Source: dmwSettings.ex#.exe |
Avira: detected |
Source: dmwSettings.ex#.exe |
Virustotal: Detection: 22% |
Perma Link |
Source: dmwSettings.ex#.exe |
ReversingLabs: Detection: 18% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: dmwSettings.ex#.exe |
Joe Sandbox ML: detected |
Source: dmwSettings.ex#.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMedia |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07 |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://pki-ocsp.symauth.com0 |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FB1000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000003.1821215276.0000000002D00000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000002.4185861225.00000000000A1000.00000020.00000001.01000000.00000003.sdmp |
String found in binary or memory: http://www.indyproject.org/ |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process Stats: CPU usage > 49% |
Source: dmwSettings.ex#.exe |
Static PE information: Number of sections : 19 > 10 |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F7D000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs dmwSettings.ex#.exe |
Source: dmwSettings.ex#.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: dmwSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9943033854166666 |
Source: dmwSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9984122983870968 |
Source: dmwSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9975980007349011 |
Source: dmwSettings.ex#.exe |
Static PE information: Section: .reloc ZLIB complexity 1.5 |
Source: classification engine |
Classification label: mal100.troj.spyw.evad.winEXE@1/1@0/0 |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File created: C:\Users\user\Desktop\error.log |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Mutant created: \Sessions\1\BaseNamedObjects\fedd1d1122aa65028c81e16ceb85d9c73790a2fa |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: dmwSettings.ex#.exe |
Virustotal: Detection: 22% |
Source: dmwSettings.ex#.exe |
ReversingLabs: Detection: 18% |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: magnification.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: d3d9.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: security.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: idndl.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: dmwSettings.ex#.exe |
Static file information: File size 14571536 > 1048576 |
Source: dmwSettings.ex#.exe |
Static PE information: Raw size of is bigger than: 0x100000 < 0x12e600 |
Source: dmwSettings.ex#.exe |
Static PE information: Raw size of is bigger than: 0x100000 < 0x372800 |
Source: dmwSettings.ex#.exe |
Static PE information: Raw size of .boot is bigger than: 0x100000 < 0x81fe00 |
Source: initial sample |
Static PE information: section where entry point is pointing to: .boot |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: |
Source: dmwSettings.ex#.exe |
Static PE information: section name: .themida |
Source: dmwSettings.ex#.exe |
Static PE information: section name: .boot |
Source: dmwSettings.ex#.exe |
Static PE information: section name: entropy: 7.903690006990631 |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Window searched: window name: FilemonClass |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Window searched: window name: PROCMON_WINDOW_CLASS |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Window searched: window name: RegmonClass |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
System information queried: FirmwareTableInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Section loaded: OutputDebugStringW count: 1948 |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Thread delayed: delay time: 180000 |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Window / User API: threadDelayed 5067 |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Window / User API: threadDelayed 4255 |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1104 |
Thread sleep time: -180000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1780 |
Thread sleep time: -57000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1104 |
Thread sleep time: -5067000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe TID: 1104 |
Thread sleep time: -4255000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Thread delayed: delay time: 180000 |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU |
Source: dmwSettings.ex#.exe, 00000000.00000003.1827151986.000000000543D000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: @Idassignednumbers@IdPORT_vmnet |
Source: dmwSettings.ex#.exe, 00000000.00000003.1827151986.000000000543D000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: @Idassignednumbers@IdPORT_vmnet$@Idassignednumbers@IdPORT_genrad_mux |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
System information queried: ModuleInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process information queried: ProcessInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: regmonclass |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: gbdyllo |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: process monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: procmon_window_class |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: registry monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: ollydbg |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: filemonclass |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Open window title or class name: file monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: C:\Users\user\Desktop\dmwSettings.ex#.exe |
Process queried: DebugPort |
Jump to behavior |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerZxcvb6^ |
Source: dmwSettings.ex#.exe, 00000000.00000002.4186282253.0000000000B6C000.00000002.00000001.01000000.00000003.sdmp, dmwSettings.ex#.exe, 00000000.00000003.1827151986.000000000543D000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: @Winapi@Windows@DOF_PROGMAN |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerALS~1f |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managerurce F |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagernHintsx |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.000000000501F000.00000004.00001000.00020000.00000000.sdmp, dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerECH~1 |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager" |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FCE000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: program manager chromelication6654390.zip |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager1pS |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManageronsIPr |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerL |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managervix^ |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerevineC$^ |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager1AF~1T |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managere Brow |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager1tsPrLuY |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerShade |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerationG1^ |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manager*_7y |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191477872.0000000002D38000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managerroved |
Source: Yara match |
File source: Process Memory Space: dmwSettings.ex#.exe PID: 4460, type: MEMORYSTR |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FCE000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: /C:\Users\user\AppData\Roaming\Electrum\wallets |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FFB000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: RC:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldb1 |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F9A000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 3C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F9A000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000005002000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: Exodus |
Source: dmwSettings.ex#.exe, 00000000.00000003.1823902618.0000000005005000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: ethereum |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004FB8000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 4C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsp |
Source: dmwSettings.ex#.exe, 00000000.00000002.4191768105.0000000004F9A000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore |
Source: Yara match |
File source: Process Memory Space: dmwSettings.ex#.exe PID: 4460, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: dmwSettings.ex#.exe PID: 4460, type: MEMORYSTR |