Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A648A0 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW, |
0_2_00A648A0 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A67DB0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree, |
0_2_00A67DB0 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A65D80 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW, |
0_2_00A65D80 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A67C60 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree, |
0_2_00A67C60 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A65750 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree, |
0_2_00A65750 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A66000 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection, |
0_2_00A66000 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A65540 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree, |
0_2_00A65540 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Code function: 0_2_00A65050 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,MultiByteToWideChar,GetLastError,VirtualAlloc,VirtualFree,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError, |
0_2_00A65050 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C748A0 Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW, |
13_2_00C748A0 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C75D80 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW, |
13_2_00C75D80 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C77DB0 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree, |
13_2_00C77DB0 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C75540 VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenW,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree, |
13_2_00C75540 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C75750 VirtualAlloc,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,lstrlenW,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,_memset,lstrlenA,lstrlenA,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree, |
13_2_00C75750 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C75050 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,_memset,lstrlenA,lstrlenA,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,MultiByteToWideChar,GetLastError,VirtualAlloc,VirtualFree,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError, |
13_2_00C75050 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C77C60 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree, |
13_2_00C77C60 |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe |
Code function: 13_2_00C76000 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection, |
13_2_00C76000 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49726 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49727 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49728 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49729 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:61454 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:61455 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:61456 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:61457 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:65325 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:65326 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:65327 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:65328 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:51486 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:51487 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:51488 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:51489 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:63448 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:63449 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:63450 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:63451 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56753 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56754 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56755 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56756 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60977 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60978 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60979 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60980 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59222 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59223 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59224 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59225 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55070 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55071 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55072 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55073 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:56684 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:56685 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:56686 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:56687 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58534 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58535 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58536 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58537 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62661 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62662 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62663 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62664 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58583 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58584 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58585 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58586 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65515 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65516 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65517 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65518 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56689 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56690 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56691 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56692 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61346 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61347 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61348 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61349 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:53974 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:53975 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:53976 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:53977 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64934 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64935 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64936 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64937 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58474 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58475 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58476 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58477 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:60179 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:60180 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:60181 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:60182 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60286 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60287 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60288 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60289 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60021 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60022 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60023 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60024 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50904 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50905 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50906 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50907 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53825 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53826 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53827 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53828 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49771 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49772 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49773 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:49774 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49581 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49582 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49583 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49584 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53557 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53558 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53559 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53560 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61295 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61296 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61297 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61298 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50088 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50089 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50090 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50091 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52190 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52191 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52192 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52193 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:54587 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:54588 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:54589 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:54590 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52102 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52103 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52104 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52105 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60910 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60911 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60912 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60913 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58625 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58626 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58627 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58628 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65495 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65496 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65497 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:65498 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:57484 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:57485 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:57486 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:57487 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:52098 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:52099 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:52100 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:52101 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:62059 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:62060 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:62061 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:62062 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60296 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60297 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60298 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:60299 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:63730 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:63731 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:63732 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:63733 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50079 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50080 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50081 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50082 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:49961 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:49962 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:49963 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:49964 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:55611 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:55612 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:55613 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:55614 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58874 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58875 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58876 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:58877 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52894 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52895 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52896 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:52897 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65332 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65333 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65334 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65335 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52975 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52976 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52977 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:52978 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62936 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62937 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62938 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:62939 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58443 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58444 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58445 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:58446 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:55728 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:55729 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:55730 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:55731 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53429 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53430 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53431 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:53432 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60181 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60182 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60183 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:60184 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:57379 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:57380 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:57381 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:57382 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:63940 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:63941 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:63942 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:63943 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:50446 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:50447 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:50448 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:50449 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59807 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:51724 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:51725 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:51726 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64496 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64497 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64498 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:64499 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:64312 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:64313 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:64314 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:64315 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49263 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49264 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49265 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:49266 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:54369 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:54370 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:54371 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:54372 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:59585 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:59586 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:59587 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:59588 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50564 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50565 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50566 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:50567 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56116 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56117 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56118 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:56119 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61018 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61019 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61020 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:61021 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59298 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59299 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59300 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829500 ETPRO TROJAN GandCrab DNS Lookup 3 192.168.2.5:59301 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55594 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55595 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55596 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2026737 ET TROJAN Observed GandCrab Domain (gandcrab .bit) 192.168.2.5:55597 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65117 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65118 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65119 -> 8.8.8.8:53 |
Source: Traffic |
Snort IDS: 2829498 ETPRO TROJAN GandCrab DNS Lookup 1 192.168.2.5:65120 -> 8.8.8.8:53 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: 2fiDcmkaZY.exe, type: SAMPLE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 2fiDcmkaZY.exe, type: SAMPLE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: 13.0.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 13.0.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: 20.0.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 0.0.2fiDcmkaZY.exe.a60000.0.unpack, type: UNPACKEDPE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 20.0.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: 0.0.2fiDcmkaZY.exe.a60000.0.unpack, type: UNPACKEDPE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: 20.2.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 20.2.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: 13.2.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 13.2.tdicrr.exe.c70000.0.unpack, type: UNPACKEDPE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: 0.2.2fiDcmkaZY.exe.a60000.0.unpack, type: UNPACKEDPE |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: 0.2.2fiDcmkaZY.exe.a60000.0.unpack, type: UNPACKEDPE |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe, type: DROPPED |
Matched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/ |
Source: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe, type: DROPPED |
Matched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload |
Source: unknown |
Process created: C:\Users\user\Desktop\2fiDcmkaZY.exe "C:\Users\user\Desktop\2fiDcmkaZY.exe" |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: unknown |
Process created: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe "C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe" |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: unknown |
Process created: C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe "C:\Users\user\AppData\Roaming\Microsoft\tdicrr.exe" |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
|
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5040:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6636:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6964:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2992:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7040:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6036:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7036:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6920:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5836:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7152:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5320:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5808:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5892:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5888:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6588:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5944:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5684:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:712:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6028:120:WilError_01 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=2d028d577a0eb038 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6912:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6076:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6460:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6980:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_01 |
Source: C:\Windows\System32\conhost.exe |
Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6844:120:WilError_01 |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\SysWOW64\nslookup.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
|
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Windows\System32\conhost.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup emsisoft.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup gandcrab.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\SysWOW64\nslookup.exe nslookup nomoreransom.bit dns1.soprodns.ru |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |
Source: C:\Users\user\Desktop\2fiDcmkaZY.exe |
Process created: unknown unknown |
Jump to behavior |