Source: mvSettings.ex#.exe |
Avira: detected |
Source: mvSettings.ex#.exe |
Virustotal: Detection: 30% |
Perma Link |
Source: mvSettings.ex#.exe |
ReversingLabs: Detection: 26% |
Source: Submited Sample |
Integrated Neural Analysis Model: Matched 100.0% probability |
Source: mvSettings.ex#.exe |
Joe Sandbox ML: detected |
Source: mvSettings.ex#.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://cv.iptc.org/newscodes/digitalsourcetype/compositeWithTrainedAlgorithmicMedia |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0A |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://ocsp.digicert.com0X |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://pki-crl.symauth.com/ca_7a5c3a0c73117406add19312bc1bc23f/LatestCRL.crl07 |
Source: mvSettings.ex#.exe, 00000000.00000003.1868364089.0000000005785000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://pki-ocsp.symauth.com0 |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.0000000005731000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000003.1865439365.0000000003580000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000002.4199871290.00000000009F1000.00000020.00000001.01000000.00000003.sdmp |
String found in binary or memory: http://www.indyproject.org/ |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process Stats: CPU usage > 49% |
Source: mvSettings.ex#.exe |
Static PE information: Number of sections : 19 > 10 |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.00000000056FD000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs mvSettings.ex#.exe |
Source: mvSettings.ex#.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: mvSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9948508522727273 |
Source: mvSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9934663318452381 |
Source: mvSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9983177923387097 |
Source: mvSettings.ex#.exe |
Static PE information: Section: ZLIB complexity 0.9978506229957242 |
Source: mvSettings.ex#.exe |
Static PE information: Section: .reloc ZLIB complexity 1.5 |
Source: classification engine |
Classification label: mal100.troj.spyw.evad.winEXE@1/1@0/0 |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File created: C:\Users\user\Desktop\error.log |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Mutant created: \Sessions\1\BaseNamedObjects\fedd1d1122aa65028c81e16ceb85d9c73790a2fa |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: mvSettings.ex#.exe |
Virustotal: Detection: 30% |
Source: mvSettings.ex#.exe |
ReversingLabs: Detection: 26% |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: magnification.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: d3d9.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: security.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: secur32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: idndl.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: mvSettings.ex#.exe |
Static file information: File size 16323088 > 1048576 |
Source: mvSettings.ex#.exe |
Static PE information: Raw size of is bigger than: 0x100000 < 0x12e600 |
Source: mvSettings.ex#.exe |
Static PE information: Raw size of is bigger than: 0x100000 < 0x372600 |
Source: mvSettings.ex#.exe |
Static PE information: Raw size of .boot is bigger than: 0x100000 < 0x9cba00 |
Source: initial sample |
Static PE information: section where entry point is pointing to: .boot |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: |
Source: mvSettings.ex#.exe |
Static PE information: section name: .themida |
Source: mvSettings.ex#.exe |
Static PE information: section name: .boot |
Source: mvSettings.ex#.exe |
Static PE information: section name: entropy: 7.8974723923582095 |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Window searched: window name: RegmonClass |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Window searched: window name: FilemonClass |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Window searched: window name: PROCMON_WINDOW_CLASS |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
System information queried: FirmwareTableInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Section loaded: OutputDebugStringW count: 1948 |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Thread delayed: delay time: 180000 |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Window / User API: threadDelayed 9000 |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7928 |
Thread sleep time: -51000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7924 |
Thread sleep time: -180000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7924 |
Thread sleep time: -331000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe TID: 7924 |
Thread sleep time: -9000000s >= -30000s |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Thread delayed: delay time: 180000 |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\ |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\ |
Jump to behavior |
Source: mvSettings.ex#.exe, 00000000.00000003.1860741659.0000000003580000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: \SystemRoot\system32\ntkrnmp.exeSDT\VBOX__ 0 |
Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV |
Source: mvSettings.ex#.exe, 00000000.00000002.4200201255.00000000014BC000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: @Idassignednumbers@IdPORT_vmnet |
Source: mvSettings.ex#.exe, 00000000.00000003.1859388036.0000000003580000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: \SystemRoot\system32\ntkrnlmp.exeST\VBOX__ 0 |
Source: mvSettings.ex#.exe, 00000000.00000002.4200201255.00000000014BC000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: @Idassignednumbers@IdPORT_vmnet$@Idassignednumbers@IdPORT_genrad_mux |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
System information queried: ModuleInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process information queried: ProcessInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Thread information set: HideFromDebugger |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: regmonclass |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: gbdyllo |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: process monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: registry monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: procmon_window_class |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: ollydbg |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: filemonclass |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Open window title or class name: file monitor - sysinternals: www.sysinternals.com |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process queried: DebugPort |
Jump to behavior |
Source: C:\Users\user\Desktop\mvSettings.ex#.exe |
Process queried: DebugObjectHandle |
Jump to behavior |
Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managerome=m]? |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000574E000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: program manager chromelication5776468.zip |
Source: mvSettings.ex#.exe, 00000000.00000003.1874662923.0000000005BBD000.00000004.00001000.00020000.00000000.sdmp, mvSettings.ex#.exe, 00000000.00000002.4200201255.00000000014BC000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: @Winapi@Windows@DOF_PROGMAN |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000579F000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: Program Manager |
Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerI |
Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Managerpbx~n |
Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program ManagerotetaC |
Source: mvSettings.ex#.exe, 00000000.00000002.4203864762.00000000035D8000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Program Manageromeom |
Source: Yara match |
File source: Process Memory Space: mvSettings.ex#.exe PID: 7636, type: MEMORYSTR |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000574E000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: /C:\Users\user\AppData\Roaming\Electrum\wallets |
Source: mvSettings.ex#.exe, 00000000.00000003.1864922909.00000000056A0000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 3com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldb |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000571A000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 3C:\Users\user\AppData\Roaming\Exodus\exodus.wallet |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.000000000571A000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 0C:\Users\user\AppData\Roaming\Ethereum\keystore |
Source: mvSettings.ex#.exe, 00000000.00000003.1864922909.00000000056A0000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: pnl_exodush |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.00000000056F6000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: ethereum |
Source: mvSettings.ex#.exe, 00000000.00000002.4204035112.0000000005738000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: 4C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsp |
Source: mvSettings.ex#.exe, 00000000.00000003.1864922909.00000000056A0000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: Ethereum\keystore |
Source: Yara match |
File source: Process Memory Space: mvSettings.ex#.exe PID: 7636, type: MEMORYSTR |
Source: Yara match |
File source: Process Memory Space: mvSettings.ex#.exe PID: 7636, type: MEMORYSTR |