Edit tour

Windows Analysis Report
https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~

Overview

General Information

Sample URL:https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~
Analysis ID:1386643

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Stores files to the Windows start menu directory

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • chrome.exe (PID: 6064 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7004 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2108,i,5345405506885187482,2771728057929650148,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~HTTP Parser: No favicon
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 20.114.59.183
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.25
Source: unknownDNS traffic detected: queries for: eu.spgo.io
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownHTTPS traffic detected: 20.114.59.183:443 -> 192.168.2.16:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 23.1.237.25:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: classification engineClassification label: clean0.win@13/7@8/21
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2108,i,5345405506885187482,2771728057929650148,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=2108,i,5345405506885187482,2771728057929650148,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Registry Run Keys / Startup Folder
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~0%VirustotalBrowse
https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~0%Avira URL Cloudsafe
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
eu.spgo.io0%VirustotalBrowse
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
eu.spgo.io
54.229.201.248
truefalseunknown
accounts.google.com
172.217.215.84
truefalse
    high
    www.google.com
    74.125.138.103
    truefalse
      high
      clients.l.google.com
      74.125.138.101
      truefalse
        high
        clients2.google.com
        unknown
        unknownfalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~false
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            74.125.138.103
            www.google.comUnited States
            15169GOOGLEUSfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            239.255.255.250
            unknownReserved
            unknownunknownfalse
            54.229.201.248
            eu.spgo.ioUnited States
            16509AMAZON-02USfalse
            74.125.138.94
            unknownUnited States
            15169GOOGLEUSfalse
            172.217.215.84
            accounts.google.comUnited States
            15169GOOGLEUSfalse
            74.125.138.101
            clients.l.google.comUnited States
            15169GOOGLEUSfalse
            IP
            192.168.2.16
            Joe Sandbox version:39.0.0 Ruby
            Analysis ID:1386643
            Start date and time:2024-02-05 09:55:59 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:defaultwindowsinteractivecookbook.jbs
            Sample URL:https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:4
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • EGA enabled
            Analysis Mode:stream
            Analysis stop reason:Timeout
            Detection:CLEAN
            Classification:clean0.win@13/7@8/21
            • Exclude process from analysis (whitelisted): SIHClient.exe
            • Excluded IPs from analysis (whitelisted): 74.125.138.94, 34.104.35.123
            • Excluded domains from analysis (whitelisted): edgedl.me.gvt1.com, clientservices.googleapis.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenFile calls found.
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 5 07:56:31 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2673
            Entropy (8bit):3.981238020151332
            Encrypted:false
            SSDEEP:
            MD5:10C4C4DC6A9739FA015A6ABAA0744E43
            SHA1:197E7C1BDB71464A999CBB905A3AB746FA2BA2EB
            SHA-256:4DC20CA74C947E839846948E6C6E05156ED11C96509837396E3110649FFFA960
            SHA-512:CD487B59A5D311744ADD5F170C94EC4373F4F5E54934CB22E0726F3B7F540DB0B1F1EC24EF44C0C30A5208B86992E06C45E4FF1B5F0150C011C576ECEA7197C4
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.......6.X..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IEX.G....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEX.G....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VEX.G....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VEX.G..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEX.G...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 5 07:56:31 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2675
            Entropy (8bit):3.996791504194917
            Encrypted:false
            SSDEEP:
            MD5:79D9E2ACE2B567B27021FBCA1D0CB804
            SHA1:B88E1723E7FAE63414F409F702E50DC792277DC8
            SHA-256:17611FFC899E9941D64029AE130721C466665BA50CBA225089D7EA1806B8EB2E
            SHA-512:3AD1F475D15BD3E96A8ED2A02686246B81CC663F6879157A3C63B206A5A79B7C58CF79F76A0EE1F5693506D70BA991C7D2D78E4C912F997F023367D506FFF139
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....+|.6.X..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IEX.G....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEX.G....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VEX.G....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VEX.G..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEX.G...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2689
            Entropy (8bit):4.00746903939571
            Encrypted:false
            SSDEEP:
            MD5:1EF00E0F1C20BA1DB9B9209E9899D23E
            SHA1:E8B8B1A27E9D03549C98B5068828D522A40D0BF0
            SHA-256:DF909E21645602B8B57CC1C5CE338A0C7F80746F3E152179D4A34648B02D6CC0
            SHA-512:EF1205C5C82851CA427AF9319D0D21024E78D3F13B941A367B8E12852ED3C5C5466864A5D2E0B44957D6BEC6B2CF600119868819D5750E2CD939D8B4497CFB55
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....Y.04...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IEX.G....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEX.G....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VEX.G....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VEX.G..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VFW.E...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 5 07:56:31 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9961914999790977
            Encrypted:false
            SSDEEP:
            MD5:ADDDB98E0BE0B300181DE05D108646AB
            SHA1:0565F0C82A59913BDB5A95DF384AD55B1C858457
            SHA-256:522E749DEBC5FE47F54E4E8FBB5EDC829C1C226F6B3B5E77CC9710F68044E4FA
            SHA-512:B1AEA9F549F6F0A83A6F647EAAFEF1A6ADAADAA3F79B3AAB6259FA835AB98CA2696D8A315A2A321BF2245079E97DE1C66AC6B349F16156DE2369E46672C6ED8A
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.....6.X..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IEX.G....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEX.G....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VEX.G....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VEX.G..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEX.G...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 5 07:56:31 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2677
            Entropy (8bit):3.9833178652569567
            Encrypted:false
            SSDEEP:
            MD5:83B55B3FB4579EC25CCF33B5CB583D3B
            SHA1:1BD25AA79E249A63F3EF38D459E18C5ACC6E7D6E
            SHA-256:3D837877AF1B81F7E8894273E58C3CA00AD126540230799C62495BD1C0564DD5
            SHA-512:EBCAC8EF7924BF2460A439676AB160A65C1A0CD194466381025EEAD9C6FEFB78A56E43FE43A03D98DE42E52EA6297D2341A5BDFB5DDFC02D6FBD1DDE90B06939
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,....l..6.X..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IEX.G....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEX.G....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VEX.G....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VEX.G..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEX.G...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Feb 5 07:56:31 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
            Category:dropped
            Size (bytes):2679
            Entropy (8bit):3.9947637077562956
            Encrypted:false
            SSDEEP:
            MD5:2693A1165FE40F6A462E3EBD4B5F6141
            SHA1:BD5FE067AD6EB46F8B063EFBE9759266BEF47483
            SHA-256:3347BE0F890EC3846BC6AFC6A71A3B9E8EC601D43FD109B5A88257C6F38B7D14
            SHA-512:999596915B0E4C0EE0C7D2CF40E3F1F7E1227E8ECD03308502D92B10A5022749DD4ACD128AF41AB73CDD830DA934F3E68789EC26E65E72F7DECEFBCF2B3D4DC7
            Malicious:false
            Reputation:unknown
            Preview:L..................F.@.. ...$+.,.......6.X..N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....FW.J..PROGRA~1..t......O.IEX.G....B...............J.........P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VEX.G....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VEX.G....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VEX.G..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEX.G...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i.............6......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
            File Type:HTML document, ASCII text
            Category:downloaded
            Size (bytes):255
            Entropy (8bit):5.613600749563545
            Encrypted:false
            SSDEEP:
            MD5:5078FE40E91A9D0B340930E5A29FCF5C
            SHA1:57EE20F7F6A605ED80DFC6BBDA597B85F2EC78F0
            SHA-256:95799D51E795A01AF744DD650054737A8253378DC7B19476CADD3893EC30A010
            SHA-512:E282252AB4DA18037906EDF745A790EEC120EBF4923348FCD8039D92948C0B589FB3DE543827FCF878A0C0AA8BD217B873D052CAD9E8AA722D3DFBA18832557A
            Malicious:false
            Reputation:unknown
            URL:https://eu.spgo.io/u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~
            Preview:<!DOCTYPE html>.<html lang="en">.<head>.<meta charset="utf-8">.<title>Error</title>.</head>.<body>.<pre>Cannot GET /u/WiQY7cF_IPkDQevv_xmhDQ~~/AABUrAA~/RgRnny8fPFcFc3BjZXVCCmW8H6q8ZRFPP1lSGWFuZHJlYS5uYW5pbm9AYmVhbnRlY2guaXRYBAAAAAA~</pre>.</body>.</html>.
            No static file info