Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
W445hIpF47.exe

Overview

General Information

Sample Name:W445hIpF47.exe
Analysis ID:694562
MD5:379af2536054073f63e7f45d80963bb4
SHA1:ca8717ffb9b80a979116ebbb676dfecd0ec73c8f
SHA256:15bfead5bee24b7c1d0104bb04e72bf5d735ee2a9416ba3ab43ecf296613b391
Tags:exe
Infos:

Detection

Gandcrab, ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected ReflectiveLoader
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Creates multiple autostart registry keys
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to determine the online IP of the system
Found Tor onion address
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Queries information about the installed CPU (vendor, model number etc)
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Contains functionality to enumerate device drivers
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • W445hIpF47.exe (PID: 4984 cmdline: "C:\Users\user\Desktop\W445hIpF47.exe" MD5: 379AF2536054073F63E7F45D80963BB4)
  • zrnips.exe (PID: 4940 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 4544 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 5896 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 5612 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 6132 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 5684 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 1792 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 4736 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 856 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 4888 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 5408 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • zrnips.exe (PID: 4724 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe" MD5: 9560C1D27C69870E70DD78A19C8FE473)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
W445hIpF47.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
  • 0xef92:$x1: ReflectiveLoader
W445hIpF47.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
  • 0xe8fe:$: DECRYPT.txt
  • 0xe964:$: DECRYPT.txt
W445hIpF47.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
    W445hIpF47.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
    • 0xef91:$s1: _ReflectiveLoader@
    • 0xef92:$s2: ReflectiveLoader@
    W445hIpF47.exeGandcrabGandcrab Payloadkevoreilly
    • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
    • 0xef92:$x1: ReflectiveLoader
    C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
    • 0xe8fe:$: DECRYPT.txt
    • 0xe964:$: DECRYPT.txt
    C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
      • 0xef91:$s1: _ReflectiveLoader@
      • 0xef92:$s2: ReflectiveLoader@
      C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeGandcrabGandcrab Payloadkevoreilly
      • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
        00000007.00000002.409239995.000000000FCDA000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
          00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_GandcrabYara detected GandcrabJoe Security
            00000014.00000000.533542900.000000000FCDA000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
              00000011.00000002.488096195.000000000FCDA000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                Click to see the 125 entries
                SourceRuleDescriptionAuthorStrings
                5.3.zrnips.exe.3960000.0.raw.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
                • 0xef92:$x1: ReflectiveLoader
                5.3.zrnips.exe.3960000.0.raw.unpackSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
                • 0xe8fe:$: DECRYPT.txt
                • 0xe964:$: DECRYPT.txt
                5.3.zrnips.exe.3960000.0.raw.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
                  5.3.zrnips.exe.3960000.0.raw.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
                  • 0xef91:$s1: _ReflectiveLoader@
                  • 0xef92:$s2: ReflectiveLoader@
                  5.3.zrnips.exe.3960000.0.raw.unpackGandcrabGandcrab Payloadkevoreilly
                  • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
                  Click to see the 294 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: W445hIpF47.exeMetadefender: Detection: 74%Perma Link
                  Source: W445hIpF47.exeReversingLabs: Detection: 96%
                  Source: W445hIpF47.exeAvira: detected
                  Source: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9Avira URL Cloud: Label: malware
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAvira: detection malicious, Label: TR/Dropper.Gen
                  Source: W445hIpF47.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeJoe Sandbox ML: detected
                  Source: 7.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 17.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 13.3.zrnips.exe.3240000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 5.3.zrnips.exe.3960000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 23.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 3.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 8.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 20.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 5.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 8.3.zrnips.exe.3ca0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 19.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 25.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 15.3.zrnips.exe.2f20000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 8.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 13.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 13.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 5.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 20.3.zrnips.exe.3d60000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 23.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 19.3.zrnips.exe.36c0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 12.3.zrnips.exe.3170000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 20.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 7.3.zrnips.exe.3990000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 3.3.zrnips.exe.34a0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 15.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 12.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 7.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 12.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 15.2.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 25.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 3.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 23.3.zrnips.exe.3a10000.0.unpackAvira: Label: TR/Patched.Ren.Gen
                  Source: 17.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: 19.0.zrnips.exe.fcd0000.0.unpackAvira: Label: TR/Dropper.Gen
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA63E0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA82B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA5860 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrcatW,lstrlenW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA8400 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA4B20 EntryPoint,Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA53D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA34F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA5670 VirtualAlloc,VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,VirtualAlloc,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD63E0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD82B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD5860 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrcatW,lstrlenW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD4B20 EntryPoint,Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD53D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD34F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD5670 VirtualAlloc,VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,VirtualAlloc,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD8400 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD63E0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD82B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD5860 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrcatW,lstrlenW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD4B20 EntryPoint,Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD53D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD34F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD5670 VirtualAlloc,VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,VirtualAlloc,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD8400 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: W445hIpF47.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: W445hIpF47.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: z:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: x:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: v:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: t:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: r:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: p:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: n:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: l:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: j:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: h:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: f:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: b:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: y:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: w:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: u:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: s:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: q:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: o:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: m:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: k:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: i:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: g:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: e:
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile opened: a:
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,

                  Networking

                  barindex
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
                  Source: W445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: C:\Users\user\Desktop\W445hIpF47.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\Desktop\W445hIpF47.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\Desktop\W445hIpF47.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\Desktop\W445hIpF47.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\Desktop\W445hIpF47.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: unknownDNS query: name: ipv4bot.whatismyipaddress.com
                  Source: W445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9
                  Source: zrnips.exe, 00000003.00000002.369371671.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 0000000D.00000002.462566765.0000000000C68000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 00000017.00000002.575488485.00000000011D4000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 00000017.00000002.575403448.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/
                  Source: zrnips.exe, 00000017.00000002.575403448.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/75
                  Source: W445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://tox.chat/download.html
                  Source: W445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.torproject.org/
                  Source: unknownDNS traffic detected: queries for: ipv4bot.whatismyipaddress.com
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA8050 lstrcatW,InternetCloseHandle,InternetConnectW,VirtualAlloc,wsprintfW,HttpOpenRequestW,HttpAddRequestHeadersW,HttpSendRequestW,InternetReadFile,InternetReadFile,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,VirtualFree,
                  Source: zrnips.exe, 00000003.00000002.369371671.0000000000D8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: Yara matchFile source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: W445hIpF47.exe PID: 4984, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4940, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4544, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5896, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 6132, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 1792, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 856, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5408, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,

                  System Summary

                  barindex
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: Gandcrab Payload Author: kevoreilly
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
                  Source: W445hIpF47.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: W445hIpF47.exe, type: SAMPLEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: Process Memory Space: zrnips.exe PID: 4940, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
                  Source: Process Memory Space: zrnips.exe PID: 5684, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
                  Source: Process Memory Space: zrnips.exe PID: 5408, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPEDMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA1C20
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA1020
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA8520
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD1C20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD1020
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD8520
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD1C20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD1020
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD8520
                  Source: W445hIpF47.exeMetadefender: Detection: 74%
                  Source: W445hIpF47.exeReversingLabs: Detection: 96%
                  Source: C:\Users\user\Desktop\W445hIpF47.exeFile read: C:\Users\user\Desktop\W445hIpF47.exeJump to behavior
                  Source: W445hIpF47.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\W445hIpF47.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\W445hIpF47.exe "C:\Users\user\Desktop\W445hIpF47.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                  Source: C:\Users\user\Desktop\W445hIpF47.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
                  Source: C:\Users\user\Desktop\W445hIpF47.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeJump to behavior
                  Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@13/1@12/0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA7490 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA48C0 CreateToolhelp32Snapshot,VirtualAlloc,Process32FirstW,CloseHandle,lstrcmpiW,OpenProcess,TerminateProcess,CloseHandle,CloseHandle,CloseHandle,Process32NextW,VirtualFree,FindCloseChangeNotification,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeMutant created: \Sessions\1\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=1cd33ea6922904b9
                  Source: C:\Users\user\Desktop\W445hIpF47.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\W445hIpF47.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeFile read: C:\Windows\System32\drivers\etc\hosts
                  Source: W445hIpF47.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: W445hIpF47.exe, type: SAMPLE
                  Source: Yara matchFile source: 5.3.zrnips.exe.3960000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.3.zrnips.exe.2f20000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.3.zrnips.exe.3a10000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.3.zrnips.exe.36c0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.3.W445hIpF47.exe.3750000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.3.zrnips.exe.3d60000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.3.zrnips.exe.36c0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.3.zrnips.exe.3170000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.3.zrnips.exe.3990000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.zrnips.exe.34a0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.W445hIpF47.exe.fda0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.3.zrnips.exe.3a10000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.3.zrnips.exe.3170000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.3.W445hIpF47.exe.3750000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.3.zrnips.exe.2f20000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.3.zrnips.exe.3990000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.3.zrnips.exe.3d60000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.3.zrnips.exe.3240000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.3.zrnips.exe.3960000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.3.zrnips.exe.3240000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.3.zrnips.exe.3ca0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 17.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 23.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.3.zrnips.exe.3ca0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.0.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.3.zrnips.exe.34a0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 25.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 19.2.zrnips.exe.fcd0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.409239995.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000000.533542900.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000002.488096195.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000017.00000002.576268980.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000000.503181846.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000017.00000000.551633083.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.573322590.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.425162740.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.447982065.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000013.00000002.522576271.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000000.449764265.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.369680264.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000000.355052836.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.316448392.000000000FDAA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000000.432379853.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000000.394503180.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000000.412718126.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.462959628.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.335764679.000000000FDAA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000000.373648417.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.547763801.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000000.568967780.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.490875423.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000011.00000000.485191831.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.385364580.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000000.467464358.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: W445hIpF47.exe PID: 4984, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4940, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4544, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5896, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5612, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 6132, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 1792, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4736, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 856, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4888, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 5408, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: zrnips.exe PID: 4724, type: MEMORYSTR
                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, type: DROPPED
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA82B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: W445hIpF47.exeStatic PE information: real checksum: 0x120f7 should be: 0x1d004
                  Source: zrnips.exe.1.drStatic PE information: real checksum: 0x120f7 should be: 0x182c1
                  Source: C:\Users\user\Desktop\W445hIpF47.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarmlJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhwJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fwyuhnnfppu
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzgJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce pufpoqlopxkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtktJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwoJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce psmkjgiilgz
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdagJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce gwocugdvyyiJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ldtrmpohtbyJump to behavior
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdagJump to behavior
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdagJump to behavior
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdagJump to behavior
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdagJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarmlJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarmlJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarmlJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarmlJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtktJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtktJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtktJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtktJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwoJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwoJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwoJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwoJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzgJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzgJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzgJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzgJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhwJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhwJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhwJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhwJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce pufpoqlopxkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce pufpoqlopxkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce pufpoqlopxkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce pufpoqlopxkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce gwocugdvyyiJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce gwocugdvyyiJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce gwocugdvyyiJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce gwocugdvyyiJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ldtrmpohtbyJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ldtrmpohtbyJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ldtrmpohtbyJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ldtrmpohtbyJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fwyuhnnfppu
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fwyuhnnfppu
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fwyuhnnfppu
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce fwyuhnnfppu
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce psmkjgiilgz
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce psmkjgiilgz
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce psmkjgiilgz
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce psmkjgiilgz
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                  Source: C:\Users\user\Desktop\W445hIpF47.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeSystem information queried: ModuleInformation
                  Source: C:\Users\user\Desktop\W445hIpF47.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\W445hIpF47.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\W445hIpF47.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\W445hIpF47.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\W445hIpF47.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeAPI call chain: ExitProcess graph end node
                  Source: zrnips.exe, 00000017.00000002.575403448.0000000001198000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                  Source: zrnips.exe, 00000003.00000002.369371671.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 0000000D.00000002.462566765.0000000000C68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA82B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA53D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA5FF0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 3_2_0FCD5FF0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeCode function: 5_2_0FCD5FF0 mov eax, dword ptr fs:[00000030h]
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA3C70 AllocateAndInitializeSid,GetModuleHandleA,GetProcAddress,FreeSid,
                  Source: C:\Users\user\Desktop\W445hIpF47.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\Desktop\W445hIpF47.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\Desktop\W445hIpF47.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA9200 cpuid
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                  Source: C:\Users\user\Desktop\W445hIpF47.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                  Source: C:\Users\user\Desktop\W445hIpF47.exeCode function: 1_2_0FDA7490 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  1
                  Replication Through Removable Media
                  11
                  Native API
                  11
                  Registry Run Keys / Startup Folder
                  1
                  Process Injection
                  1
                  Masquerading
                  1
                  Input Capture
                  1
                  Query Registry
                  1
                  Replication Through Removable Media
                  1
                  Input Capture
                  Exfiltration Over Other Network Medium2
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                  Data Encrypted for Impact
                  Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                  Registry Run Keys / Startup Folder
                  1
                  Process Injection
                  LSASS Memory11
                  Security Software Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                  Software Packing
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS11
                  Peripheral Device Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer1
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                  Account Discovery
                  SSHKeyloggingData Transfer Size Limits1
                  Proxy
                  Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
                  System Owner/User Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                  Remote System Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                  System Network Configuration Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                  System Network Connections Discovery
                  Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                  File and Directory Discovery
                  Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput Capture44
                  System Information Discovery
                  Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  W445hIpF47.exe74%MetadefenderBrowse
                  W445hIpF47.exe97%ReversingLabsWin32.Ransomware.GandCrab
                  W445hIpF47.exe100%AviraTR/Dropper.Gen
                  W445hIpF47.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe100%AviraTR/Dropper.Gen
                  C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLinkDownload
                  7.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  17.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  1.0.W445hIpF47.exe.fda0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  13.3.zrnips.exe.3240000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  5.3.zrnips.exe.3960000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  23.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  3.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  8.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  20.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  5.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  8.3.zrnips.exe.3ca0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  19.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  25.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  1.3.W445hIpF47.exe.3750000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  15.3.zrnips.exe.2f20000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  8.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  13.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  13.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  5.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  20.3.zrnips.exe.3d60000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  23.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  19.3.zrnips.exe.36c0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  12.3.zrnips.exe.3170000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  20.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  7.3.zrnips.exe.3990000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  3.3.zrnips.exe.34a0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  15.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  12.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  7.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  12.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  15.2.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  25.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  1.2.W445hIpF47.exe.fda0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  3.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  23.3.zrnips.exe.3a10000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                  17.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  19.0.zrnips.exe.fcd0000.0.unpack100%AviraTR/Dropper.GenDownload File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9100%Avira URL Cloudmalware
                  https://tox.chat/download.html0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ipv4bot.whatismyipaddress.com
                  unknown
                  unknownfalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://gdcbmuveqjsli57x.onion/1cd33ea6922904b9W445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://www.torproject.org/W445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpfalse
                      high
                      http://ipv4bot.whatismyipaddress.com/zrnips.exe, 00000003.00000002.369371671.0000000000D8A000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 0000000D.00000002.462566765.0000000000C68000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 00000017.00000002.575488485.00000000011D4000.00000004.00000020.00020000.00000000.sdmp, zrnips.exe, 00000017.00000002.575403448.0000000001198000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://ipv4bot.whatismyipaddress.com/75zrnips.exe, 00000017.00000002.575403448.0000000001198000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://tox.chat/download.htmlW445hIpF47.exe, 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, zrnips.exe, 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, zrnips.exe, 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          No contacted IP infos
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:694562
                          Start date and time:2022-08-31 23:52:14 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 13s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:W445hIpF47.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:26
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.rans.troj.evad.winEXE@13/1@12/0
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 99% (good quality ratio 95.1%)
                          • Quality average: 83.3%
                          • Quality standard deviation: 24.3%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.82.228.9
                          • Excluded domains from analysis (whitelisted): rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, neus2c-displaycatalog.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: W445hIpF47.exe
                          TimeTypeDescription
                          23:53:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdag "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:53:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce oikgjamwdag "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:53:41AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarml "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:53:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtkt "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:53:59AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwo "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:54:07AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzg "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:54:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhw "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:54:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce pufpoqlopxk "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:54:33AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce gwocugdvyyi "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:54:46AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce vlujgxdarml "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:54:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce icyakbwwtkt "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:55:03AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce vcvvgrlytwo "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:55:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce fnwitigtrzg "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          23:55:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce jxyyakggfhw "C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\W445hIpF47.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):71680
                          Entropy (8bit):6.490137598305917
                          Encrypted:false
                          SSDEEP:1536:wZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:/d5BJHMqqDL2/Ovvdr
                          MD5:9560C1D27C69870E70DD78A19C8FE473
                          SHA1:6ECB41C48046973381461995BC35D590668AAF3A
                          SHA-256:FEEEAA9486096A2ECCC13C646D7FA7125D1FD7AFA7F66617037740E02BF3FAAB
                          SHA-512:F4AA1DA9C32F290FB9C39831B1E8065168CF3EDFAE8A9D72D1C5BA752B80825CFC2B6B3D7A4487123756BE87E1D112BEB624B314EF2B1F2B626C2DFC8294C6DB
                          Malicious:true
                          Yara Hits:
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: ReversingLabs
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This V.4.(.m cannot be run in DOS mode....$....................}.....B.....B...........1.......Y...G.....~.....y.....|....Rich...................PE..L....6.Z............................ K.......................................Z....... ....@.........................P...U............@.......................P.......................................................................................text...H........................... ..`.rdata..&q.......r..................@..@.data........ ......................@....CRT.........0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.490113861759907
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:W445hIpF47.exe
                          File size:71680
                          MD5:379af2536054073f63e7f45d80963bb4
                          SHA1:ca8717ffb9b80a979116ebbb676dfecd0ec73c8f
                          SHA256:15bfead5bee24b7c1d0104bb04e72bf5d735ee2a9416ba3ab43ecf296613b391
                          SHA512:3046e5907f882ce472d95ac46368fc3c1243ff15fd175c32a20600ce0890225b662003a921ccc2b79bb312c3c51b48fcbdf708cca85dd9374af27fdb20412e74
                          SSDEEP:1536:XZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:+d5BJHMqqDL2/Ovvdr
                          TLSH:86636C1DB2D1B293F1E396B9FAB57E25445D2D103B056BEB08A369F568220F16C3B703
                          File Content Preview:MZ......................@...............................................!..L.!This {v..p.m cannot be run in DOS mode....$.........................}.......B.......B...............1.........Y.....G.......~.......y.......|.....Rich....................PE..L..
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x10004b20
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x10000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                          Time Stamp:0x5A9C3687 [Sun Mar 4 18:10:15 2018 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:8735e6cad23590d9b5b60978db488a28
                          Instruction
                          push ebp
                          mov ebp, esp
                          sub esp, 4Ch
                          push 000003E8h
                          call dword ptr [1000A098h]
                          call 00007FCA14E9017Fh
                          test eax, eax
                          je 00007FCA14E904EAh
                          push 00000000h
                          call dword ptr [1000A168h]
                          push 00000000h
                          push 00000000h
                          push 00000000h
                          push 10002D30h
                          push 00000000h
                          push 00000000h
                          call dword ptr [1000A108h]
                          mov dword ptr [ebp-04h], eax
                          cmp dword ptr [ebp-04h], 00000000h
                          je 00007FCA14E9050Eh
                          push 00001388h
                          mov eax, dword ptr [ebp-04h]
                          push eax
                          call dword ptr [1000A080h]
                          cmp eax, 00000102h
                          jne 00007FCA14E904EEh
                          push 00000000h
                          mov ecx, dword ptr [ebp-04h]
                          push ecx
                          call dword ptr [1000A094h]
                          mov edx, dword ptr [ebp-04h]
                          push edx
                          call dword ptr [1000A10Ch]
                          call 00007FCA14E90214h
                          call 00007FCA14E8FBFFh
                          lea ecx, dword ptr [ebp-4Ch]
                          call 00007FCA14E91E97h
                          mov dword ptr [ebp-24h], 00000000h
                          mov dword ptr [ebp-20h], 00000000h
                          mov dword ptr [ebp-18h], 00000000h
                          mov dword ptr [ebp-28h], 00000000h
                          lea eax, dword ptr [ebp-20h]
                          push eax
                          lea ecx, dword ptr [ebp-24h]
                          push ecx
                          lea edx, dword ptr [ebp-28h]
                          push edx
                          lea eax, dword ptr [ebp-18h]
                          push eax
                          lea ecx, dword ptr [ebp-4Ch]
                          call 00007FCA14E91E13h
                          mov dword ptr [ebp-2Ch], 00000000h
                          mov dword ptr [ebp-0Ch], 00000000h
                          mov ecx, dword ptr [ebp-18h]
                          call 00007FCA14E903FDh
                          Programming Language:
                          • [ C ] VS2013 build 21005
                          • [IMP] VS2008 SP1 build 30729
                          • [EXP] VS2013 build 21005
                          • [RES] VS2013 build 21005
                          • [LNK] VS2013 build 21005
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x105500x55.rdata
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x105a80xb4.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x1e0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x150000xaf4.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xa0000x200.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x84480x8600False0.4546991604477612data6.32052618210059IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0xa0000x71260x7200False0.47765899122807015data6.1644872822657275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x120000xa840xc00False0.3056640625data3.538638851099626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .CRT0x130000x40x200False0.033203125data0.04078075625387198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0x140000x1e00x200False0.52734375data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x150000xaf40xc00False0.7932942708333334data6.537931848954439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_MANIFEST0x140600x17dXML 1.0 document textEnglishUnited States
                          DLLImport
                          KERNEL32.dllReadFile, SetFilePointer, GetFileAttributesW, GetLastError, MoveFileW, lstrcpyW, SetFileAttributesW, CreateMutexW, GetDriveTypeW, VerSetConditionMask, WaitForSingleObject, GetTickCount, InitializeCriticalSection, OpenProcess, GetSystemDirectoryW, TerminateThread, Sleep, TerminateProcess, VerifyVersionInfoW, WaitForMultipleObjects, DeleteCriticalSection, ExpandEnvironmentStringsW, lstrlenW, SetHandleInformation, lstrcatA, MultiByteToWideChar, CreatePipe, lstrcmpiA, Process32NextW, CreateToolhelp32Snapshot, LeaveCriticalSection, EnterCriticalSection, FindFirstFileW, lstrcmpW, FindClose, FindNextFileW, GetNativeSystemInfo, GetComputerNameW, GetDiskFreeSpaceW, GetWindowsDirectoryW, GetVolumeInformationW, LoadLibraryA, lstrcmpiW, VirtualFree, CreateThread, CloseHandle, lstrcatW, CreateFileMappingW, ExitThread, CreateFileW, GetModuleFileNameW, WriteFile, GetModuleHandleW, UnmapViewOfFile, MapViewOfFile, GetFileSize, GetEnvironmentVariableW, lstrcpyA, GetModuleHandleA, VirtualAlloc, GetProcAddress, Process32FirstW, GetTempPathW, GetProcessHeap, HeapFree, HeapAlloc, lstrlenA, CreateProcessW, ExitProcess, IsProcessorFeaturePresent
                          USER32.dllBeginPaint, wsprintfW, TranslateMessage, LoadCursorW, LoadIconW, MessageBoxA, GetMessageW, EndPaint, DestroyWindow, RegisterClassExW, ShowWindow, CreateWindowExW, SendMessageW, DispatchMessageW, DefWindowProcW, UpdateWindow, wsprintfA, GetForegroundWindow, SetWindowLongW
                          GDI32.dllTextOutW
                          ADVAPI32.dllFreeSid, RegSetValueExW, RegCreateKeyExW, RegCloseKey, CryptExportKey, CryptAcquireContextW, CryptGetKeyParam, CryptReleaseContext, CryptImportKey, CryptEncrypt, CryptGenKey, CryptDestroyKey, GetUserNameW, RegQueryValueExW, RegOpenKeyExW, AllocateAndInitializeSid
                          SHELL32.dllShellExecuteW, SHGetSpecialFolderPathW, ShellExecuteExW
                          CRYPT32.dllCryptStringToBinaryA, CryptBinaryToStringA
                          WININET.dllInternetCloseHandle, HttpAddRequestHeadersW, HttpSendRequestW, InternetConnectW, HttpOpenRequestW, InternetOpenW, InternetReadFile
                          PSAPI.DLLEnumDeviceDrivers, GetDeviceDriverBaseNameW
                          NameOrdinalAddress
                          _ReflectiveLoader@010x10005ff0
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Aug 31, 2022 23:53:23.396292925 CEST5680753192.168.2.48.8.8.8
                          Aug 31, 2022 23:53:23.415654898 CEST53568078.8.8.8192.168.2.4
                          Aug 31, 2022 23:53:39.384253025 CEST6100753192.168.2.48.8.8.8
                          Aug 31, 2022 23:53:39.404722929 CEST53610078.8.8.8192.168.2.4
                          Aug 31, 2022 23:53:46.596919060 CEST6112453192.168.2.48.8.8.8
                          Aug 31, 2022 23:53:46.616827965 CEST53611248.8.8.8192.168.2.4
                          Aug 31, 2022 23:53:57.822163105 CEST5944453192.168.2.48.8.8.8
                          Aug 31, 2022 23:53:57.841733932 CEST53594448.8.8.8192.168.2.4
                          Aug 31, 2022 23:54:05.162791014 CEST5944653192.168.2.48.8.8.8
                          Aug 31, 2022 23:54:05.180521011 CEST53594468.8.8.8192.168.2.4
                          Aug 31, 2022 23:54:15.519988060 CEST6108853192.168.2.48.8.8.8
                          Aug 31, 2022 23:54:15.537431955 CEST53610888.8.8.8192.168.2.4
                          Aug 31, 2022 23:54:22.834369898 CEST5872953192.168.2.48.8.8.8
                          Aug 31, 2022 23:54:22.852421045 CEST53587298.8.8.8192.168.2.4
                          Aug 31, 2022 23:54:35.832240105 CEST6470053192.168.2.48.8.8.8
                          Aug 31, 2022 23:54:35.849760056 CEST53647008.8.8.8192.168.2.4
                          Aug 31, 2022 23:54:50.327919006 CEST5602253192.168.2.48.8.8.8
                          Aug 31, 2022 23:54:50.345698118 CEST53560228.8.8.8192.168.2.4
                          Aug 31, 2022 23:55:02.226505995 CEST6082253192.168.2.48.8.8.8
                          Aug 31, 2022 23:55:02.256041050 CEST53608228.8.8.8192.168.2.4
                          Aug 31, 2022 23:55:15.291393042 CEST4975053192.168.2.48.8.8.8
                          Aug 31, 2022 23:55:15.310765982 CEST53497508.8.8.8192.168.2.4
                          Aug 31, 2022 23:55:23.649331093 CEST5105453192.168.2.48.8.8.8
                          Aug 31, 2022 23:55:23.666527033 CEST53510548.8.8.8192.168.2.4
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Aug 31, 2022 23:53:23.396292925 CEST192.168.2.48.8.8.80x3a9bStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:53:39.384253025 CEST192.168.2.48.8.8.80x9d16Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:53:46.596919060 CEST192.168.2.48.8.8.80xc9d3Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:53:57.822163105 CEST192.168.2.48.8.8.80xc391Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:54:05.162791014 CEST192.168.2.48.8.8.80x1496Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:54:15.519988060 CEST192.168.2.48.8.8.80xc381Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:54:22.834369898 CEST192.168.2.48.8.8.80x3aeStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:54:35.832240105 CEST192.168.2.48.8.8.80x2d2Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:54:50.327919006 CEST192.168.2.48.8.8.80xfbe8Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:55:02.226505995 CEST192.168.2.48.8.8.80x70e7Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:55:15.291393042 CEST192.168.2.48.8.8.80x7f1Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                          Aug 31, 2022 23:55:23.649331093 CEST192.168.2.48.8.8.80x765aStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)

                          Click to jump to process

                          Target ID:1
                          Start time:23:53:14
                          Start date:31/08/2022
                          Path:C:\Users\user\Desktop\W445hIpF47.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\W445hIpF47.exe"
                          Imagebase:0xfda0000
                          File size:71680 bytes
                          MD5 hash:379AF2536054073F63E7F45D80963BB4
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000001.00000002.335771276.000000000FDB2000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000000.316448392.000000000FDAA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000001.00000003.334801749.0000000003750000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000001.00000002.335764679.000000000FDAA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:3
                          Start time:23:53:30
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000003.00000002.369680264.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000003.00000000.355052836.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000003.00000002.369749852.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000003.00000003.369063842.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe, Author: ReversingLabs
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          Reputation:low

                          Target ID:5
                          Start time:23:53:41
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000005.00000002.385384409.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000005.00000003.384531740.0000000003960000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000005.00000000.373648417.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000005.00000002.385364580.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:7
                          Start time:23:53:50
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000007.00000002.409239995.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000007.00000003.408576390.0000000003990000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000007.00000002.409249887.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000007.00000000.394503180.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:8
                          Start time:23:53:59
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000002.425162740.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000008.00000003.424307564.0000000003CA0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000000.412718126.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000008.00000002.425172336.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:12
                          Start time:23:54:07
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000C.00000002.447982065.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000C.00000002.447997228.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000C.00000000.432379853.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000000C.00000003.446505391.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          Reputation:low

                          Target ID:13
                          Start time:23:54:16
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000D.00000002.462969629.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000D.00000000.449764265.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000000D.00000003.462209860.0000000003240000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000D.00000002.462959628.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:15
                          Start time:23:54:24
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000002.490875423.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000000F.00000003.490038612.0000000002F20000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000F.00000002.490894450.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000000.467464358.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:17
                          Start time:23:54:33
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000011.00000002.488096195.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000011.00000000.485191831.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:19
                          Start time:23:54:41
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000013.00000003.521241668.00000000036C0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000013.00000000.503181846.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000013.00000002.522593346.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000013.00000002.522576271.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:20
                          Start time:23:54:55
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000014.00000000.533542900.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000014.00000003.546628326.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000014.00000002.547763801.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000014.00000002.547774907.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:23
                          Start time:23:55:03
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000017.00000002.576268980.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000017.00000000.551633083.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000017.00000003.574625963.0000000003A10000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000017.00000002.576290248.000000000FCE2000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:25
                          Start time:23:55:12
                          Start date:31/08/2022
                          Path:C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\zrnips.exe"
                          Imagebase:0xfcd0000
                          File size:71680 bytes
                          MD5 hash:9560C1D27C69870E70DD78A19C8FE473
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000002.573322590.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000000.568967780.000000000FCDA000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                          Reputation:low

                          No disassembly