g4FtSOZMD9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
 |
 |
|
Filetype:
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
Entropy:
|
5.878526280109068
|
Filename:
|
g4FtSOZMD9.exe
|
Filesize:
|
258048
|
MD5:
|
81f377eda4163da1b74cae83e38ced9f
|
SHA1:
|
e50abaf01a9fd3ae8176b5b6117f6b8f8a355ec0
|
SHA256:
|
a16d035ca37dbd7ab34c856f4cdf96a9898dcebba08c5801c99f3d3100ae6b3f
|
SHA512:
|
8fd4613830195a00650386e450e72081546603de6fdff40ca039464cb5d33fd0d2aed0151c6f40558671d631c132f99a5400d9a2db304aac05729b941c40a63d
|
SSDEEP:
|
3072:ShYPey2QV00E3KxPpW9J+PZK7kzqHD2+KM5KOKVhYPey2QV00E:ShYGy2a00yiw0ZK7RjbnQhYGy2a00
|
Preview:
|
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L....6.Y..........................................@................
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Multi AV Scanner detection for submitted file |
AV Detection |
|
Detected unpacking (changes PE section rights) |
Data Obfuscation |
|
Hides threads from debuggers |
Anti Debugging |
|
Installs a global keyboard hook |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
Access Token Manipulation
|
Tries to steal Mail credentials (via file / registry access) |
Stealing of Sensitive Information |
|
Tries to detect Any.run |
Malware Analysis System Evasion |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
|
Tries to steal Mail credentials (via file registry) |
Stealing of Sensitive Information |
|
Injects a PE file into a foreign processes |
HIPS / PFW / Operating System Protection Evasion |
Access Token Manipulation
|
Creates autostart registry keys with suspicious values (likely registry only malware) |
Boot Survival |
|
Tries to steal Instant Messenger accounts or passwords |
Stealing of Sensitive Information |
|
Uses 32bit PE files |
Compliance, System Summary |
|
Queries the volume information (name, serial number etc) of a device |
Language, Device and Operating System Detection |
|
Antivirus or Machine Learning detection for unpacked file |
AV Detection |
Access Token Manipulation
|
May sleep (evasive loops) to hinder dynamic analysis |
Malware Analysis System Evasion |
File and Directory Discovery
|
Uses code obfuscation techniques (call, push, ret) |
Data Obfuscation |
|
Detected potential crypto function |
System Summary |
Access Token Manipulation
|
Found potential string decryption / allocating functions |
System Summary |
Deobfuscate/Decode Files or Information
Obfuscated Files or Information
|
Contains functionality to call native functions |
System Summary |
|
Contains functionality to dynamically determine API calls |
Data Obfuscation, Anti Debugging |
|
Contains long sleeps (>= 3 min) |
Malware Analysis System Evasion |
Virtualization/Sandbox Evasion
|
Abnormal high CPU Usage |
System Summary |
Access Token Manipulation
|
Enables debug privileges |
Anti Debugging |
|
Found a high number of Window / User specific system calls (may be a loop to detect user behavior) |
Malware Analysis System Evasion |
|
Sample file is different than original file name gathered from version info |
System Summary |
Access Token Manipulation
|
Extensive use of GetProcAddress (often used to hide API calls) |
Hooking and other Techniques for Hiding and Protection |
|
PE file contains strange resources |
System Summary |
|
Drops PE files |
Persistence and Installation Behavior |
Access Token Manipulation
|
Contains functionality to read the PEB |
Anti Debugging |
Access Token Manipulation
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress) |
Anti Debugging |
|
Contains functionality for read data from the clipboard |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
|
Queries a list of all running processes |
Malware Analysis System Evasion |
|
Sample is known by Antivirus |
System Summary |
Access Token Manipulation
|
Sample reads its own file content |
System Summary |
Access Token Manipulation
|
PE file has an executable .text section and no other executable section |
System Summary |
Access Token Manipulation
|
Reads software policies |
System Summary |
Access Token Manipulation
|
Parts of this applications are using VB runtime library 6.0 (Probably coded in Visual Basic) |
System Summary |
|
Contains functionality to enumerate / list files inside a directory |
Spreading, Malware Analysis System Evasion |
File and Directory Discovery
|
Queries the cryptographic machine GUID |
Language, Device and Operating System Detection |
Access Token Manipulation
|
Uses an in-process (OLE) Automation server |
System Summary |
Access Token Manipulation
|
Contains functionality to adjust token privileges (e.g. debug / backup) |
System Summary |
Access Token Manipulation
|
Queries a list of all open handles |
System Summary |
|
Contains medium sleeps (>= 30s) |
Malware Analysis System Evasion |
|
Creates files inside the user directory |
System Summary |
|
Creates temporary files |
System Summary |
|
Disables application error messsages (SetErrorMode) |
Hooking and other Techniques for Hiding and Protection |
|
SQL strings found in memory and binary data |
System Summary |
File and Directory Discovery
|
Queries a list of all running drivers |
Malware Analysis System Evasion |
|
Creates an autostart registry key |
Boot Survival |
Registry Run Keys / Startup Folder
Access Token Manipulation
File and Directory Discovery
|
Contains functionality to query windows version |
Language, Device and Operating System Detection |
System Information Discovery
|
Creates mutexes |
System Summary |
Access Token Manipulation
|
Contains functionality to load and extract PE file embedded resources |
System Summary |
|
Found strings which match to known social media urls |
Networking |
|
URLs found in memory or binary data |
Networking |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
|
Contains functionality to query the account / user name |
Language, Device and Operating System Detection |
System Owner/User Discovery
|
Reads the hosts file |
System Summary |
|
Contains functionality to modify the execution of threads in other processes |
|
Access Token Manipulation
|
Checks if Microsoft Office is installed |
System Summary |
Access Token Manipulation
|
Tries to open an application configuration file (.cfg) |
System Summary |
Access Token Manipulation
|
|
C:\Users\user\AppData\Local\Temp\Brevsamlingssteds8\Restroke.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Local\Temp\Brevsamlingssteds8\Restroke.exe
|
Category:
|
dropped
|
Dump:
|
Restroke.exe.9.dr
|
ID:
|
dr_18
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
Entropy:
|
5.878526280109068
|
Encrypted:
|
false
|
Ssdeep:
|
3072:ShYPey2QV00E3KxPpW9J+PZK7kzqHD2+KM5KOKVhYPey2QV00E:ShYGy2a00yiw0ZK7RjbnQhYGy2a00
|
Size:
|
258048
|
Whitelisted:
|
false
|
Reputation:
|
low
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Drops PE files |
Persistence and Installation Behavior |
|
|
C:\Users\user\AppData\Local\Temp\Brevsamlingssteds8\Restroke.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Local\Temp\Brevsamlingssteds8\Restroke.vbs
|
Category:
|
dropped
|
Dump:
|
Restroke.vbs.9.dr
|
ID:
|
dr_19
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
ASCII text, with CRLF line terminators
|
Entropy:
|
4.890716777636802
|
Encrypted:
|
false
|
Ssdeep:
|
3:jfF+m8nhvF3mRDN+E2J5xAIcP0WHBW73zx1dAHMn:jFqhv9IN723fOJYxXiMn
|
Size:
|
126
|
Whitelisted:
|
false
|
Reputation:
|
low
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates autostart registry keys with suspicious values (likely registry only malware) |
Boot Survival |
Registry Run Keys / Startup Folder
|
|
C:\Users\user\AppData\Local\Temp\bhvFAB7.tmp
|
Extensible storage user DataBase, version 0x620, checksum 0x1277828c, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Local\Temp\bhvFAB7.tmp
|
Category:
|
dropped
|
Dump:
|
bhvFAB7.tmp.21.dr
|
ID:
|
dr_22
|
Target ID:
|
21
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
Extensible storage user DataBase, version 0x620, checksum 0x1277828c, page size 32768, DirtyShutdown, Windows version 10.0
|
Entropy:
|
0.9105350923938392
|
Encrypted:
|
false
|
Ssdeep:
|
24576:yHzZ+wP17f2s1ipPHihgmKdTnjVccgeTaNXvq:yHQswtT0q
|
Size:
|
26738688
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Local\Temp\iwxzjjveuvjtvtlo
|
Little-endian UTF-16 Unicode text, with no line terminators
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Local\Temp\iwxzjjveuvjtvtlo
|
Category:
|
dropped
|
Dump:
|
iwxzjjveuvjtvtlo.21.dr
|
ID:
|
dr_23
|
Target ID:
|
21
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
Little-endian UTF-16 Unicode text, with no line terminators
|
Entropy:
|
1.0
|
Encrypted:
|
false
|
Ssdeep:
|
3:Qn:Qn
|
Size:
|
2
|
Whitelisted:
|
false
|
Reputation:
|
high
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates a process in suspended mode (likely to inject code) |
HIPS / PFW / Operating System Protection Evasion |
|
Spawns processes |
System Summary |
|
|
C:\Users\user\AppData\Local\Temp\~DFF48BD71CF1E747D1.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Local\Temp\~DFF48BD71CF1E747D1.TMP
|
Category:
|
dropped
|
Dump:
|
~DFF48BD71CF1E747D1.TMP.0.dr
|
ID:
|
dr_0
|
Target ID:
|
0
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
Composite Document File V2 Document, Cannot read section info
|
Entropy:
|
5.966668453944976
|
Encrypted:
|
false
|
Ssdeep:
|
768:hlDqxNQ65JJT1coaPeybSF3SjNrb40nEPnngv8K7e:h2v53YPey2xSVb40nE/ngv8K7e
|
Size:
|
65536
|
Whitelisted:
|
false
|
Reputation:
|
low
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Creates temporary files |
System Summary |
|
|
C:\Users\user\AppData\Roaming\Clock\logs.dat
|
data
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Clock\logs.dat
|
Category:
|
dropped
|
Dump:
|
logs.dat.9.dr
|
ID:
|
dr_3
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
data
|
Entropy:
|
6.922859102725601
|
Encrypted:
|
false
|
Ssdeep:
|
3:z3qdECGmn6eplif1Fycug6718QzafFgfoUzf8E+T1tZno+HQpBLwdGiYdm:EZ6e7itW10fSfow8E+THc+
|
Size:
|
184
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_022802.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_022802.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_022802.png.9.dr
|
ID:
|
dr_20
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.953635790065994
|
Encrypted:
|
false
|
Ssdeep:
|
12288:6z0J9/6Y79QYZeUAuISCT14ckScWRgWlfStLf/aTDt5hi4IwvFZezeGTDdb:O6Sa3ZAsPcvvOWlGz/QprI0ejp
|
Size:
|
805509
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_023804.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_023804.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_023804.png.9.dr
|
ID:
|
dr_21
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954368693124621
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53EhiIc4ezePK+t5Xi9hbt/BZF0kRX1PBo2x32Y8Ksl7E21b+SCotr8hPUHv1:3qkIctSJnqzRX15l1slPhjVEQ
|
Size:
|
805382
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_024805.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_024805.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_024805.png.9.dr
|
ID:
|
dr_1
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954487643604619
|
Encrypted:
|
false
|
Ssdeep:
|
24576:3qkIctSJnTfCxOkxnhEgaykcreoO+G3Jdk9:3q1c8njC0kdhE7ykaemG3JK9
|
Size:
|
805480
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_025806.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_025806.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_025806.png.9.dr
|
ID:
|
dr_2
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.956551030400023
|
Encrypted:
|
false
|
Ssdeep:
|
12288:pgadi5RPDNuzJ21nUyvXrnNUgSSGy1dVm4xc1s8UWbWohhLU+OZbpT8vOKwM:Wai5VsY6y/rnRSSG+oA/8jfUNjT8yM
|
Size:
|
796305
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_030807.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_030807.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_030807.png.9.dr
|
ID:
|
dr_4
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.953798912951398
|
Encrypted:
|
false
|
Ssdeep:
|
24576:N587VkYbbsxNdJHVJhiy7Q4PtMJvQDpeHC:N5eV+dJ1JjTPtMJvG2C
|
Size:
|
805504
|
Whitelisted:
|
false
|
Reputation:
|
low
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_031808.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_031808.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_031808.png.9.dr
|
ID:
|
dr_5
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954279315926631
|
Encrypted:
|
false
|
Ssdeep:
|
24576:3qkIctSJnuHCn0Wh9lcTchW6IFverrBKFgGA35:3q1c8nuHXWVcwhJNxKFgGA35
|
Size:
|
805488
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_032809.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_032809.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_032809.png.9.dr
|
ID:
|
dr_6
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.95430302145449
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53EhiIc4ezePK+t5uHCn0pa3qeilgzsuy6/GjM5hi42eRbkeP7+gBml2:3qkIctSJnuHCn0eq6HTr9x5
|
Size:
|
805490
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_033810.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_033810.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_033810.png.9.dr
|
ID:
|
dr_7
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954631654370981
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53EhiIc4ezePK+t5Xi9ZLTtTNSuSyIqF7fDjg1zti6LDxcz9wPU4Z+cf:3qkIctSJnkpT4iFr3gZA6nxc5KN
|
Size:
|
805395
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_034810.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_034810.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_034810.png.9.dr
|
ID:
|
dr_8
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.953809932335241
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53EhiIc4ezGn0d30f5tEsDRDCO4hpMOd+mrSNKCZ16b3hw7uAGOkIoZ0:3qkIctae0fjLlS7xJrfy6bx68Ort
|
Size:
|
805325
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_035812.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_035812.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_035812.png.9.dr
|
ID:
|
dr_9
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.953635790065994
|
Encrypted:
|
false
|
Ssdeep:
|
12288:6z0J9/6Y79QYZeUAuISCT14ckScWRgWlfStLf/aTDt5hi4IwvFZezeGTDdb:O6Sa3ZAsPcvvOWlGz/QprI0ejp
|
Size:
|
805509
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_040812.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_040812.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_040812.png.9.dr
|
ID:
|
dr_10
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.953635790065994
|
Encrypted:
|
false
|
Ssdeep:
|
12288:6z0J9/6Y79QYZeUAuISCT14ckScWRgWlfStLf/aTDt5hi4IwvFZezeGTDdb:O6Sa3ZAsPcvvOWlGz/QprI0ejp
|
Size:
|
805509
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_041814.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_041814.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_041814.png.9.dr
|
ID:
|
dr_11
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954613568850628
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53Ehi/jYdvNG+Ke3dUBvxvFe6CFpI/1sV3tMUS3LWi6LDxcz9VARmlv:3qk/KNG+HENe6upu1g3tMJ3/6nxc5VA0
|
Size:
|
805441
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_042814.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_042814.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_042814.png.9.dr
|
ID:
|
dr_12
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954613568850628
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53Ehi/jYdvNG+Ke3dUBvxvFe6CFpI/1sV3tMUS3LWi6LDxcz9VARmlv:3qk/KNG+HENe6upu1g3tMJ3/6nxc5VA0
|
Size:
|
805441
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_043815.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_043815.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_043815.png.9.dr
|
ID:
|
dr_13
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.955185028460513
|
Encrypted:
|
false
|
Ssdeep:
|
24576:3qkmM120hq6axPwYs5p5lr4xSEe3HEdGfDz:3qlw2KdoPwYs5pzM0E4HAeDz
|
Size:
|
805831
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_044815.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_044815.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_044815.png.9.dr
|
ID:
|
dr_14
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.954324107532815
|
Encrypted:
|
false
|
Ssdeep:
|
12288:nAG53EhiIc4ezePK+t5Xi9ZLTtTNSuSyIqFOCylKpm2ajfWTB8du3/:3qkIctSJnkpT4iFO7l0Fd
|
Size:
|
805723
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_045816.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_045816.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_045816.png.9.dr
|
ID:
|
dr_15
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.953835421134929
|
Encrypted:
|
false
|
Ssdeep:
|
12288:WhJ4iVkp4pkR6l/qf49+9vl6U/cQJcb7jFZA+QaK9eSbUIg9nCIBC5epXbKjj12F:WvJkOW6srl7ciSlZue7BREsmpY
|
Size:
|
805709
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_050816.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_050816.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_050816.png.9.dr
|
ID:
|
dr_16
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.957036024835413
|
Encrypted:
|
false
|
Ssdeep:
|
24576:tVeBGQw+UQjjkuiX84b2Qt7VJYrExxykzC:HQdU6jkuiX84b2QXJYIEkm
|
Size:
|
796706
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_051818.png
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
 |
 |
|
File:
|
C:\Users\user\AppData\Roaming\Screenshots\time_20220102_051818.png
|
Category:
|
dropped
|
Dump:
|
time_20220102_051818.png.9.dr
|
ID:
|
dr_17
|
Target ID:
|
9
|
Process:
|
C:\Users\user\Desktop\g4FtSOZMD9.exe
|
Type:
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
Entropy:
|
7.9544298824383235
|
Encrypted:
|
false
|
Ssdeep:
|
24576:n4TW8TVQ8XgQoKqq+kDCKthsZFayV/UMqppeojdg:h8TFX4QBD/tmZ0pMOpjjdg
|
Size:
|
805744
|
Whitelisted:
|
false
|
Reputation:
|
timeout
|
|