Windows
Analysis Report
mvSettings.ex#.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- mvSettings.ex#.exe (PID: 7636 cmdline:
"C:\Users\ user\Deskt op\mvSetti ngs.ex#.ex e" MD5: 7ED567C4CCA924BF8211F892B294C274)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_MicroClip | Yara detected MicroClip | Joe Security |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Section loaded: |
Source: | File opened: | Jump to behavior |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 521 Security Software Discovery | Remote Services | 1 Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 441 Virtualization/Sandbox Evasion | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Software Packing | Security Account Manager | 441 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Obfuscated Files or Information | Cached Domain Credentials | 2 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
31% | Virustotal | Browse | ||
26% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Avira | TR/Crypt.ZPACK.Gen | ||
100% | Joe Sandbox ML |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579335 |
Start date and time: | 2024-12-21 18:59:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 1s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | mvSettings.ex#.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/1@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
Time | Type | Description |
---|---|---|
13:00:24 | API Interceptor |
Process: | C:\Users\user\Desktop\mvSettings.ex#.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68 |
Entropy (8bit): | 4.570150019342491 |
Encrypted: | false |
SSDEEP: | 3:HMMABc9IKRUeemm1t+WfWyEHgy:HMcIKCeS1wvyMgy |
MD5: | 9C12AD9574E78583F59F2FB6DC9F24F6 |
SHA1: | ECD3127C205D22D237264A01BCFB76484B4F7E1F |
SHA-256: | D05954F777FCAAD4BA3FA978F8E7259278632ACAE615027A94C338168956C737 |
SHA-512: | 533A91CADFC6F40A026C7F9C44C5A512E7EE16FB54E627C1A3DDC87A174E2140FA54EF32D9285730EC0C3FCE0C0F4707E1B883AC091C75C5ABC879C645F7702F |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.973830248529946 |
TrID: |
|
File name: | mvSettings.ex#.exe |
File size: | 16'323'088 bytes |
MD5: | 7ed567c4cca924bf8211f892b294c274 |
SHA1: | 5da6b8fba3a72dde927d8e10e282df1b0b5dea55 |
SHA256: | 0475fce6275c3c2b7d920bf219cf269899fb7be81ad17da1cd8fbf61a0303f05 |
SHA512: | 89441afa24a607b66053de9c90c8f4e59c90f8c4cd4b61914f34624428fb0213ae29bfcccb7638ffea4fc24a657573038703aa8047498053648cc5a0c4eb2ba5 |
SSDEEP: | 393216:SWvb8z/j+eRP+XvlDoa8f5YRqOU3+5eGcx+kHuecwb5sX:S0O/DkflDoxIvU3+MekON0g |
TLSH: | 35F633D2C885B856C2D58372351F9C3AC9A7AEA27E15412DB4AFF641803D84DEFB47E0 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 6969ccc4cce8698c |
Entrypoint: | 0x2579058 |
Entrypoint Section: | .boot |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x675B5C58 [Thu Dec 12 21:57:44 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | a40063ea92d50d06089bbce29ca8b0fd |
Instruction |
---|
call 00007FCF70BA2B30h |
push ebx |
mov ebx, esp |
push ebx |
mov esi, dword ptr [ebx+08h] |
mov edi, dword ptr [ebx+10h] |
cld |
mov dl, 80h |
mov al, byte ptr [esi] |
inc esi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FCF70BA29CCh |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FCF70BA2A33h |
xor eax, eax |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jnc 00007FCF70BA2AC7h |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
je 00007FCF70BA29EAh |
push edi |
mov eax, eax |
sub edi, eax |
mov al, byte ptr [edi] |
pop edi |
mov byte ptr [edi], al |
inc edi |
mov ebx, 00000002h |
jmp 00007FCF70BA297Bh |
mov eax, 00000001h |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc eax, eax |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007FCF70BA29CCh |
sub eax, ebx |
mov ebx, 00000001h |
jne 00007FCF70BA2A0Ah |
mov ecx, 00000001h |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
adc ecx, ecx |
add dl, dl |
jne 00007FCF70BA29E7h |
mov dl, byte ptr [esi] |
inc esi |
adc dl, dl |
jc 00007FCF70BA29CCh |
push esi |
mov esi, edi |
sub esi, ebp |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x12ca000 | 0x73 | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x12cb19c | 0x184 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x12cd000 | 0x509c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2b45000 | 0x10 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x12cc068 | 0x18 | .tls |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x37f000 | 0x60ee | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
0x1000 | 0x34b198 | 0x12e600 | b111f1af32c5b0202c3ee527cfbbd5f8 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x34d000 | 0x28f8 | 0x1600 | 3645534357ac8b556f6b11f46694f399 | False | 0.9948508522727273 | data | 7.8974723923582095 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | |
0x350000 | 0x22d3c | 0xa800 | d93b469406fe57410afdfdeae022f599 | False | 0.9934663318452381 | data | 7.955972337739917 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
.bss | 0x373000 | 0x74e4 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
0x37b000 | 0x393e | 0x600 | a584fbeff8225ce74f2116f8a48d95c2 | False | 0.8125 | data | 6.58116453489002 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x37f000 | 0x60ee | 0x1a00 | 712369e0249a1901f467faed6b146f59 | False | 0.927734375 | data | 7.814094093097584 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | |
0x386000 | 0x73 | 0x200 | ad090d7b226563e30434a819aa26e8a2 | False | 0.375 | data | 2.9385263591843103 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
.tls | 0x387000 | 0x54 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
0x388000 | 0x5d | 0x200 | bde9c6246e9778893c183c35f31514c4 | False | 0.7578125 | data | 5.6035935754938 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x389000 | 0x4666c | 0x26c00 | 4d4ba9e733159e980b56e4d3cff5dc01 | False | 0.9983177923387097 | data | 7.9740322138055655 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | |
0x3d0000 | 0x1de400 | 0xe9e00 | 07a6bc79da85d4553b585a9cd6f93d57 | False | 0.9978506229957242 | data | 7.952440464535689 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
0x5af000 | 0xd1a13b | 0x372600 | 3f13a9fbe4ca1b5811c59ed2a76a375b | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | |
.edata | 0x12ca000 | 0x1000 | 0x200 | 5a35a820278ce6d0503745e9fc85ba72 | False | 0.189453125 | data | 1.4374626627085825 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.idata | 0x12cb000 | 0x1000 | 0x400 | 30d972caa0aff4f920cb5a7eee5061ae | False | 0.390625 | data | 3.6763967434760203 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x12cc000 | 0x1000 | 0x200 | 17a6cd57598bde72e5e485cc6f6869d3 | False | 0.05078125 | data | 0.19615873848185583 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x12cd000 | 0x5200 | 0x5200 | c3fa72e2e5e873bb41a5d2798c37f7d7 | False | 0.10994664634146341 | data | 3.254409056559886 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.themida | 0x12d3000 | 0xea6000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.boot | 0x2179000 | 0x9cba00 | 0x9cba00 | bbf5799db27174b9cc3a693f218263c3 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.reloc | 0x2b45000 | 0x1000 | 0x10 | 8aad12564eafa86e59577bf3b6dc2a79 | False | 1.5 | GLS_BINARY_LSB_FIRST | 2.7334585933443494 | IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x12cd14c | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.04292631081719414 |
RT_STRING | 0x12d1384 | 0x3b8 | data | 0.4170168067226891 | ||
RT_GROUP_ICON | 0x12d174c | 0x14 | data | English | United States | 1.1 |
RT_VERSION | 0x12d1770 | 0x20c | data | English | United States | 0.4770992366412214 |
RT_MANIFEST | 0x12d198c | 0x70b | XML 1.0 document, ASCII text, with CRLF, LF line terminators | English | United States | 0.403771491957848 |
DLL | Import |
---|---|
kernel32.dll | GetModuleHandleA |
winspool.drv | DocumentPropertiesW |
comctl32.dll | ImageList_GetImageInfo |
shell32.dll | Shell_NotifyIconW |
user32.dll | MoveWindow |
version.dll | GetFileVersionInfoSizeW |
oleaut32.dll | SafeArrayPutElement |
advapi32.dll | RegSetValueExW |
msvcrt.dll | isupper |
WTSAPI32.DLL | WTSUnRegisterSessionNotification |
ole32.dll | IsEqualGUID |
gdi32.dll | Pie |
Magnification.dll | MagSetWindowSource |
Name | Ordinal | Address |
---|---|---|
__dbk_fcall_wrapper | 2 | 0x4119f8 |
dbkFCallWrapperAddr | 1 | 0x776644 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 13:00:06 |
Start date: | 21/12/2024 |
Path: | C:\Users\user\Desktop\mvSettings.ex#.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9f0000 |
File size: | 16'323'088 bytes |
MD5 hash: | 7ED567C4CCA924BF8211F892B294C274 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | false |