Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0qlnWcmhSC.exe

Overview

General Information

Sample Name:0qlnWcmhSC.exe
Analysis ID:679111
MD5:7d3324aba9cb81871405761ea678c751
SHA1:07d238ddaabe2010d5113354b5dac651c1dcf8c0
SHA256:55043585c15ff65ca4b8df91c0b0f1c883d4cfd40933c6d25c2d9159e2f0757c
Tags:exeStop
Infos:

Detection

Djvu
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Djvu Ransomware
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Machine Learning detection for sample
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses cacls to modify the permissions of files
Contains functionality to launch a program with higher privileges
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 0qlnWcmhSC.exe (PID: 4220 cmdline: "C:\Users\user\Desktop\0qlnWcmhSC.exe" MD5: 7D3324ABA9CB81871405761EA678C751)
    • 0qlnWcmhSC.exe (PID: 5912 cmdline: "C:\Users\user\Desktop\0qlnWcmhSC.exe" MD5: 7D3324ABA9CB81871405761EA678C751)
      • icacls.exe (PID: 5964 cmdline: icacls "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7" /deny *S-1-1-0:(OI)(CI)(DE,DC) MD5: FF0D1D4317A44C951240FAE75075D501)
      • 0qlnWcmhSC.exe (PID: 5296 cmdline: "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask MD5: 7D3324ABA9CB81871405761EA678C751)
        • 0qlnWcmhSC.exe (PID: 5192 cmdline: "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask MD5: 7D3324ABA9CB81871405761EA678C751)
  • 0qlnWcmhSC.exe (PID: 896 cmdline: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task MD5: 7D3324ABA9CB81871405761EA678C751)
    • 0qlnWcmhSC.exe (PID: 5264 cmdline: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task MD5: 7D3324ABA9CB81871405761EA678C751)
  • 0qlnWcmhSC.exe (PID: 5812 cmdline: "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart MD5: 7D3324ABA9CB81871405761EA678C751)
    • 0qlnWcmhSC.exe (PID: 2100 cmdline: "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart MD5: 7D3324ABA9CB81871405761EA678C751)
  • 0qlnWcmhSC.exe (PID: 480 cmdline: "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart MD5: 7D3324ABA9CB81871405761EA678C751)
    • 0qlnWcmhSC.exe (PID: 5300 cmdline: "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart MD5: 7D3324ABA9CB81871405761EA678C751)
  • cleanup
{"Download URLs": ["http://rgyui.top/dl/build2.exe", "http://acacaca.org/files/1/build3.exe"], "C2 url": "http://acacaca.org/test2/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-QsoSRIeAK6\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@bestyourmail.ch\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0531Jhyjd", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\Windows\\", "F:\\PerfLogs\\", "F:\\ProgramData\\Desktop\\", "F:\\ProgramData\\Microsoft\\", "F:\\Users\\Public\\", "F:\\$Recycle.Bin\\", "F:\\$WINDOWS.~BT\\", "F:\\dell\\", "F:\\Intel\\"], "Public Key": "-----BEGIN PUBLIC KEY-----\\\\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwX6oUNb4mk19lyNBxK80\\\\nWDzdQgJ9XMg2LdYk3Hm0F0zP2rWDuKVpyAbosbOzGKbJOkVa\\/1XbytFAm8RYfkB\\/\\\\nnfEgGh5OGcw\\/CcqqOL3R4Vpd7slLVXc56FLkTWEMSShzg1sNxgIiQm8VcaXOgUk8\\\\ntvWKcUIV9ujXmn5UBSy\\/ICDPveI3QCaxZod7kIBwZzszO\\/3CvNwAy3eejgJ6j8ie\\\\nmwJ9pjskzLjmq92yhDGUQygWfGw0tL1KtSiqUy2M7KNdmD4FX1aVeutZC9bggvn8\\\\nV4ksJChvMxI521ms58donyKjwBAbKXBfVRaXUV2k34bI0NQqhLz5OeGIRhn67oe+\\\\njwIDAQAB\\\\n-----END PUBLIC KEY-----"}
SourceRuleDescriptionAuthorStrings
00000014.00000002.327652394.00000000041F2000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmpSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0xe23ea:$s1: http://
  • 0x100498:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0x100b28:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0x100b4b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0x10472b:$s1: \xE8\xF4\xF4\xF0\xBA\xAF\xAF
  • 0x102626:$s2: \xE8\xF4\xF4\xF0\xF3\xBA\xAF\xAF
  • 0xe23ea:$f1: http://
00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_DjvuYara detected Djvu RansomwareJoe Security
    00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_STOPDetects STOP ransomwareditekSHen
    • 0xffe88:$x1: C:\SystemID\PersonalID.txt
    • 0x100334:$x2: /deny *S-1-1-0:(OI)(CI)(DE,DC)
    • 0xffcf0:$x3: e:\doc\my work (c++)\_git\encryption\
    • 0x105b28:$x3: E:\Doc\My work (C++)\_Git\Encryption\
    • 0x1002ec:$s1: " --AutoStart
    • 0x100300:$s1: " --AutoStart
    • 0x103f48:$s2: --ForNetRes
    • 0x103f10:$s3: --Admin
    • 0x104390:$s4: %username%
    • 0x1044b4:$s5: ?pid=
    • 0x1044c0:$s6: &first=true
    • 0x1044d8:$s6: &first=false
    • 0x1003f4:$s7: delself.bat
    • 0x1043f8:$mutex1: {1D6FC66E-D1F3-422C-8A53-C0BBCF3D900D}
    • 0x104420:$mutex2: {FBB4BCC6-05C7-4ADD-B67B-A98A697323C1}
    • 0x104448:$mutex3: {36A698B9-D67C-4E07-BE82-0EC5B14B4DF5}
    00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0x105b28:$a: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb
    • 0xd9ef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    Click to see the 155 entries
    SourceRuleDescriptionAuthorStrings
    10.0.0qlnWcmhSC.exe.400000.5.raw.unpackWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0xd9ef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    1.0.0qlnWcmhSC.exe.400000.2.unpackWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0xcdef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    1.0.0qlnWcmhSC.exe.400000.3.unpackWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0xcdef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    8.0.0qlnWcmhSC.exe.400000.5.raw.unpackWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0xd9ef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    1.0.0qlnWcmhSC.exe.400000.5.raw.unpackWindows_Ransomware_Stop_1e8d48ffunknownunknown
    • 0xd9ef:$b: 68 FF FF FF 50 FF D3 8D 85 78 FF FF FF 50 FF D3 8D 85 58 FF
    Click to see the 332 entries
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 0qlnWcmhSC.exeVirustotal: Detection: 53%Perma Link
    Source: 0qlnWcmhSC.exeReversingLabs: Detection: 56%
    Source: http://acacaca.org/test2/get.phpAvira URL Cloud: Label: malware
    Source: http://acacaca.org/test2/get.phpVirustotal: Detection: 18%Perma Link
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeVirustotal: Detection: 53%Perma Link
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeReversingLabs: Detection: 56%
    Source: 0qlnWcmhSC.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeJoe Sandbox ML: detected
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpackMalware Configuration Extractor: Djvu {"Download URLs": ["http://rgyui.top/dl/build2.exe", "http://acacaca.org/files/1/build3.exe"], "C2 url": "http://acacaca.org/test2/get.php", "Ransom note file": "_readme.txt", "Ransom note": "ATTENTION!\r\n\r\nDon't worry, you can return all your files!\r\nAll your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key.\r\nThe only method of recovering files is to purchase decrypt tool and unique key for you.\r\nThis software will decrypt all your encrypted files.\r\nWhat guarantees you have?\r\nYou can send one of your encrypted file from your PC and we decrypt it for free.\r\nBut we can decrypt only 1 file for free. File must not contain valuable information.\r\nYou can get and look video overview decrypt tool:\r\nhttps://we.tl/t-QsoSRIeAK6\r\nPrice of private key and decrypt software is $980.\r\nDiscount 50% available if you contact us first 72 hours, that's price for you is $490.\r\nPlease note that you'll never restore your data without payment.\r\nCheck your e-mail \"Spam\" or \"Junk\" folder if you don't get answer more than 6 hours.\r\n\r\n\r\nTo get this software you need write on our e-mail:\r\nsupport@bestyourmail.ch\r\n\r\nReserve e-mail address to contact us:\r\ndatarestorehelp@airmail.cc\r\n\r\nYour personal ID:\r\n0531Jhyjd", "Ignore Files": ["ntuser.dat", "ntuser.dat.LOG1", "ntuser.dat.LOG2", "ntuser.pol", ".sys", ".ini", ".DLL", ".dll", ".blf", ".bat", ".lnk", ".regtrans-ms", "C:\\SystemID\\", "C:\\Users\\Default User\\", "C:\\Users\\Public\\", "C:\\Users\\All Users\\", "C:\\Users\\Default\\", "C:\\Documents and Settings\\", "C:\\ProgramData\\", "C:\\Recovery\\", "C:\\System Volume Information\\", "C:\\Users\\%username%\\AppData\\Roaming\\", "C:\\Users\\%username%\\AppData\\Local\\", "C:\\Windows\\", "C:\\PerfLogs\\", "C:\\ProgramData\\Microsoft\\", "C:\\ProgramData\\Package Cache\\", "C:\\Users\\Public\\", "C:\\$Recycle.Bin\\", "C:\\$WINDOWS.~BT\\", "C:\\dell\\", "C:\\Intel\\", "C:\\MSOCache\\", "C:\\Program Files\\", "C:\\Program Files (x86)\\", "C:\\Games\\", "C:\\Windows.old\\", "D:\\Users\\%username%\\AppData\\Roaming\\", "D:\\Users\\%username%\\AppData\\Local\\", "D:\\Windows\\", "D:\\PerfLogs\\", "D:\\ProgramData\\Desktop\\", "D:\\ProgramData\\Microsoft\\", "D:\\ProgramData\\Package Cache\\", "D:\\Users\\Public\\", "D:\\$Recycle.Bin\\", "D:\\$WINDOWS.~BT\\", "D:\\dell\\", "D:\\Intel\\", "D:\\MSOCache\\", "D:\\Program Files\\", "D:\\Program Files (x86)\\", "D:\\Games\\", "E:\\Users\\%username%\\AppData\\Roaming\\", "E:\\Users\\%username%\\AppData\\Local\\", "E:\\Windows\\", "E:\\PerfLogs\\", "E:\\ProgramData\\Desktop\\", "E:\\ProgramData\\Microsoft\\", "E:\\ProgramData\\Package Cache\\", "E:\\Users\\Public\\", "E:\\$Recycle.Bin\\", "E:\\$WINDOWS.~BT\\", "E:\\dell\\", "E:\\Intel\\", "E:\\MSOCache\\", "E:\\Program Files\\", "E:\\Program Files (x86)\\", "E:\\Games\\", "F:\\Users\\%username%\\AppData\\Roaming\\", "F:\\Users\\%username%\\AppData\\Local\\", "F:\\W
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040E870 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040EAA0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,_sprintf,CryptDestroyHash,CryptReleaseContext,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00410FC0 CryptAcquireContextW,__CxxThrowException@8,CryptCreateHash,__CxxThrowException@8,lstrlenA,CryptHashData,__CxxThrowException@8,CryptGetHashParam,CryptGetHashParam,__CxxThrowException@8,_memset,CryptGetHashParam,__CxxThrowException@8,CryptGetHashParam,_malloc,CryptGetHashParam,_memset,_sprintf,lstrcatA,CryptDestroyHash,CryptReleaseContext,
    Source: 0qlnWcmhSC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49756 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49757 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49758 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49773 version: TLS 1.2
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: Binary string: C:\moxutohoxani.pdb source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe.1.dr
    Source: Binary string: _C:\moxutohoxani.pdb` source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe.1.dr
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: 0qlnWcmhSC.exe, 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose,

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://acacaca.org/test2/get.php
    Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
    Source: Joe Sandbox ViewIP Address: 162.0.217.254 162.0.217.254
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: 0qlnWcmhSC.exe, 00000001.00000003.255498314.000000000073F000.00000004.00000020.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000003.255449271.000000000073F000.00000004.00000020.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260907718.0000000000737000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: 0qlnWcmhSC.exe, 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error
    Source: 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
    Source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe, 00000001.00000003.255498314.000000000073F000.00000004.00000020.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000003.255449271.000000000073F000.00000004.00000020.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.2ip.ua/geo.json
    Source: unknownDNS traffic detected: queries for: api.2ip.ua
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040CF10 _memset,InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: global trafficHTTP traffic detected: GET /geo.json HTTP/1.1User-Agent: Microsoft Internet ExplorerHost: api.2ip.ua
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49756 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49757 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49758 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49770 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 162.0.217.254:443 -> 192.168.2.4:49773 version: TLS 1.2

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.0qlnWcmhSC.exe.42d15a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 5.2.0qlnWcmhSC.exe.43215a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.0qlnWcmhSC.exe.42c15a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.0qlnWcmhSC.exe.42915a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.0qlnWcmhSC.exe.42f15a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 0.2.0qlnWcmhSC.exe.42d15a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 9.2.0qlnWcmhSC.exe.42f15a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 10.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 1.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 13.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 20.2.0qlnWcmhSC.exe.42915a0.1.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 21.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 8.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 6.2.0qlnWcmhSC.exe.42c15a0.1.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 4220, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 5912, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 5296, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 896, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 5192, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 5812, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 5264, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 2100, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 480, type: MEMORYSTR
    Source: Yara matchFile source: Process Memory Space: 0qlnWcmhSC.exe PID: 5300, type: MEMORYSTR

    System Summary

    barindex
    Source: 10.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 10.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 10.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 1.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 1.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 13.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 13.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 21.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 21.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 8.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 8.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000014.00000002.327652394.00000000041F2000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000009.00000002.304182399.00000000026DE000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000008.00000000.278663427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000D.00000000.297339138.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000000.249683666.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000015.00000000.322244300.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000005.00000002.282884669.00000000027ED000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000006.00000002.325796786.00000000041EE000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000000.00000002.254903919.0000000004190000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
    Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000A.00000000.314313575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects STOP ransomware Author: ditekSHen
    Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 4220, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5912, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 896, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5192, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5812, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5264, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 2100, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 480, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5300, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff Author: unknown
    Source: 0qlnWcmhSC.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 10.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 5.2.0qlnWcmhSC.exe.43215a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0.2.0qlnWcmhSC.exe.42d15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.2.0qlnWcmhSC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 9.2.0qlnWcmhSC.exe.42f15a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 10.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 10.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 10.0.0qlnWcmhSC.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 1.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 1.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 1.0.0qlnWcmhSC.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.2.0qlnWcmhSC.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 13.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 13.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 13.0.0qlnWcmhSC.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 20.2.0qlnWcmhSC.exe.42915a0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 21.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 21.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 21.0.0qlnWcmhSC.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 8.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 8.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 8.0.0qlnWcmhSC.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 6.2.0qlnWcmhSC.exe.42c15a0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000014.00000002.327652394.00000000041F2000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000009.00000002.304182399.00000000026DE000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000008.00000000.278663427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000D.00000000.297339138.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000000.249683666.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000015.00000000.322244300.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000005.00000002.282884669.00000000027ED000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000006.00000002.325796786.00000000041EE000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000000.00000002.254903919.0000000004190000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
    Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000A.00000000.314313575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2021-05-27
    Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_STOP snort2_sid = 920113, author = ditekSHen, description = Detects STOP ransomware, clamav_sig = MALWARE.Win.Ransomware.STOP, snort3_sid = 920111
    Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 4220, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5912, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5296, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 896, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5192, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5812, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5264, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 2100, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 480, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: Process Memory Space: 0qlnWcmhSC.exe PID: 5300, type: MEMORYSTRMatched rule: Windows_Ransomware_Stop_1e8d48ff reference_sample = 821b27488f296e15542b13ac162db4a354cbf4386b6cd40a550c4a71f4d628f3, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Ransomware.Stop, fingerprint = 715888e3e13aaa33f2fd73beef2c260af13e9726cb4b43d349333e3259bf64eb, id = 1e8d48ff-e0ab-478d-8268-a11f2e87ab79, last_modified = 2021-08-23
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040D240
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00419F90
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040C070
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0042E003
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0042F010
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00410160
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0044237E
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_004344FF
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00449506
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0043E5A3
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0044B5B1
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040A660
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0041E690
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040274E
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040A710
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040F730
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0044D7A1
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0042C804
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0044D9DC
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00449A71
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00443B40
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0044ACFF
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040DD40
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040BDC0
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0042CE51
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00420F30
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00449FE3
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: String function: 0042F7C0 appears 37 times
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: String function: 0044F23E appears 44 times
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: String function: 00428520 appears 51 times
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: String function: 004547A0 appears 31 times
    Source: 0qlnWcmhSC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: 0qlnWcmhSC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 0qlnWcmhSC.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: 0qlnWcmhSC.exeVirustotal: Detection: 53%
    Source: 0qlnWcmhSC.exeReversingLabs: Detection: 56%
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile read: C:\Users\user\Desktop\0qlnWcmhSC.exeJump to behavior
    Source: 0qlnWcmhSC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe"
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe"
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
    Source: unknownProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
    Source: unknownProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: unknownProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe"
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\geo[1].jsonJump to behavior
    Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@18/3@5/2
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040D240 CoInitialize,CoInitializeSecurity,CoCreateInstance,VariantInit,VariantInit,VariantInit,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,CoUninitialize,CoUninitialize,CoUninitialize,__time64,_wcsftime,VariantInit,VariantInit,VariantClear,VariantClear,VariantClear,VariantClear,swprintf,CoUninitialize,CoUninitialize,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00411900 GetLastError,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,LocalAlloc,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,_memset,lstrcpynW,MessageBoxW,LocalFree,LocalFree,LocalFree,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 0_2_041907C6 CreateToolhelp32Snapshot,Module32First,
    Source: 0qlnWcmhSC.exeString found in binary or memory: set-addPolicy
    Source: 0qlnWcmhSC.exeString found in binary or memory: id-cmc-addExtensions
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 0qlnWcmhSC.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdb source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: Binary string: C:\moxutohoxani.pdb source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe.1.dr
    Source: Binary string: _C:\moxutohoxani.pdb` source: 0qlnWcmhSC.exe, 0qlnWcmhSC.exe.1.dr
    Source: Binary string: E:\Doc\My work (C++)\_Git\Encryption\Release\encrypt_win_api.pdbI source: 0qlnWcmhSC.exe, 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 0_2_041930AF push ecx; retf
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00428565 push ecx; ret
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle,
    Source: initial sampleStatic PE information: section name: .text entropy: 7.945325516115354
    Source: initial sampleStatic PE information: section name: .text entropy: 7.945325516115354
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeFile created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeJump to dropped file
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelperJump to behavior
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run SysHelperJump to behavior
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Windows\SysWOW64\icacls.exe icacls "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 0_2_0419171C rdtsc
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _malloc,_malloc,_wprintf,_free,GetAdaptersInfo,_free,_malloc,GetAdaptersInfo,_sprintf,_wprintf,_wprintf,_free,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess information queried: ProcessInformation
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00410160 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0040F730 PathFindFileNameW,PathFindFileNameW,_memmove,PathFindFileNameW,_memmove,PathAppendW,_memmove,PathFileExistsW,_malloc,lstrcpyW,lstrcatW,_free,FindFirstFileW,PathFindExtensionW,_wcsstr,_wcsstr,_wcsstr,_wcsstr,FindNextFileW,FindClose,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeAPI call chain: ExitProcess graph end node
    Source: 0qlnWcmhSC.exe, 00000001.00000002.260892722.000000000071D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00424168 _memset,IsDebuggerPresent,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0042A57A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00412220 GetCommandLineW,CommandLineToArgvW,PathFindFileNameW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,K32EnumProcesses,OpenProcess,K32EnumProcessModules,K32GetModuleBaseNameW,CloseHandle,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00447CAC __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 0_2_0419171C rdtsc
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 0_2_041900A3 push dword ptr fs:[00000030h]
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_004329EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_004329BB SetUnhandledExceptionFilter,

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeMemory written: C:\Users\user\Desktop\0qlnWcmhSC.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeMemory written: C:\Users\user\Desktop\0qlnWcmhSC.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeMemory written: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeMemory written: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeMemory written: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe base: 400000 value starts with: 4D5A
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe"
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeProcess created: C:\Users\user\Desktop\0qlnWcmhSC.exe "C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exeProcess created: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtLCMapStringA,___crtLCMapStringA,___crtGetStringTypeA,_free,_free,_free,_free,_free,_free,_free,_free,_free,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _LcidFromHexString,GetLocaleInfoW,_TestDefaultLanguage,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _wcscmp,_wcscmp,GetLocaleInfoW,GetLocaleInfoW,GetACP,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: GetLocaleInfoW,_GetPrimaryLen,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _memset,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_GetLcidFromCountry,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,___crtDownlevelLCIDToLocaleName,___crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,__itow_s,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: GetLocaleInfoW,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,_free,_free,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_TranslateName,_GetLocaleNameFromLangCountry,_GetLocaleNameFromLanguage,_GetLocaleNameFromDefault,IsValidCodePage,_wcschr,_wcschr,__itow_s,__invoke_watson,_LcidFromHexString,GetLocaleInfoW,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _GetPrimaryLen,EnumSystemLocalesW,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__calloc_crt,_free,__invoke_watson,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: _LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,__wcsnicmp,GetLocaleInfoW,_TestDefaultLanguage,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,_free,_free,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00427756 cpuid
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 0_2_0049EBFB GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_0042FE47 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle,
    Source: C:\Users\user\Desktop\0qlnWcmhSC.exeCode function: 1_2_00419F90 GetCurrentProcess,GetLastError,GetLastError,SetPriorityClass,GetLastError,GetModuleFileNameW,PathRemoveFileSpecW,GetCommandLineW,CommandLineToArgvW,lstrcpyW,lstrcmpW,lstrcmpW,lstrcpyW,lstrcpyW,lstrcmpW,lstrcmpW,GlobalFree,lstrcpyW,lstrcpyW,OpenProcess,WaitForSingleObject,CloseHandle,Sleep,GlobalFree,GetCurrentProcess,GetExitCodeProcess,TerminateProcess,CloseHandle,lstrcatW,GetVersion,lstrcpyW,lstrcatW,lstrcatW,_memset,ShellExecuteExW,CreateThread,lstrlenA,lstrcatW,_malloc,lstrcatW,_memset,lstrcatW,MultiByteToWideChar,lstrcatW,lstrlenW,CreateThread,WaitForSingleObject,CreateMutexA,CreateMutexA,lstrlenA,lstrcpyA,_memmove,_memmove,_memmove,GetUserNameW,GetMessageW,GetMessageW,DispatchMessageW,TranslateMessage,TranslateMessage,DispatchMessageW,GetMessageW,PostThreadMessageW,PeekMessageW,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,PostThreadMessageW,PeekMessageW,DispatchMessageW,PeekMessageW,WaitForSingleObject,CloseHandle,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Command and Scripting Interpreter
    1
    Registry Run Keys / Startup Folder
    1
    Exploitation for Privilege Escalation
    1
    Masquerading
    OS Credential Dumping2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium21
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts2
    Native API
    1
    Services File Permissions Weakness
    111
    Process Injection
    111
    Process Injection
    LSASS Memory141
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)1
    Registry Run Keys / Startup Folder
    1
    Deobfuscate/Decode Files or Information
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)1
    Services File Permissions Weakness
    3
    Obfuscated Files or Information
    NTDS1
    Account Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer13
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Services File Permissions Weakness
    LSA Secrets1
    System Owner/User Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common2
    Software Packing
    Cached Domain Credentials1
    Remote System Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    System Network Configuration Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
    File and Directory Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow24
    System Information Discovery
    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 679111 Sample: 0qlnWcmhSC.exe Startdate: 05/08/2022 Architecture: WINDOWS Score: 100 45 Multi AV Scanner detection for domain / URL 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Antivirus detection for URL or domain 2->49 51 4 other signatures 2->51 8 0qlnWcmhSC.exe 2->8         started        11 0qlnWcmhSC.exe 2->11         started        13 0qlnWcmhSC.exe 2->13         started        15 0qlnWcmhSC.exe 2->15         started        process3 signatures4 53 Injects a PE file into a foreign processes 8->53 17 0qlnWcmhSC.exe 1 17 8->17         started        55 Multi AV Scanner detection for dropped file 11->55 57 Machine Learning detection for dropped file 11->57 21 0qlnWcmhSC.exe 13 11->21         started        23 0qlnWcmhSC.exe 13 13->23         started        25 0qlnWcmhSC.exe 13 15->25         started        process5 dnsIp6 43 api.2ip.ua 162.0.217.254, 443, 49756, 49757 ACPCA Canada 17->43 35 C:\Users\user\AppData\...\0qlnWcmhSC.exe, PE32 17->35 dropped 37 C:\Users\...\0qlnWcmhSC.exe:Zone.Identifier, ASCII 17->37 dropped 27 0qlnWcmhSC.exe 17->27         started        30 icacls.exe 17->30         started        file7 process8 signatures9 59 Injects a PE file into a foreign processes 27->59 32 0qlnWcmhSC.exe 13 27->32         started        process10 dnsIp11 39 192.168.2.1 unknown unknown 32->39 41 api.2ip.ua 32->41

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    0qlnWcmhSC.exe54%VirustotalBrowse
    0qlnWcmhSC.exe56%ReversingLabsWin32.Trojan.Scarsi
    0qlnWcmhSC.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe54%VirustotalBrowse
    C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe56%ReversingLabsWin32.Trojan.Scarsi
    SourceDetectionScannerLabelLinkDownload
    10.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.8.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.9.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.2.unpack100%AviraHEUR/AGEN.1229097Download File
    13.0.0qlnWcmhSC.exe.400000.7.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.7.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.5.unpack100%AviraHEUR/AGEN.1223627Download File
    10.0.0qlnWcmhSC.exe.400000.6.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    10.0.0qlnWcmhSC.exe.400000.7.unpack100%AviraHEUR/AGEN.1223627Download File
    13.0.0qlnWcmhSC.exe.400000.9.unpack100%AviraHEUR/AGEN.1223627Download File
    1.0.0qlnWcmhSC.exe.400000.9.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    13.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.3.unpack100%AviraHEUR/AGEN.1229097Download File
    13.0.0qlnWcmhSC.exe.400000.6.unpack100%AviraHEUR/AGEN.1223627Download File
    21.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
    10.0.0qlnWcmhSC.exe.400000.5.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.1.unpack100%AviraHEUR/AGEN.1229097Download File
    20.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    9.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    8.0.0qlnWcmhSC.exe.400000.5.unpack100%AviraHEUR/AGEN.1223627Download File
    5.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    8.0.0qlnWcmhSC.exe.400000.7.unpack100%AviraHEUR/AGEN.1223627Download File
    8.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
    1.0.0qlnWcmhSC.exe.400000.5.unpack100%AviraHEUR/AGEN.1223627Download File
    13.0.0qlnWcmhSC.exe.400000.10.unpack100%AviraHEUR/AGEN.1223627Download File
    1.0.0qlnWcmhSC.exe.400000.10.unpack100%AviraHEUR/AGEN.1223627Download File
    1.0.0qlnWcmhSC.exe.400000.6.unpack100%AviraHEUR/AGEN.1223627Download File
    0.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    10.0.0qlnWcmhSC.exe.400000.9.unpack100%AviraHEUR/AGEN.1223627Download File
    13.0.0qlnWcmhSC.exe.400000.8.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.8.unpack100%AviraHEUR/AGEN.1223627Download File
    10.0.0qlnWcmhSC.exe.400000.4.unpack100%AviraHEUR/AGEN.1223627Download File
    10.0.0qlnWcmhSC.exe.400000.10.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.4.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.10.unpack100%AviraHEUR/AGEN.1223627Download File
    10.0.0qlnWcmhSC.exe.400000.8.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.2.unpack100%AviraHEUR/AGEN.1229097Download File
    1.0.0qlnWcmhSC.exe.400000.4.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.9.unpack100%AviraHEUR/AGEN.1223627Download File
    8.0.0qlnWcmhSC.exe.400000.4.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.3.unpack100%AviraHEUR/AGEN.1229097Download File
    1.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1223627Download File
    13.0.0qlnWcmhSC.exe.400000.5.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.10.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.1.unpack100%AviraHEUR/AGEN.1229097Download File
    1.0.0qlnWcmhSC.exe.400000.7.unpack100%AviraHEUR/AGEN.1223627Download File
    1.0.0qlnWcmhSC.exe.400000.8.unpack100%AviraHEUR/AGEN.1223627Download File
    6.2.0qlnWcmhSC.exe.400000.0.unpack100%AviraHEUR/AGEN.1229097Download File
    8.0.0qlnWcmhSC.exe.400000.6.unpack100%AviraHEUR/AGEN.1223627Download File
    13.0.0qlnWcmhSC.exe.400000.4.unpack100%AviraHEUR/AGEN.1223627Download File
    21.0.0qlnWcmhSC.exe.400000.6.unpack100%AviraHEUR/AGEN.1223627Download File
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://acacaca.org/test2/get.php18%VirustotalBrowse
    http://acacaca.org/test2/get.php100%Avira URL Cloudmalware
    http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    api.2ip.ua
    162.0.217.254
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://acacaca.org/test2/get.phptrue
      • 18%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://api.2ip.ua/geo.jsonfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://https://ns1.kriston.ugns2.chalekin.ugns3.unalelath.ugns4.andromath.ug/Error0qlnWcmhSC.exe, 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, 0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://www.openssl.org/support/faq.html0qlnWcmhSC.exe, 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          162.0.217.254
          api.2ip.uaCanada
          35893ACPCAfalse
          IP
          192.168.2.1
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:679111
          Start date and time: 05/08/202209:31:082022-08-05 09:31:08 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 10m 11s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:0qlnWcmhSC.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:33
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.rans.troj.evad.winEXE@18/3@5/2
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 91.8% (good quality ratio 84.9%)
          • Quality average: 80%
          • Quality standard deviation: 30.8%
          HCA Information:
          • Successful, ratio: 74%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Adjust boot time
          • Enable AMSI
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 52.242.101.226
          • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, glb.sls.prod.dcat.dsp.trafficmanager.net
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          TimeTypeDescription
          09:32:23Task SchedulerRun new task: Time Trigger Task path: C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe s>--Task
          09:32:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
          09:32:34AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SysHelper "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\0qlnWcmhSC.exe
          File Type:ASCII text, with very long lines, with no line terminators
          Category:dropped
          Size (bytes):499
          Entropy (8bit):4.498676192647716
          Encrypted:false
          SSDEEP:12:YZIYX7kt/QVFRbIm/QVAY9QVFRHQVFRRaZRQVFRQQVFRUm62jOH4:Y/4FQVFRbI0QVAY9QVFRHQVFRGRQVFRX
          MD5:9B34F54321E4DCCB66CD6428C339A33B
          SHA1:64B330EC2D7236E3A67C495A9AA8A8E8EA8A48B4
          SHA-256:AD2D7CA6CB4492C6E78CFD6166EE744F42F835D2B27725A4D4288F878568D8DF
          SHA-512:F6C6517529934EFE8EA7B13D4B10ED67940D87903BB67F40B3BDCDB399EDBCAF5F3387B42A83F50C1F8921FD02E36B9C312DCE1BF9A64AFDDB81736046321E87
          Malicious:false
          Reputation:low
          Preview:{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044e\u0440\u0438\u0445","region_ua":"\u0426\u044e\u0440\u0438\u0445","city":"Zurich","city_rus":"\u0426\u044e\u0440\u0438\u0445","city_ua":"\u0426\u044e\u0440\u0438\u0445","latitude":"47.36667","longitude":"8.55","zip_code":"8099","time_zone":"+02:00"}
          Process:C:\Users\user\Desktop\0qlnWcmhSC.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):747520
          Entropy (8bit):7.841061613868369
          Encrypted:false
          SSDEEP:12288:SfscGOYW1JxHUov45u3pRXPNuNbXZXFBoyU5r29dNBoE15NK:SQBSUp5uHUNbX1NU5Sh915I
          MD5:7D3324ABA9CB81871405761EA678C751
          SHA1:07D238DDAABE2010D5113354B5DAC651C1DCF8C0
          SHA-256:55043585C15FF65CA4B8DF91C0B0F1C883D4CFD40933C6D25C2D9159E2F0757C
          SHA-512:6B03D19642807F68E24F7B03F734ED3A2EE1BDDFA543663CC4AB979EEA1BD3C088D9375144FD1A1247D86C1D30F3641D9C9FA9114FAAA159CC524E5D6732BAF2
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: Virustotal, Detection: 54%, Browse
          • Antivirus: ReversingLabs, Detection: 56%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ADK. *.. *.. *..V... *..V... *..X... *.. +.f *..V... *..V... *..V... *.Rich. *.........................PE..L....q.`.................^...................p....@.................................k........................................a..<.......h...........................0................................6..@............................................text....].......^.................. ..`.data....a...p...0...b..............@....rsrc...h...........................@..@................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\0qlnWcmhSC.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Reputation:high, very likely benign file
          Preview:[ZoneTransfer]....ZoneId=0
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):7.841061613868369
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:0qlnWcmhSC.exe
          File size:747520
          MD5:7d3324aba9cb81871405761ea678c751
          SHA1:07d238ddaabe2010d5113354b5dac651c1dcf8c0
          SHA256:55043585c15ff65ca4b8df91c0b0f1c883d4cfd40933c6d25c2d9159e2f0757c
          SHA512:6b03d19642807f68e24f7b03f734ed3a2ee1bddfa543663cc4ab979eea1bd3c088d9375144fd1a1247d86c1d30f3641d9c9fa9114faaa159cc524e5d6732baf2
          SSDEEP:12288:SfscGOYW1JxHUov45u3pRXPNuNbXZXFBoyU5r29dNBoE15NK:SQBSUp5uHUNbX1NU5Sh915I
          TLSH:69F4123132C0C033D766A230442EDF759EBDB910B6659AC767A12A296F762D10A3D37F
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ADK. *.. *.. *..V... *..V... *..X... *.. +.f *..V... *..V... *..V... *.Rich. *.........................PE..L....q.`...........
          Icon Hash:8a909989ca8ed2f2
          Entrypoint:0x4983a0
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x60C271F8 [Thu Jun 10 20:11:36 2021 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:52981a63110ae9001dc5c79717e57d47
          Instruction
          call 00007F0B010F774Bh
          jmp 00007F0B010F0D7Eh
          int3
          int3
          int3
          int3
          int3
          int3
          call 00007F0B010F0F2Ch
          xchg cl, ch
          jmp 00007F0B010F0F14h
          call 00007F0B010F0F23h
          fxch st(0), st(1)
          jmp 00007F0B010F0F0Bh
          fabs
          fld1
          mov ch, cl
          xor cl, cl
          jmp 00007F0B010F0F01h
          mov byte ptr [ebp-00000090h], FFFFFFFEh
          fabs
          fxch st(0), st(1)
          fabs
          fxch st(0), st(1)
          fpatan
          or cl, cl
          je 00007F0B010F0EF6h
          fldpi
          fsubrp st(1), st(0)
          or ch, ch
          je 00007F0B010F0EF4h
          fchs
          ret
          fabs
          fld st(0), st(0)
          fld st(0), st(0)
          fld1
          fsubrp st(1), st(0)
          fxch st(0), st(1)
          fld1
          faddp st(1), st(0)
          fmulp st(1), st(0)
          ftst
          wait
          fstsw word ptr [ebp-000000A0h]
          wait
          test byte ptr [ebp-0000009Fh], 00000001h
          jne 00007F0B010F0EF7h
          xor ch, ch
          fsqrt
          ret
          pop eax
          jmp 00007F0B010F791Fh
          fstp st(0)
          fld tbyte ptr [004024DAh]
          ret
          fstp st(0)
          or cl, cl
          je 00007F0B010F0EFDh
          fstp st(0)
          fldpi
          or ch, ch
          je 00007F0B010F0EF4h
          fchs
          ret
          fstp st(0)
          fldz
          or ch, ch
          je 00007F0B010F0EE9h
          fchs
          ret
          fstp st(0)
          jmp 00007F0B010F78F5h
          fstp st(0)
          mov cl, ch
          jmp 00007F0B010F0EF2h
          call 00007F0B010F0EBEh
          jmp 00007F0B010F7900h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          push ebp
          mov ebp, esp
          add esp, 00FFFD30h
          Programming Language:
          • [ASM] VS2010 build 30319
          • [ C ] VS2010 build 30319
          • [IMP] VS2008 SP1 build 30729
          • [C++] VS2010 build 30319
          • [RES] VS2010 build 30319
          • [LNK] VS2010 build 30319
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xa61dc0x3c.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x212e0000xd568.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x12300x1c.text
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x36900x40.text
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1e0.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xa5d040xa5e00False0.9462647772230596data7.945325516115354IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .data0xa70000x20861cc0x3000unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x212e0000xd5680xd600False0.6635879088785047data6.51807475828368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_ICON0x212e4e00xea8dataKannadaKanada
          RT_ICON0x212f3880x8a8dataKannadaKanada
          RT_ICON0x212fc300x568GLS_BINARY_LSB_FIRSTKannadaKanada
          RT_ICON0x21301980x25a8dataKannadaKanada
          RT_ICON0x21327400x10a8dataKannadaKanada
          RT_ICON0x21337e80x988dataKannadaKanada
          RT_ICON0x21341700x468GLS_BINARY_LSB_FIRSTKannadaKanada
          RT_ICON0x21346400xea8dataKannadaKanada
          RT_ICON0x21354e80x8a8dataKannadaKanada
          RT_ICON0x2135d900x6c8dataKannadaKanada
          RT_ICON0x21364580x568GLS_BINARY_LSB_FIRSTKannadaKanada
          RT_ICON0x21369c00x25a8dataKannadaKanada
          RT_ICON0x2138f680x10a8dataKannadaKanada
          RT_ICON0x213a0100x468GLS_BINARY_LSB_FIRSTKannadaKanada
          RT_DIALOG0x213a6880x78data
          RT_STRING0x213a7000x67adataFrenchSwitzerland
          RT_STRING0x213ad800x464dataFrenchSwitzerland
          RT_STRING0x213b1e80x380dataFrenchSwitzerland
          RT_GROUP_ICON0x21345d80x68dataKannadaKanada
          RT_GROUP_ICON0x213a4780x68dataKannadaKanada
          RT_VERSION0x213a4f00x194data
          None0x213a4e00xadata
          DLLImport
          KERNEL32.dllGetModuleFileNameA, FoldStringA, GetLocalTime, InterlockedDecrement, GetLocaleInfoA, InterlockedCompareExchange, _hwrite, CancelWaitableTimer, GetSystemDirectoryW, CreateEventW, ReadConsoleA, BuildCommDCBA, GetConsoleAliasExesLengthW, SetSystemTimeAdjustment, PeekConsoleInputW, EnumDateFormatsA, CreateFileW, RegisterWaitForSingleObjectEx, LoadLibraryW, VerifyVersionInfoW, WaitNamedPipeA, GetEnvironmentStrings, FindResourceExA, VirtualProtect, GetFirmwareEnvironmentVariableW, BeginUpdateResourceW, GetConsoleAliasExesLengthA, WriteConsoleA, EnumCalendarInfoExA, WriteConsoleW, DeleteFileW, FillConsoleOutputCharacterA, GetProcAddress, GetModuleHandleW, GetUserDefaultLCID, FindFirstChangeNotificationW, GetFileAttributesExA, GetCalendarInfoA, SetConsoleTitleA, GetBinaryTypeW, GlobalAlloc, GetComputerNameExA, FindNextFileA, OpenJobObjectA, HeapSize, _lclose, GetComputerNameW, TlsGetValue, SetCalendarInfoW, SetComputerNameW, CreateDirectoryExA, InitializeCriticalSectionAndSpinCount, FindFirstChangeNotificationA, GetVolumePathNameA, LoadLibraryA, GetProcessHandleCount, GetThreadLocale, GetSystemDefaultLangID, GetCurrentProcess, ReadFile, HeapFree, GetDiskFreeSpaceW, GetProcessHeap, RaiseException, RtlUnwind, MultiByteToWideChar, GetCommandLineW, HeapSetInformation, GetStartupInfoW, EncodePointer, HeapAlloc, GetLastError, IsProcessorFeaturePresent, DecodePointer, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, SetHandleCount, GetStdHandle, GetFileType, DeleteCriticalSection, SetFilePointer, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, EnterCriticalSection, LeaveCriticalSection, ExitProcess, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CloseHandle, WriteFile, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, Sleep, SetStdHandle, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, FlushFileBuffers, CreateFileA, LCMapStringW, GetStringTypeW, HeapReAlloc, SetEndOfFile
          USER32.dllClientToScreen
          Language of compilation systemCountry where language is spokenMap
          KannadaKanada
          FrenchSwitzerland
          TimestampSource PortDest PortSource IPDest IP
          Aug 5, 2022 09:32:21.845168114 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:21.845237017 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:21.845350027 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:21.883203983 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:21.883244038 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:21.946850061 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:21.947046041 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.255156040 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.255182981 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:22.255604982 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:22.255740881 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.258965969 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.299397945 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:22.306792021 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:22.306879044 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:22.307085037 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.307107925 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.374202967 CEST49756443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:22.374244928 CEST44349756162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.548737049 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.548810005 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.548928022 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.569725990 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.569775105 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.628892899 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.628998995 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.646548033 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.646600008 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.647093058 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.647198915 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.664159060 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.704416990 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.704519033 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.704567909 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.704596996 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:35.704632044 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.704737902 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.706440926 CEST49757443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:35.706465006 CEST44349757162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.715960026 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.716017962 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.716136932 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.737212896 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.737261057 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.798867941 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.799022913 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.824076891 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.824106932 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.824641943 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.824733973 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.835328102 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.875370026 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.882323980 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.882390976 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.882414103 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.882448912 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:45.882462978 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.882505894 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.900430918 CEST49758443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:45.900470972 CEST44349758162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:55.780504942 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:55.780548096 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:55.780627012 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:55.925726891 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:55.925789118 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:55.984642982 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:55.984736919 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.001511097 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.001553059 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.002136946 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.002407074 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.006709099 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.047390938 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.052881956 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.053028107 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.053042889 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.053101063 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.138729095 CEST49770443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.138775110 CEST44349770162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.700257063 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.700294971 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.700417042 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.731936932 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.731972933 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.790129900 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.790257931 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.800154924 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.800169945 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.800421953 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.800483942 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.802987099 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.843372107 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.858076096 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.858146906 CEST44349773162.0.217.254192.168.2.4
          Aug 5, 2022 09:32:56.858167887 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.858200073 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.886595011 CEST49773443192.168.2.4162.0.217.254
          Aug 5, 2022 09:32:56.886622906 CEST44349773162.0.217.254192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Aug 5, 2022 09:32:21.801332951 CEST6209953192.168.2.48.8.8.8
          Aug 5, 2022 09:32:21.824054956 CEST53620998.8.8.8192.168.2.4
          Aug 5, 2022 09:32:35.517426014 CEST5377553192.168.2.48.8.8.8
          Aug 5, 2022 09:32:35.537319899 CEST53537758.8.8.8192.168.2.4
          Aug 5, 2022 09:32:45.663456917 CEST5480053192.168.2.48.8.8.8
          Aug 5, 2022 09:32:45.683166981 CEST53548008.8.8.8192.168.2.4
          Aug 5, 2022 09:32:55.691454887 CEST5607653192.168.2.48.8.8.8
          Aug 5, 2022 09:32:55.708774090 CEST53560768.8.8.8192.168.2.4
          Aug 5, 2022 09:32:56.645776033 CEST6064753192.168.2.48.8.8.8
          Aug 5, 2022 09:32:56.667680025 CEST53606478.8.8.8192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Aug 5, 2022 09:32:21.801332951 CEST192.168.2.48.8.8.80x5b7eStandard query (0)api.2ip.uaA (IP address)IN (0x0001)
          Aug 5, 2022 09:32:35.517426014 CEST192.168.2.48.8.8.80x9ed9Standard query (0)api.2ip.uaA (IP address)IN (0x0001)
          Aug 5, 2022 09:32:45.663456917 CEST192.168.2.48.8.8.80xc1c2Standard query (0)api.2ip.uaA (IP address)IN (0x0001)
          Aug 5, 2022 09:32:55.691454887 CEST192.168.2.48.8.8.80x6a22Standard query (0)api.2ip.uaA (IP address)IN (0x0001)
          Aug 5, 2022 09:32:56.645776033 CEST192.168.2.48.8.8.80x80a0Standard query (0)api.2ip.uaA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Aug 5, 2022 09:32:21.824054956 CEST8.8.8.8192.168.2.40x5b7eNo error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
          Aug 5, 2022 09:32:35.537319899 CEST8.8.8.8192.168.2.40x9ed9No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
          Aug 5, 2022 09:32:45.683166981 CEST8.8.8.8192.168.2.40xc1c2No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
          Aug 5, 2022 09:32:55.708774090 CEST8.8.8.8192.168.2.40x6a22No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
          Aug 5, 2022 09:32:56.667680025 CEST8.8.8.8192.168.2.40x80a0No error (0)api.2ip.ua162.0.217.254A (IP address)IN (0x0001)
          • api.2ip.ua
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.449756162.0.217.254443C:\Users\user\Desktop\0qlnWcmhSC.exe
          TimestampkBytes transferredDirectionData
          2022-08-05 07:32:22 UTC0OUTGET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          2022-08-05 07:32:22 UTC0INHTTP/1.1 200 OK
          Date: Fri, 05 Aug 2022 07:32:22 GMT
          Server: Apache
          Strict-Transport-Security: max-age=63072000; preload
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block; report=...
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
          Upgrade: h2,h2c
          Connection: Upgrade, close
          Transfer-Encoding: chunked
          Content-Type: application/json
          2022-08-05 07:32:22 UTC0INData Raw: 31 66 33 0d 0a 7b 22 69 70 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 43 48 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 5f 72 75 73 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 33 38 5c 75 30 34 34 66 22 2c 22 63 6f 75 6e 74 72 79 5f 75 61 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 35 36 5c 75 30 34 34 66 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 75 72 69 63 68 22 2c 22 72 65 67 69 6f 6e 5f 72 75 73 22 3a 22 5c 75 30 34 32 36 5c 75 30 34 34
          Data Ascii: 1f3{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044


          Session IDSource IPSource PortDestination IPDestination PortProcess
          1192.168.2.449757162.0.217.254443C:\Users\user\Desktop\0qlnWcmhSC.exe
          TimestampkBytes transferredDirectionData
          2022-08-05 07:32:35 UTC1OUTGET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          2022-08-05 07:32:35 UTC1INHTTP/1.1 200 OK
          Date: Fri, 05 Aug 2022 07:32:35 GMT
          Server: Apache
          Strict-Transport-Security: max-age=63072000; preload
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block; report=...
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
          Upgrade: h2,h2c
          Connection: Upgrade, close
          Transfer-Encoding: chunked
          Content-Type: application/json
          2022-08-05 07:32:35 UTC1INData Raw: 31 66 33 0d 0a 7b 22 69 70 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 43 48 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 5f 72 75 73 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 33 38 5c 75 30 34 34 66 22 2c 22 63 6f 75 6e 74 72 79 5f 75 61 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 35 36 5c 75 30 34 34 66 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 75 72 69 63 68 22 2c 22 72 65 67 69 6f 6e 5f 72 75 73 22 3a 22 5c 75 30 34 32 36 5c 75 30 34 34
          Data Ascii: 1f3{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044


          Session IDSource IPSource PortDestination IPDestination PortProcess
          2192.168.2.449758162.0.217.254443C:\Users\user\Desktop\0qlnWcmhSC.exe
          TimestampkBytes transferredDirectionData
          2022-08-05 07:32:45 UTC2OUTGET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          2022-08-05 07:32:45 UTC2INHTTP/1.1 200 OK
          Date: Fri, 05 Aug 2022 07:32:45 GMT
          Server: Apache
          Strict-Transport-Security: max-age=63072000; preload
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block; report=...
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
          Upgrade: h2,h2c
          Connection: Upgrade, close
          Transfer-Encoding: chunked
          Content-Type: application/json
          2022-08-05 07:32:45 UTC2INData Raw: 31 66 33 0d 0a 7b 22 69 70 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 43 48 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 5f 72 75 73 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 33 38 5c 75 30 34 34 66 22 2c 22 63 6f 75 6e 74 72 79 5f 75 61 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 35 36 5c 75 30 34 34 66 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 75 72 69 63 68 22 2c 22 72 65 67 69 6f 6e 5f 72 75 73 22 3a 22 5c 75 30 34 32 36 5c 75 30 34 34
          Data Ascii: 1f3{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044


          Session IDSource IPSource PortDestination IPDestination PortProcess
          3192.168.2.449770162.0.217.254443C:\Users\user\Desktop\0qlnWcmhSC.exe
          TimestampkBytes transferredDirectionData
          2022-08-05 07:32:56 UTC3OUTGET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          2022-08-05 07:32:56 UTC3INHTTP/1.1 200 OK
          Date: Fri, 05 Aug 2022 07:32:56 GMT
          Server: Apache
          Strict-Transport-Security: max-age=63072000; preload
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block; report=...
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
          Upgrade: h2,h2c
          Connection: Upgrade, close
          Transfer-Encoding: chunked
          Content-Type: application/json
          2022-08-05 07:32:56 UTC3INData Raw: 31 66 33 0d 0a 7b 22 69 70 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 43 48 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 5f 72 75 73 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 33 38 5c 75 30 34 34 66 22 2c 22 63 6f 75 6e 74 72 79 5f 75 61 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 35 36 5c 75 30 34 34 66 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 75 72 69 63 68 22 2c 22 72 65 67 69 6f 6e 5f 72 75 73 22 3a 22 5c 75 30 34 32 36 5c 75 30 34 34
          Data Ascii: 1f3{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044


          Session IDSource IPSource PortDestination IPDestination PortProcess
          4192.168.2.449773162.0.217.254443C:\Users\user\Desktop\0qlnWcmhSC.exe
          TimestampkBytes transferredDirectionData
          2022-08-05 07:32:56 UTC4OUTGET /geo.json HTTP/1.1
          User-Agent: Microsoft Internet Explorer
          Host: api.2ip.ua
          2022-08-05 07:32:56 UTC4INHTTP/1.1 200 OK
          Date: Fri, 05 Aug 2022 07:32:56 GMT
          Server: Apache
          Strict-Transport-Security: max-age=63072000; preload
          X-Frame-Options: SAMEORIGIN
          X-Content-Type-Options: nosniff
          X-XSS-Protection: 1; mode=block; report=...
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Methods: POST, GET, PUT, OPTIONS, PATCH, DELETE
          Access-Control-Allow-Headers: X-Accept-Charset,X-Accept,Content-Type
          Upgrade: h2,h2c
          Connection: Upgrade, close
          Transfer-Encoding: chunked
          Content-Type: application/json
          2022-08-05 07:32:56 UTC4INData Raw: 31 66 33 0d 0a 7b 22 69 70 22 3a 22 31 30 32 2e 31 32 39 2e 31 34 33 2e 33 22 2c 22 63 6f 75 6e 74 72 79 5f 63 6f 64 65 22 3a 22 43 48 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 53 77 69 74 7a 65 72 6c 61 6e 64 22 2c 22 63 6f 75 6e 74 72 79 5f 72 75 73 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 33 38 5c 75 30 34 34 66 22 2c 22 63 6f 75 6e 74 72 79 5f 75 61 22 3a 22 5c 75 30 34 32 38 5c 75 30 34 33 32 5c 75 30 34 33 35 5c 75 30 34 33 39 5c 75 30 34 34 36 5c 75 30 34 33 30 5c 75 30 34 34 30 5c 75 30 34 35 36 5c 75 30 34 34 66 22 2c 22 72 65 67 69 6f 6e 22 3a 22 5a 75 72 69 63 68 22 2c 22 72 65 67 69 6f 6e 5f 72 75 73 22 3a 22 5c 75 30 34 32 36 5c 75 30 34 34
          Data Ascii: 1f3{"ip":"102.129.143.3","country_code":"CH","country":"Switzerland","country_rus":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0438\u044f","country_ua":"\u0428\u0432\u0435\u0439\u0446\u0430\u0440\u0456\u044f","region":"Zurich","region_rus":"\u0426\u044


          Click to jump to process

          Target ID:0
          Start time:09:32:12
          Start date:05/08/2022
          Path:C:\Users\user\Desktop\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\0qlnWcmhSC.exe"
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.254903919.0000000004190000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000000.00000002.255350583.00000000042D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:1
          Start time:09:32:15
          Start date:05/08/2022
          Path:C:\Users\user\Desktop\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\0qlnWcmhSC.exe"
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000000.253006362.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000000.251005615.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000000.249683666.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000000.250322502.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000002.260647827.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000000.251612299.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000001.00000000.252249739.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:4
          Start time:09:32:22
          Start date:05/08/2022
          Path:C:\Windows\SysWOW64\icacls.exe
          Wow64 process (32bit):true
          Commandline:icacls "C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          Imagebase:0x8b0000
          File size:29696 bytes
          MD5 hash:FF0D1D4317A44C951240FAE75075D501
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          Target ID:5
          Start time:09:32:22
          Start date:05/08/2022
          Path:C:\Users\user\Desktop\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000005.00000002.282884669.00000000027ED000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000005.00000002.283839825.0000000004320000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:6
          Start time:09:32:23
          Start date:05/08/2022
          Path:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000006.00000002.327195774.00000000042C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000006.00000002.325796786.00000000041EE000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
          Antivirus matches:
          • Detection: 100%, Joe Sandbox ML
          • Detection: 54%, Virustotal, Browse
          • Detection: 56%, ReversingLabs
          Reputation:low

          Target ID:8
          Start time:09:32:27
          Start date:05/08/2022
          Path:C:\Users\user\Desktop\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\0qlnWcmhSC.exe" --Admin IsNotAutoStart IsNotTask
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000000.278663427.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000002.286929685.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000000.280029578.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000000.280526458.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000000.279453243.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000000.278990352.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000008.00000000.281073813.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:9
          Start time:09:32:34
          Start date:05/08/2022
          Path:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000009.00000002.304182399.00000000026DE000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000009.00000002.305843208.00000000042F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:10
          Start time:09:32:35
          Start date:05/08/2022
          Path:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe --Task
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000000.319421336.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000000.316973990.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000000.321324368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000000.320295591.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000002.329549593.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000000.322027544.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000A.00000000.314313575.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:13
          Start time:09:32:38
          Start date:05/08/2022
          Path:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000000.297339138.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000000.297986626.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000002.315111035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000000.301047779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000000.299793553.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000000.298661197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 0000000D.00000000.300393397.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:20
          Start time:09:32:42
          Start date:05/08/2022
          Path:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000014.00000002.327652394.00000000041F2000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000014.00000002.327894580.0000000004290000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Target ID:21
          Start time:09:32:49
          Start date:05/08/2022
          Path:C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\AppData\Local\a728bb78-6259-4af3-b6ac-e10b42e567f7\0qlnWcmhSC.exe" --AutoStart
          Imagebase:0x400000
          File size:747520 bytes
          MD5 hash:7D3324ABA9CB81871405761EA678C751
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000000.323385297.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000000.324597957.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000000.322747797.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000000.325090580.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000000.322244300.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000002.332044267.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
          • Rule: JoeSecurity_Djvu, Description: Yara detected Djvu Ransomware, Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: MALWARE_Win_STOP, Description: Detects STOP ransomware, Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
          • Rule: Windows_Ransomware_Stop_1e8d48ff, Description: unknown, Source: 00000015.00000000.324034251.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          No disassembly