      File size:101710 bytes
                                      MD5 hash:F4758788F11A0DE8D11EB4B8C515FFBD
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000014.00000000.322631215.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000014.00000002.325486891.000000000F9DA000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000014.00000002.325494839.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000014.00000000.322638424.000000000F9E2000.00000008.00000001.01000000.00000005.sdmp, Author: Joe Security

                                      Target ID:21
                                      Start time:23:58:19
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:22
                                      Start time:23:58:19
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:23
                                      Start time:23:58:22
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:24
                                      Start time:23:58:23
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff68f300000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:25
                                      Start time:23:58:25
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:26
                                      Start time:23:58:26
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:27
                                      Start time:23:58:28
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                      Imagebase:0x7ff651c80000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:28
                                      Start time:23:58:31
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:30
                                      Start time:23:58:34
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:31
                                      Start time:23:58:34
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:33
                                      Start time:23:58:37
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:34
                                      Start time:23:58:37
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:36
                                      Start time:23:58:40
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:37
                                      Start time:23:58:41
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:39
                                      Start time:23:58:44
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:40
                                      Start time:23:58:45
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:41
                                      Start time:23:58:48
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:42
                                      Start time:23:58:49
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:43
                                      Start time:23:58:53
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:44
                                      Start time:23:58:53
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:45
                                      Start time:23:58:55
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:46
                                      Start time:23:58:56
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:47
                                      Start time:23:58:57
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:48
                                      Start time:23:58:58
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:49
                                      Start time:23:59:00
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:50
                                      Start time:23:59:00
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:51
                                      Start time:23:59:02
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:52
                                      Start time:23:59:02
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:53
                                      Start time:23:59:04
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.coin dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:55
                                      Start time:23:59:04
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:58
                                      Start time:23:59:07
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup nomoreransom.bit dns1.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:59
                                      Start time:23:59:08
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:60
                                      Start time:23:59:13
                                      Start date:31/08/2022
                                      Path:C:\Windows\SysWOW64\nslookup.exe
                                      Wow64 process (32bit):true
                                      Commandline:nslookup gandcrab.bit dns2.soprodns.ru
                                      Imagebase:0x140000
                                      File size:78336 bytes
                                      MD5 hash:8E82529D1475D67615ADCB4E1B8F4EEC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      Target ID:61
                                      Start time:23:59:13
                                      Start date:31/08/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff745070000
                                      File size:625664 bytes
                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language

                                      No disassembly