Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wThN5MTIsw.exe

Overview

General Information

Sample Name:wThN5MTIsw.exe
Analysis ID:694565
MD5:1813521f3884de8427728b54b5c9a391
SHA1:874f4efd9b2ba64fa3bcb6ae87b116bd526b85c3
SHA256:4e705159b6c3a72b2b160486b9d582f05e34cd89a767428ef47ff6562b39619e
Tags:exeGandCrab
Infos:

Detection

Gandcrab, ReflectiveLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Gandcrab
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected ReflectiveLoader
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Creates multiple autostart registry keys
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to determine the online IP of the system
Found Tor onion address
Machine Learning detection for sample
May check the online IP address of the machine
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Queries information about the installed CPU (vendor, model number etc)
PE file contains an invalid checksum
Drops PE files
Contains functionality to read the PEB
Contains functionality to enumerate device drivers
Checks for available system drives (often done to infect USB drives)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • wThN5MTIsw.exe (PID: 6388 cmdline: "C:\Users\user\Desktop\wThN5MTIsw.exe" MD5: 1813521F3884DE8427728B54B5C9A391)
  • ssapst.exe (PID: 6592 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 6840 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 7028 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 5668 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 6104 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 4292 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 1416 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 3588 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 3248 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 6228 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 5016 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 7020 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 7108 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 204 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 4804 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 5952 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 1784 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 5076 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 5700 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • ssapst.exe (PID: 972 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe" MD5: C99BAB5FEA91C0938D1D5B6684158B24)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
wThN5MTIsw.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
  • 0xef92:$x1: ReflectiveLoader
wThN5MTIsw.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
  • 0xe8fe:$: DECRYPT.txt
  • 0xe964:$: DECRYPT.txt
wThN5MTIsw.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
    wThN5MTIsw.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
    • 0xef91:$s1: _ReflectiveLoader@
    • 0xef92:$s2: ReflectiveLoader@
    wThN5MTIsw.exeGandcrabGandcrab Payloadkevoreilly
    • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
    • 0xef92:$x1: ReflectiveLoader
    C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
    • 0xe8fe:$: DECRYPT.txt
    • 0xe964:$: DECRYPT.txt
    C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
      C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
      • 0xef91:$s1: _ReflectiveLoader@
      • 0xef92:$s2: ReflectiveLoader@
      C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeGandcrabGandcrab Payloadkevoreilly
      • 0xe5c8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.335673365.000000000F4EA000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
        00000008.00000002.421043250.000000000FE6A000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
          00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmpReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
          • 0xef92:$x1: ReflectiveLoader
          00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmpSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
          • 0xe8fe:$: DECRYPT.txt
          • 0xe964:$: DECRYPT.txt
          00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
            Click to see the 199 entries
            SourceRuleDescriptionAuthorStrings
            34.3.ssapst.exe.32a0000.0.unpackReflectiveLoaderDetects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommendedFlorian Roth
            • 0xd992:$x1: ReflectiveLoader
            34.3.ssapst.exe.32a0000.0.unpackSUSP_RANSOMWARE_Indicator_Jul20Detects ransomware indicatorFlorian Roth
            • 0xd2fe:$: DECRYPT.txt
            • 0xd364:$: DECRYPT.txt
            34.3.ssapst.exe.32a0000.0.unpackJoeSecurity_ReflectiveLoaderYara detected ReflectiveLoaderJoe Security
              34.3.ssapst.exe.32a0000.0.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
              • 0xd991:$s1: _ReflectiveLoader@
              • 0xd992:$s2: ReflectiveLoader@
              34.3.ssapst.exe.32a0000.0.unpackGandcrabGandcrab Payloadkevoreilly
              • 0xcfc8:$string3: action=result&e_files=%d&e_size=%I64u&e_time=%d&
              Click to see the 468 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: wThN5MTIsw.exeVirustotal: Detection: 90%Perma Link
              Source: wThN5MTIsw.exeReversingLabs: Detection: 93%
              Source: wThN5MTIsw.exeAvira: detected
              Source: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08fAvira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAvira: detection malicious, Label: TR/Dropper.Gen
              Source: wThN5MTIsw.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeJoe Sandbox ML: detected
              Source: 34.3.ssapst.exe.32a0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 18.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 32.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 6.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 24.3.ssapst.exe.3b60000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 31.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 24.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 19.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 6.3.ssapst.exe.2f70000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 35.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 12.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 19.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 30.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 8.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 26.3.ssapst.exe.3830000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 12.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 25.3.ssapst.exe.36d0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 15.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 15.3.ssapst.exe.3300000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 35.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 12.3.ssapst.exe.3730000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 33.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 17.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 18.3.ssapst.exe.3230000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 8.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 22.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 24.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 14.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 19.3.ssapst.exe.3520000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 25.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 17.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 8.3.ssapst.exe.30f0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 22.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 4.3.ssapst.exe.38c0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 30.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 14.3.ssapst.exe.3730000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 34.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 14.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 25.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 30.3.ssapst.exe.2fc0000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 33.3.ssapst.exe.3d30000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 2.3.ssapst.exe.3640000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 2.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 33.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 34.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 4.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 4.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 31.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 15.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 26.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 2.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 32.3.ssapst.exe.3790000.0.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 6.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 26.2.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 32.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 18.0.ssapst.exe.fe60000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E5860 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrcatW,lstrlenW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E8400 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E4B20 EntryPoint,Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E63E0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E82B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E5670 VirtualAlloc,VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,VirtualAlloc,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E53D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E34F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE663E0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE682B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE65860 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrcatW,lstrlenW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE64B20 EntryPoint,Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE634F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE653D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE65670 VirtualAlloc,VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,VirtualAlloc,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE68400 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE663E0 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptReleaseContext,CryptAcquireContextW,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE682B0 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE65860 VirtualAlloc,VirtualFree,CryptBinaryToStringA,CryptBinaryToStringA,CryptBinaryToStringA,lstrlenA,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrcatW,lstrcatW,lstrlenW,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcatW,VirtualFree,VirtualFree,VirtualFree,lstrcatW,lstrlenW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenA,MultiByteToWideChar,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,lstrlenW,CryptBinaryToStringA,GetLastError,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,lstrlenA,MultiByteToWideChar,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE64B20 EntryPoint,Sleep,ExitProcess,CreateThread,WaitForSingleObject,TerminateThread,CloseHandle,VirtualAlloc,GetModuleFileNameW,VirtualFree,ExitProcess,Sleep,lstrlenA,VirtualAlloc,CryptStringToBinaryA,ExitProcess,InitializeCriticalSection,DeleteCriticalSection,VirtualAlloc,GetModuleFileNameW,VirtualFree,ShellExecuteW,ExitThread,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE634F0 lstrlenA,VirtualAlloc,VirtualAlloc,CryptStringToBinaryA,VirtualAlloc,VirtualAlloc,wsprintfW,wsprintfW,wsprintfW,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE653D0 lstrlenA,VirtualAlloc,CryptStringToBinaryA,lstrlenA,VirtualAlloc,lstrcpyA,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,VirtualFree,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,VirtualAlloc,VirtualAlloc,lstrcatA,lstrlenA,lstrlenW,lstrlenA,VirtualFree,VirtualFree,VirtualFree,VirtualFree,InternetCloseHandle,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE65670 VirtualAlloc,VirtualAlloc,wsprintfW,lstrlenW,lstrlenW,VirtualFree,lstrlenW,VirtualAlloc,wsprintfA,VirtualAlloc,CryptBinaryToStringA,GetLastError,lstrlenA,lstrlenA,VirtualAlloc,lstrlenA,lstrlenA,lstrlenA,VirtualFree,VirtualFree,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE68400 CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: wThN5MTIsw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: wThN5MTIsw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: z:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: x:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: v:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: t:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: r:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: p:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: n:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: l:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: j:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: h:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: f:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: b:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: y:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: w:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: u:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: s:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: q:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: o:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: m:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: k:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: i:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: g:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: e:
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile opened: a:
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,

              Networking

              barindex
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66FF0 VirtualAlloc,VirtualAlloc,lstrlenW,lstrlenA,wsprintfW,VirtualFree,InternetCloseHandle, ipv4bot.whatismyipaddress.com
              Source: wThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: 4. Open link in tor browser: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeDNS query: name: ipv4bot.whatismyipaddress.com
              Source: wThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f
              Source: ssapst.exe, 00000019.00000003.601906375.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/
              Source: ssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/&
              Source: ssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/)
              Source: wThN5MTIsw.exe, 00000000.00000002.335452470.00000000008D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/2
              Source: ssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000019.00000002.605561331.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/5
              Source: ssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/G%b
              Source: ssapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/I
              Source: ssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/I;
              Source: ssapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/QL
              Source: ssapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/S
              Source: ssapst.exe, 00000019.00000002.607798154.0000000000F31000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000019.00000003.601906375.0000000000F31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/g
              Source: ssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ipv4bot.whatismyipaddress.com/x
              Source: wThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://tox.chat/download.html
              Source: wThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://www.torproject.org/
              Source: unknownDNS traffic detected: queries for: ipv4bot.whatismyipaddress.com
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E8050 lstrcatW,InternetCloseHandle,InternetConnectW,VirtualAlloc,wsprintfW,HttpOpenRequestW,HttpAddRequestHeadersW,HttpSendRequestW,InternetReadFile,InternetReadFile,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,VirtualFree,
              Source: wThN5MTIsw.exe, 00000000.00000002.335360112.00000000008BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wThN5MTIsw.exe PID: 6388, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6592, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6840, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 7028, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5668, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 4292, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 1416, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 3248, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6228, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 7020, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 7108, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 204, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 4804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 1784, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5076, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5700, type: MEMORYSTR
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66660 EnterCriticalSection,CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptImportKey,CryptGetKeyParam,CryptEncrypt,GetLastError,CryptReleaseContext,LeaveCriticalSection,

              System Summary

              barindex
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab Payload Author: kevoreilly
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: Gandcrab Payload Author: kevoreilly
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: Win32_Ransomware_GandCrab Author: ReversingLabs
              Source: wThN5MTIsw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: wThN5MTIsw.exe, type: SAMPLEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPEMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: Process Memory Space: wThN5MTIsw.exe PID: 6388, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
              Source: Process Memory Space: ssapst.exe PID: 6592, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
              Source: Process Memory Space: ssapst.exe PID: 6228, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
              Source: Process Memory Space: ssapst.exe PID: 7020, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
              Source: Process Memory Space: ssapst.exe PID: 7108, type: MEMORYSTRMatched rule: HKTL_Meterpreter_inMemory date = 2020-06-29, author = netbiosX, Florian Roth, description = Detects Meterpreter in-memory, score = , reference = https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: ReflectiveLoader author = Florian Roth, description = Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, nodeepdive = , score = 2017-07-17, reference = Internal Research, modified = 2021-03-15
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: SUSP_RANSOMWARE_Indicator_Jul20 date = 2020-07-28, hash3 = 6cb9afff8166976bd62bb29b12ed617784d6e74b110afcf8955477573594f306, hash2 = 5e78475d10418c6938723f6cfefb89d5e9de61e45ecf374bb435c1c99dd4a473, author = Florian Roth, description = Detects ransomware indicator, score = 52888b5f881f4941ae7a8f4d84de27fc502413861f96ee58ee560c09c11880d6, reference = https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: Gandcrab author = kevoreilly, description = Gandcrab Payload, cape_type = Gandcrab Payload
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPEDMatched rule: Win32_Ransomware_GandCrab tc_detection_name = GandCrab, tc_detection_factor = , author = ReversingLabs, tc_detection_type = Ransomware
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E1C20
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E1020
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E8520
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE61C20
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE61020
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE68520
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE61C20
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE61020
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE68520
              Source: wThN5MTIsw.exeVirustotal: Detection: 90%
              Source: wThN5MTIsw.exeReversingLabs: Detection: 93%
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeFile read: C:\Users\user\Desktop\wThN5MTIsw.exeJump to behavior
              Source: wThN5MTIsw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\wThN5MTIsw.exe "C:\Users\user\Desktop\wThN5MTIsw.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeJump to behavior
              Source: classification engineClassification label: mal100.rans.troj.evad.winEXE@21/1@17/0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E7490 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E7B70 wsprintfW,VirtualAlloc,VirtualAlloc,VirtualAlloc,VirtualAlloc,CreateToolhelp32Snapshot,VirtualFree,Process32FirstW,lstrcmpiW,lstrcpyW,lstrcatW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,Process32NextW,GetLastError,lstrlenW,VirtualFree,VirtualFree,FindCloseChangeNotification,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeMutant created: \Sessions\1\BaseNamedObjects\Global\pc_group=WORKGROUP&ransom_id=cec3c1ad6b0ea08f
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeFile read: C:\Windows\System32\drivers\etc\hosts
              Source: wThN5MTIsw.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH

              Data Obfuscation

              barindex
              Source: Yara matchFile source: wThN5MTIsw.exe, type: SAMPLE
              Source: Yara matchFile source: 34.3.ssapst.exe.32a0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 32.3.ssapst.exe.3790000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.wThN5MTIsw.exe.3170000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 35.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.3.ssapst.exe.3520000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 30.3.ssapst.exe.2fc0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 25.3.ssapst.exe.36d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.3.ssapst.exe.2f70000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 25.3.ssapst.exe.36d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 32.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.wThN5MTIsw.exe.3170000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.3.ssapst.exe.3b60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.ssapst.exe.3830000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 30.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 34.3.ssapst.exe.32a0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 35.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.3.ssapst.exe.3230000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.3.ssapst.exe.3300000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.3.ssapst.exe.3b60000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.3.ssapst.exe.3230000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.3.ssapst.exe.3300000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 22.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 24.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.3.ssapst.exe.3520000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 25.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 17.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.ssapst.exe.38c0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 30.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 22.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.ssapst.exe.30f0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.ssapst.exe.3640000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.3.ssapst.exe.3730000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.3.ssapst.exe.3830000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.3.ssapst.exe.30f0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 34.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 33.3.ssapst.exe.3d30000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.3.ssapst.exe.38c0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 31.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 25.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 30.3.ssapst.exe.2fc0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.3.ssapst.exe.2f70000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 33.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 33.3.ssapst.exe.3d30000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 12.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.3.ssapst.exe.3640000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 15.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 14.3.ssapst.exe.3730000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 31.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 33.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 32.3.ssapst.exe.3790000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 32.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 18.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 26.2.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 34.0.ssapst.exe.fe60000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.wThN5MTIsw.exe.f4e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.335673365.000000000F4EA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.421043250.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000023.00000000.730367046.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.406382399.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000022.00000002.734717569.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.370323598.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000000.391649222.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000016.00000000.548829843.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000000.570376945.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000000.588245655.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000002.585796532.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000000.444554151.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.383041261.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000002.628240997.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000002.485778645.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.354396039.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.556440908.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000000.408927489.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000000.373713609.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000002.485870462.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000000.531056963.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000022.00000000.705195952.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000011.00000000.482554766.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000000.500809556.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000000.462423463.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000021.00000000.688032587.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001F.00000000.648211037.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000023.00000002.734163456.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000016.00000002.553896559.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000020.00000002.681984770.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000000.426845599.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000020.00000000.666637056.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001E.00000000.626543672.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000021.00000002.703345921.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.445271222.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001E.00000002.654935793.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.321170731.000000000F4EA000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001A.00000000.608029027.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000002.608744037.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000002.520951774.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000E.00000002.457728648.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000001F.00000002.651985737.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wThN5MTIsw.exe PID: 6388, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6592, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6840, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 7028, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5668, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6104, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 4292, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 1416, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 3588, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 3248, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 6228, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5016, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 7020, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 7108, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 204, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 4804, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 1784, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5076, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 5700, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: ssapst.exe PID: 972, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, type: DROPPED
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E8400 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: wThN5MTIsw.exeStatic PE information: real checksum: 0x120f7 should be: 0x1d03b
              Source: ssapst.exe.0.drStatic PE information: real checksum: 0x120f7 should be: 0x1dfa7
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce drhgskcsetb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkgJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutrJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuhJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpewJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxukJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce tzknppvrole
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wwezwkhgyew
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jqnamhtcavd
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oprgxbvjexb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittakJump to behavior
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaibJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlllmsigvhf
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpqJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce xiyxqoiwizj
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaibJump to behavior
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaibJump to behavior
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaibJump to behavior
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaibJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittakJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittakJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittakJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittakJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrsJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkgJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkgJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkgJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkgJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpqJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpqJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpqJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpqJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpewJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpewJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpewJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpewJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxukJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxukJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxukJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxukJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutrJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutrJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutrJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutrJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuhJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuhJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuhJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuhJump to behavior
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oprgxbvjexb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oprgxbvjexb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oprgxbvjexb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce oprgxbvjexb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlllmsigvhf
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlllmsigvhf
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlllmsigvhf
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce vlllmsigvhf
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce drhgskcsetb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce drhgskcsetb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce drhgskcsetb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce drhgskcsetb
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wwezwkhgyew
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wwezwkhgyew
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wwezwkhgyew
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce wwezwkhgyew
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce tzknppvrole
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce tzknppvrole
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce tzknppvrole
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce tzknppvrole
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jqnamhtcavd
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jqnamhtcavd
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jqnamhtcavd
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce jqnamhtcavd
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce xiyxqoiwizj
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce xiyxqoiwizj
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce xiyxqoiwizj
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce xiyxqoiwizj

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcess
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: EnumDeviceDrivers,K32EnumDeviceDrivers,VirtualAlloc,K32EnumDeviceDrivers,K32GetDeviceDriverBaseNameW,lstrcmpiW,VirtualFree,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E6BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE66BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66DF0 lstrlenW,lstrcatW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,FindNextFileW,FindClose,
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE66BA0 lstrlenW,lstrcatW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcatW,lstrlenW,lstrcmpW,CreateFileW,GetFileSize,VirtualAlloc,ReadFile,lstrlenA,VirtualFree,CloseHandle,lstrcmpW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeSystem information queried: ModuleInformation
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeAPI call chain: ExitProcess graph end node
              Source: wThN5MTIsw.exe, 00000000.00000002.335452470.00000000008D9000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000013.00000002.553629451.0000000000C6B000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000019.00000002.605561331.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E8400 VirtualAlloc,CryptAcquireContextW,VirtualAlloc,GetModuleHandleA,LoadLibraryA,GetProcAddress,CryptReleaseContext,VirtualFree,CryptReleaseContext,VirtualFree,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E3200 lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,GetProcessHeap,HeapAlloc,lstrcpyA,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E5FF0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 2_2_0FE65FF0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeCode function: 4_2_0FE65FF0 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E3C70 AllocateAndInitializeSid,GetModuleHandleA,GetProcAddress,FreeSid,
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E9200 cpuid
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\wThN5MTIsw.exeCode function: 0_2_0F4E7490 VirtualAlloc,VirtualAlloc,GetUserNameW,VirtualAlloc,GetComputerNameW,wsprintfW,VirtualAlloc,wsprintfW,VirtualAlloc,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,RegOpenKeyExW,RegQueryValueExW,GetLastError,RegCloseKey,lstrcmpiW,wsprintfW,VirtualFree,VirtualAlloc,VirtualAlloc,wsprintfW,GetNativeSystemInfo,VirtualAlloc,wsprintfW,ExitProcess,wsprintfW,VirtualAlloc,VirtualAlloc,GetWindowsDirectoryW,GetVolumeInformationW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,GetModuleHandleW,GetProcAddress,lstrlenW,VirtualFree,lstrcatW,VirtualAlloc,GetDriveTypeW,lstrcatW,lstrcatW,lstrcatW,GetDiskFreeSpaceW,lstrlenW,wsprintfW,wsprintfW,lstrlenW,lstrlenW,wsprintfW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrlenW,VirtualAlloc,VirtualFree,
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              1
              Replication Through Removable Media
              11
              Native API
              11
              Registry Run Keys / Startup Folder
              1
              Process Injection
              1
              Masquerading
              1
              Input Capture
              11
              Security Software Discovery
              1
              Replication Through Removable Media
              1
              Input Capture
              Exfiltration Over Other Network Medium2
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              Data Encrypted for Impact
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
              Registry Run Keys / Startup Folder
              1
              Process Injection
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Software Packing
              Security Account Manager11
              Peripheral Device Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
              Account Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer1
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingData Transfer Size Limits1
              Proxy
              Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              System Network Connections Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
              File and Directory Discovery
              Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing44
              System Information Discovery
              Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              wThN5MTIsw.exe90%VirustotalBrowse
              wThN5MTIsw.exe93%ReversingLabsWin32.Ransomware.GandCrab
              wThN5MTIsw.exe100%AviraTR/Dropper.Gen
              wThN5MTIsw.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe100%AviraTR/Dropper.Gen
              C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLinkDownload
              34.3.ssapst.exe.32a0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              0.3.wThN5MTIsw.exe.3170000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              18.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              32.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              6.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              0.0.wThN5MTIsw.exe.f4e0000.0.unpack100%AviraTR/Dropper.GenDownload File
              24.3.ssapst.exe.3b60000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              31.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              24.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              19.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              6.3.ssapst.exe.2f70000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              35.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              12.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              19.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              30.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              8.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              26.3.ssapst.exe.3830000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              12.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              25.3.ssapst.exe.36d0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              15.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              15.3.ssapst.exe.3300000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              35.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              12.3.ssapst.exe.3730000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              33.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              17.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              18.3.ssapst.exe.3230000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              8.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              22.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              24.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              14.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              19.3.ssapst.exe.3520000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              25.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              17.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              8.3.ssapst.exe.30f0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              22.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              4.3.ssapst.exe.38c0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              30.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              14.3.ssapst.exe.3730000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              34.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              14.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              25.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              30.3.ssapst.exe.2fc0000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              33.3.ssapst.exe.3d30000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              2.3.ssapst.exe.3640000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              2.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              0.2.wThN5MTIsw.exe.f4e0000.0.unpack100%AviraTR/Dropper.GenDownload File
              33.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              34.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              4.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              4.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              31.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              15.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              26.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              2.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              32.3.ssapst.exe.3790000.0.unpack100%AviraTR/Patched.Ren.GenDownload File
              6.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              26.2.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              32.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              18.0.ssapst.exe.fe60000.0.unpack100%AviraTR/Dropper.GenDownload File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08f100%Avira URL Cloudmalware
              https://tox.chat/download.html0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              ipv4bot.whatismyipaddress.com
              unknown
              unknownfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://ipv4bot.whatismyipaddress.com/2wThN5MTIsw.exe, 00000000.00000002.335452470.00000000008D9000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://ipv4bot.whatismyipaddress.com/5ssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000019.00000002.605561331.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://ipv4bot.whatismyipaddress.com/Sssapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://ipv4bot.whatismyipaddress.com/)ssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://ipv4bot.whatismyipaddress.com/Issapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://ipv4bot.whatismyipaddress.com/QLssapst.exe, 00000004.00000002.382761696.0000000001018000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ipv4bot.whatismyipaddress.com/gssapst.exe, 00000019.00000002.607798154.0000000000F31000.00000004.00000020.00020000.00000000.sdmp, ssapst.exe, 00000019.00000003.601906375.0000000000F31000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://gdcbmuveqjsli57x.onion/cec3c1ad6b0ea08fwThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmptrue
                              • Avira URL Cloud: malware
                              unknown
                              http://ipv4bot.whatismyipaddress.com/I;ssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://ipv4bot.whatismyipaddress.com/&ssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.torproject.org/wThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmpfalse
                                    high
                                    http://ipv4bot.whatismyipaddress.com/G%bssapst.exe, 00000002.00000002.369878312.0000000000DCA000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ipv4bot.whatismyipaddress.com/xssapst.exe, 00000018.00000002.585108554.00000000012E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://ipv4bot.whatismyipaddress.com/ssapst.exe, 00000019.00000003.601906375.0000000000F31000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://tox.chat/download.htmlwThN5MTIsw.exe, 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, ssapst.exe, 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, ssapst.exe, 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          No contacted IP infos
                                          Joe Sandbox Version:35.0.0 Citrine
                                          Analysis ID:694565
                                          Start date and time:2022-08-31 23:55:56 +02:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 12m 8s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:wThN5MTIsw.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:37
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.rans.troj.evad.winEXE@21/1@17/0
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:
                                          • Successful, ratio: 99% (good quality ratio 95.1%)
                                          • Quality average: 83.3%
                                          • Quality standard deviation: 24.4%
                                          HCA Information:
                                          • Successful, ratio: 99%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Override analysis time to 240s for sample files taking high CPU consumption
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          23:57:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaib "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:57:14AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce qxcdehgjaib "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:57:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittak "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:57:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrs "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:57:40AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkg "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:57:48AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpq "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:57:57AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpew "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:58:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxuk "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:58:14AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutr "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:58:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce ocipuxittak "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:58:37AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce trtwjkdvbrs "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:58:45AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce ftylkauykkg "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:58:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce biktigczvpq "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce rjjumyjxpew "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce ypcrxwqpxuk "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce qtytdguwutr "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:32AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuh "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:40AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:49AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce hdwqlmoiwuh "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          23:59:58AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce hedsypabrrz "C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          No context
                                          No context
                                          No context
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\wThN5MTIsw.exe
                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):71680
                                          Entropy (8bit):6.4901994599792285
                                          Encrypted:false
                                          SSDEEP:1536:eZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:9d5BJHMqqDL2/Ovvdr
                                          MD5:C99BAB5FEA91C0938D1D5B6684158B24
                                          SHA1:ECD22F94099A54544BA148AE4F53B6B52FB61573
                                          SHA-256:48BB3CA46BEF3D18611DCD134BAE27C277FF007E2D486CC46B17ECBDA3981429
                                          SHA-512:76FE6196B411FDBD88053502CCE6494B9F995277FEF67406BE5143B72E1832D039E1B90D15E9490BC238DD7EF3DF3C37D7C62B71E495811437AA3C5ECB5D3000
                                          Malicious:true
                                          Yara Hits:
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: ReversingLabs
                                          Antivirus:
                                          • Antivirus: Avira, Detection: 100%
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This .....Ym cannot be run in DOS mode....$....................}.....B.....B...........1.......Y...G.....~.....y.....|....Rich...................PE..L....6.Z............................ K.......................................Z....... ....@.........................P...U............@.......................P.......................................................................................text...H........................... ..`.rdata..&q.......r..................@..@.data........ ......................@....CRT.........0......................@..@.rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.4900942221998115
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:wThN5MTIsw.exe
                                          File size:71680
                                          MD5:1813521f3884de8427728b54b5c9a391
                                          SHA1:874f4efd9b2ba64fa3bcb6ae87b116bd526b85c3
                                          SHA256:4e705159b6c3a72b2b160486b9d582f05e34cd89a767428ef47ff6562b39619e
                                          SHA512:d640a17b59a7a23d9353339a97a174c4de4fdc7f96e813f30d0d3f687f5e67df933d90f1c7de614ce82686eb6d0dad37680cf6d1b314a04c49de0802b8329705
                                          SSDEEP:1536:oZZZZZZZZZZZZpXzzzzzzzzzzzzADypczUk+lkZJngWMqqU+2bbbAV2/S2OvvdZl:nd5BJHMqqDL2/Ovvdr
                                          TLSH:FC636C1DB2D1B293F1E396B9FAB57E25445D2D103B056BEB08A369F568220F16C3B703
                                          File Content Preview:MZ......................@...............................................!..L.!This :.@i.hm cannot be run in DOS mode....$.........................}.......B.......B...............1.........Y.....G.......~.......y.......|.....Rich....................PE..L..
                                          Icon Hash:00828e8e8686b000
                                          Entrypoint:0x10004b20
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x10000000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH
                                          Time Stamp:0x5A9C3687 [Sun Mar 4 18:10:15 2018 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:1
                                          File Version Major:5
                                          File Version Minor:1
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:1
                                          Import Hash:8735e6cad23590d9b5b60978db488a28
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 4Ch
                                          push 000003E8h
                                          call dword ptr [1000A098h]
                                          call 00007FF6F49E256Fh
                                          test eax, eax
                                          je 00007FF6F49E28DAh
                                          push 00000000h
                                          call dword ptr [1000A168h]
                                          push 00000000h
                                          push 00000000h
                                          push 00000000h
                                          push 10002D30h
                                          push 00000000h
                                          push 00000000h
                                          call dword ptr [1000A108h]
                                          mov dword ptr [ebp-04h], eax
                                          cmp dword ptr [ebp-04h], 00000000h
                                          je 00007FF6F49E28FEh
                                          push 00001388h
                                          mov eax, dword ptr [ebp-04h]
                                          push eax
                                          call dword ptr [1000A080h]
                                          cmp eax, 00000102h
                                          jne 00007FF6F49E28DEh
                                          push 00000000h
                                          mov ecx, dword ptr [ebp-04h]
                                          push ecx
                                          call dword ptr [1000A094h]
                                          mov edx, dword ptr [ebp-04h]
                                          push edx
                                          call dword ptr [1000A10Ch]
                                          call 00007FF6F49E2604h
                                          call 00007FF6F49E1FEFh
                                          lea ecx, dword ptr [ebp-4Ch]
                                          call 00007FF6F49E4287h
                                          mov dword ptr [ebp-24h], 00000000h
                                          mov dword ptr [ebp-20h], 00000000h
                                          mov dword ptr [ebp-18h], 00000000h
                                          mov dword ptr [ebp-28h], 00000000h
                                          lea eax, dword ptr [ebp-20h]
                                          push eax
                                          lea ecx, dword ptr [ebp-24h]
                                          push ecx
                                          lea edx, dword ptr [ebp-28h]
                                          push edx
                                          lea eax, dword ptr [ebp-18h]
                                          push eax
                                          lea ecx, dword ptr [ebp-4Ch]
                                          call 00007FF6F49E4203h
                                          mov dword ptr [ebp-2Ch], 00000000h
                                          mov dword ptr [ebp-0Ch], 00000000h
                                          mov ecx, dword ptr [ebp-18h]
                                          call 00007FF6F49E27EDh
                                          Programming Language:
                                          • [ C ] VS2013 build 21005
                                          • [IMP] VS2008 SP1 build 30729
                                          • [EXP] VS2013 build 21005
                                          • [RES] VS2013 build 21005
                                          • [LNK] VS2013 build 21005
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x105500x55.rdata
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x105a80xb4.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x1e0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x150000xaf4.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0xa0000x200.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x84480x8600False0.4546991604477612data6.32052618210059IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0xa0000x71260x7200False0.47765899122807015data6.1644872822657275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x120000xa840xc00False0.3056640625data3.538638851099626IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .CRT0x130000x40x200False0.033203125data0.04078075625387198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .rsrc0x140000x1e00x200False0.52734375data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x150000xaf40xc00False0.7932942708333334data6.537931848954439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountry
                                          RT_MANIFEST0x140600x17dXML 1.0 document textEnglishUnited States
                                          DLLImport
                                          KERNEL32.dllReadFile, SetFilePointer, GetFileAttributesW, GetLastError, MoveFileW, lstrcpyW, SetFileAttributesW, CreateMutexW, GetDriveTypeW, VerSetConditionMask, WaitForSingleObject, GetTickCount, InitializeCriticalSection, OpenProcess, GetSystemDirectoryW, TerminateThread, Sleep, TerminateProcess, VerifyVersionInfoW, WaitForMultipleObjects, DeleteCriticalSection, ExpandEnvironmentStringsW, lstrlenW, SetHandleInformation, lstrcatA, MultiByteToWideChar, CreatePipe, lstrcmpiA, Process32NextW, CreateToolhelp32Snapshot, LeaveCriticalSection, EnterCriticalSection, FindFirstFileW, lstrcmpW, FindClose, FindNextFileW, GetNativeSystemInfo, GetComputerNameW, GetDiskFreeSpaceW, GetWindowsDirectoryW, GetVolumeInformationW, LoadLibraryA, lstrcmpiW, VirtualFree, CreateThread, CloseHandle, lstrcatW, CreateFileMappingW, ExitThread, CreateFileW, GetModuleFileNameW, WriteFile, GetModuleHandleW, UnmapViewOfFile, MapViewOfFile, GetFileSize, GetEnvironmentVariableW, lstrcpyA, GetModuleHandleA, VirtualAlloc, GetProcAddress, Process32FirstW, GetTempPathW, GetProcessHeap, HeapFree, HeapAlloc, lstrlenA, CreateProcessW, ExitProcess, IsProcessorFeaturePresent
                                          USER32.dllBeginPaint, wsprintfW, TranslateMessage, LoadCursorW, LoadIconW, MessageBoxA, GetMessageW, EndPaint, DestroyWindow, RegisterClassExW, ShowWindow, CreateWindowExW, SendMessageW, DispatchMessageW, DefWindowProcW, UpdateWindow, wsprintfA, GetForegroundWindow, SetWindowLongW
                                          GDI32.dllTextOutW
                                          ADVAPI32.dllFreeSid, RegSetValueExW, RegCreateKeyExW, RegCloseKey, CryptExportKey, CryptAcquireContextW, CryptGetKeyParam, CryptReleaseContext, CryptImportKey, CryptEncrypt, CryptGenKey, CryptDestroyKey, GetUserNameW, RegQueryValueExW, RegOpenKeyExW, AllocateAndInitializeSid
                                          SHELL32.dllShellExecuteW, SHGetSpecialFolderPathW, ShellExecuteExW
                                          CRYPT32.dllCryptStringToBinaryA, CryptBinaryToStringA
                                          WININET.dllInternetCloseHandle, HttpAddRequestHeadersW, HttpSendRequestW, InternetConnectW, HttpOpenRequestW, InternetOpenW, InternetReadFile
                                          PSAPI.DLLEnumDeviceDrivers, GetDeviceDriverBaseNameW
                                          NameOrdinalAddress
                                          _ReflectiveLoader@010x10005ff0
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Aug 31, 2022 23:57:06.129142046 CEST5968353192.168.2.48.8.8.8
                                          Aug 31, 2022 23:57:06.148230076 CEST53596838.8.8.8192.168.2.4
                                          Aug 31, 2022 23:57:22.315282106 CEST6416753192.168.2.48.8.8.8
                                          Aug 31, 2022 23:57:22.333259106 CEST53641678.8.8.8192.168.2.4
                                          Aug 31, 2022 23:57:28.340138912 CEST5223953192.168.2.48.8.8.8
                                          Aug 31, 2022 23:57:28.359524012 CEST53522398.8.8.8192.168.2.4
                                          Aug 31, 2022 23:57:38.929553032 CEST5680753192.168.2.48.8.8.8
                                          Aug 31, 2022 23:57:38.949150085 CEST53568078.8.8.8192.168.2.4
                                          Aug 31, 2022 23:57:45.791605949 CEST5944453192.168.2.48.8.8.8
                                          Aug 31, 2022 23:57:45.811317921 CEST53594448.8.8.8192.168.2.4
                                          Aug 31, 2022 23:57:56.947793007 CEST5557053192.168.2.48.8.8.8
                                          Aug 31, 2022 23:57:56.965518951 CEST53555708.8.8.8192.168.2.4
                                          Aug 31, 2022 23:58:02.928319931 CEST6490653192.168.2.48.8.8.8
                                          Aug 31, 2022 23:58:02.947957039 CEST53649068.8.8.8192.168.2.4
                                          Aug 31, 2022 23:58:15.867604971 CEST5944653192.168.2.48.8.8.8
                                          Aug 31, 2022 23:58:15.885432959 CEST53594468.8.8.8192.168.2.4
                                          Aug 31, 2022 23:58:29.536561966 CEST5086153192.168.2.48.8.8.8
                                          Aug 31, 2022 23:58:29.558046103 CEST53508618.8.8.8192.168.2.4
                                          Aug 31, 2022 23:58:46.581418991 CEST6108853192.168.2.48.8.8.8
                                          Aug 31, 2022 23:58:46.599021912 CEST53610888.8.8.8192.168.2.4
                                          Aug 31, 2022 23:59:02.684118986 CEST5872953192.168.2.48.8.8.8
                                          Aug 31, 2022 23:59:02.701252937 CEST53587298.8.8.8192.168.2.4
                                          Aug 31, 2022 23:59:10.632801056 CEST6470053192.168.2.48.8.8.8
                                          Aug 31, 2022 23:59:10.652909040 CEST53647008.8.8.8192.168.2.4
                                          Aug 31, 2022 23:59:21.689377069 CEST6055053192.168.2.48.8.8.8
                                          Aug 31, 2022 23:59:21.708925962 CEST53605508.8.8.8192.168.2.4
                                          Aug 31, 2022 23:59:34.749181032 CEST5567353192.168.2.48.8.8.8
                                          Aug 31, 2022 23:59:34.769097090 CEST53556738.8.8.8192.168.2.4
                                          Aug 31, 2022 23:59:46.759083986 CEST5243753192.168.2.48.8.8.8
                                          Aug 31, 2022 23:59:46.777046919 CEST53524378.8.8.8192.168.2.4
                                          Aug 31, 2022 23:59:57.148920059 CEST5282553192.168.2.48.8.8.8
                                          Aug 31, 2022 23:59:57.168656111 CEST53528258.8.8.8192.168.2.4
                                          Sep 1, 2022 00:00:11.293533087 CEST5853053192.168.2.48.8.8.8
                                          Sep 1, 2022 00:00:11.310962915 CEST53585308.8.8.8192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Aug 31, 2022 23:57:06.129142046 CEST192.168.2.48.8.8.80xb918Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:57:22.315282106 CEST192.168.2.48.8.8.80x3c2bStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:57:28.340138912 CEST192.168.2.48.8.8.80xcc0eStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:57:38.929553032 CEST192.168.2.48.8.8.80xd15dStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:57:45.791605949 CEST192.168.2.48.8.8.80xc4eaStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:57:56.947793007 CEST192.168.2.48.8.8.80x5ef8Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:58:02.928319931 CEST192.168.2.48.8.8.80x9f47Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:58:15.867604971 CEST192.168.2.48.8.8.80x93a8Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:58:29.536561966 CEST192.168.2.48.8.8.80x2a7dStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:58:46.581418991 CEST192.168.2.48.8.8.80x5d70Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:59:02.684118986 CEST192.168.2.48.8.8.80x97b6Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:59:10.632801056 CEST192.168.2.48.8.8.80x4d06Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:59:21.689377069 CEST192.168.2.48.8.8.80xf04eStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:59:34.749181032 CEST192.168.2.48.8.8.80x670dStandard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:59:46.759083986 CEST192.168.2.48.8.8.80x8f79Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Aug 31, 2022 23:59:57.148920059 CEST192.168.2.48.8.8.80x52d6Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)
                                          Sep 1, 2022 00:00:11.293533087 CEST192.168.2.48.8.8.80x25b0Standard query (0)ipv4bot.whatismyipaddress.comA (IP address)IN (0x0001)

                                          Click to jump to process

                                          Target ID:0
                                          Start time:23:56:59
                                          Start date:31/08/2022
                                          Path:C:\Users\user\Desktop\wThN5MTIsw.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\wThN5MTIsw.exe"
                                          Imagebase:0xf4e0000
                                          File size:71680 bytes
                                          MD5 hash:1813521F3884DE8427728B54B5C9A391
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000002.335673365.000000000F4EA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000000.00000002.335680061.000000000F4F2000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000000.00000003.334936467.0000000003170000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000000.00000000.321170731.000000000F4EA000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:2
                                          Start time:23:57:13
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000002.00000002.370323598.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000002.00000000.354396039.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000002.00000002.370333139.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000002.00000003.369602233.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe, Author: ReversingLabs
                                          Antivirus matches:
                                          • Detection: 100%, Avira
                                          • Detection: 100%, Joe Sandbox ML
                                          Reputation:low

                                          Target ID:4
                                          Start time:23:57:24
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000004.00000003.382524367.00000000038C0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000004.00000002.383041261.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000004.00000000.373713609.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000004.00000002.383047915.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:6
                                          Start time:23:57:32
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000006.00000002.406382399.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000006.00000003.405218158.0000000002F70000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000006.00000000.391649222.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000006.00000002.406483395.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:8
                                          Start time:23:57:40
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000002.421043250.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000008.00000002.421052694.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000000.408927489.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000008.00000003.419920296.00000000030F0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          Reputation:low

                                          Target ID:12
                                          Start time:23:57:48
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000C.00000002.445300926.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000000C.00000003.444009772.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000C.00000000.426845599.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000C.00000002.445271222.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:14
                                          Start time:23:57:57
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000E.00000000.444554151.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000E.00000002.457737689.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000000E.00000003.456730321.0000000003730000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000E.00000002.457728648.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:15
                                          Start time:23:58:05
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000002.485778645.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000000.462423463.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000000F.00000003.484382333.0000000003300000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000000F.00000002.485790617.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:17
                                          Start time:23:58:14
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000011.00000002.485870462.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000011.00000000.482554766.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:18
                                          Start time:23:58:23
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000012.00000000.500809556.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000012.00000002.520951774.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000012.00000002.521001527.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000012.00000003.513687059.0000000003230000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          Reputation:low

                                          Target ID:19
                                          Start time:23:58:37
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000013.00000002.556440908.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000013.00000000.531056963.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000013.00000002.556559672.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000013.00000003.550407327.0000000003520000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          Reputation:low

                                          Target ID:22
                                          Start time:23:58:45
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000016.00000000.548829843.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000016.00000002.553896559.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:24
                                          Start time:23:58:55
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000018.00000002.585820146.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000018.00000000.570376945.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000018.00000002.585796532.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000018.00000003.584737437.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          Reputation:low

                                          Target ID:25
                                          Start time:23:59:04
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000000.588245655.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000019.00000002.608758289.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000002.608744037.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000019.00000003.601841912.00000000036D0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          Reputation:low

                                          Target ID:26
                                          Start time:23:59:13
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000001A.00000003.625461976.0000000003830000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001A.00000002.628240997.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000001A.00000002.628251824.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001A.00000000.608029027.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:30
                                          Start time:23:59:21
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 0000001E.00000002.654951583.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 0000001E.00000003.653635490.0000000002FC0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001E.00000000.626543672.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001E.00000002.654935793.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:31
                                          Start time:23:59:31
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001F.00000000.648211037.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 0000001F.00000002.651985737.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:32
                                          Start time:23:59:40
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000020.00000003.679180879.0000000003790000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000020.00000002.681984770.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000020.00000000.666637056.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000020.00000002.682007928.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:33
                                          Start time:23:59:49
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000021.00000003.701450302.0000000003D30000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000021.00000002.703365325.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000021.00000000.688032587.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000021.00000002.703345921.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:34
                                          Start time:23:59:58
                                          Start date:31/08/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000022.00000002.734717569.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: ReflectiveLoader, Description: Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended, Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: SUSP_RANSOMWARE_Indicator_Jul20, Description: Detects ransomware indicator, Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: Gandcrab, Description: Gandcrab Payload, Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                                          • Rule: Win32_Ransomware_GandCrab, Description: unknown, Source: 00000022.00000003.731764683.00000000032A0000.00000004.00001000.00020000.00000000.sdmp, Author: ReversingLabs
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000022.00000000.705195952.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Gandcrab, Description: Yara detected Gandcrab, Source: 00000022.00000002.734737605.000000000FE72000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          Target ID:35
                                          Start time:00:00:07
                                          Start date:01/09/2022
                                          Path:C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Roaming\Microsoft\ssapst.exe"
                                          Imagebase:0xfe60000
                                          File size:71680 bytes
                                          MD5 hash:C99BAB5FEA91C0938D1D5B6684158B24
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000023.00000000.730367046.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_ReflectiveLoader, Description: Yara detected ReflectiveLoader, Source: 00000023.00000002.734163456.000000000FE6A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                          Reputation:low

                                          No disassembly