Source: X.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
Source: X.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: |
Binary string: {app}\ssh.pdb source: X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp |
Source: |
Binary string: {app}\ssh.pdb@ source: X.tmp, 00000003.00000002.3372569786.000000000252F000.00000004.00001000.00020000.00000000.sdmp |
Source: X.exe, 00000002.00000003.2119892729.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://www.miltera.com.tr/ |
Source: X.exe, 00000002.00000002.3371761817.00000000022F6000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://www.miltera.com.tr/pf/ |
Source: X.tmp, 00000003.00000002.3372569786.0000000002536000.00000004.00001000.00020000.00000000.sdmp |
String found in binary or memory: http://www.miltera.com.tr/pfS |
Source: X.exe |
String found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU |
Source: X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.dr |
String found in binary or memory: https://www.innosetup.com/ |
Source: X.exe, 00000002.00000003.2121801938.000000007FB10000.00000004.00001000.00020000.00000000.sdmp, X.exe, 00000002.00000003.2121064243.00000000025F0000.00000004.00001000.00020000.00000000.sdmp, X.tmp, 00000003.00000000.2123412990.0000000000401000.00000020.00000001.01000000.00000004.sdmp, X.tmp.2.dr |
String found in binary or memory: https://www.remobjects.com/ps |
Source: X.tmp.2.dr |
Static PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows |
Source: X.exe, 00000002.00000003.2121064243.000000000271C000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFileName vs X.exe |
Source: X.exe, 00000002.00000003.2121801938.000000007FE39000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFileName vs X.exe |
Source: X.exe, 00000002.00000000.2119548651.0000000000504000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFileName vs X.exe |
Source: X.exe, 00000002.00000002.3371761817.00000000022D8000.00000004.00001000.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenamekernel32j% vs X.exe |
Source: X.exe |
Binary or memory string: OriginalFileName vs X.exe |
Source: X.exe |
Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
Source: classification engine |
Classification label: clean3.winEXE@3/2@0/0 |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
File created: C:\Users\user\AppData\Local\Programs |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
File created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization |
Jump to behavior |
Source: X.exe |
String found in binary or memory: /LOADINF="filename" |
Source: C:\Users\user\Desktop\X.exe |
File read: C:\Users\user\Desktop\X.exe |
Jump to behavior |
Source: unknown |
Process created: C:\Users\user\Desktop\X.exe "C:\Users\user\Desktop\X.exe" |
|
Source: C:\Users\user\Desktop\X.exe |
Process created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe" |
|
Source: C:\Users\user\Desktop\X.exe |
Process created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp "C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp" /SL5="$10450,16263284,1034240,C:\Users\user\Desktop\X.exe" |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\Desktop\X.exe |
Section loaded: apphelp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: mpr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: version.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: netapi32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: wtsapi32.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: winsta.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: shfolder.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: rstrtmgr.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: textshaping.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Section loaded: dwmapi.dll |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32 |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Window found: window name: TMainForm |
Jump to behavior |
Source: Window Recorder |
Window detected: More than 3 window changes detected |
Source: X.exe |
Static file information: File size 17100882 > 1048576 |
Source: X.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Source: |
Binary string: {app}\ssh.pdb source: X.tmp, 00000003.00000003.2125501046.00000000034C0000.00000004.00001000.00020000.00000000.sdmp |
Source: |
Binary string: {app}\ssh.pdb@ source: X.tmp, 00000003.00000002.3372569786.000000000252F000.00000004.00001000.00020000.00000000.sdmp |
Source: X.exe |
Static PE information: section name: .didata |
Source: X.tmp.2.dr |
Static PE information: section name: .didata |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
File created: C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmp |
Jump to dropped file |
Source: C:\Users\user\Desktop\X.exe |
File created: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Jump to dropped file |
Source: C:\Users\user\Desktop\X.exe |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\AppData\Local\Temp\is-2QODD.tmp\X.tmp |
Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-RK0IT.tmp\_isetup\_setup64.tmp |
Jump to dropped file |