Windows Analysis Report
MDE_File_Sample_d40d71effb912ebf90e190f862d1d86f16e1e4c6.zip

Overview

General Information

Sample name: MDE_File_Sample_d40d71effb912ebf90e190f862d1d86f16e1e4c6.zip
Analysis ID: 1523194
MD5: 434f24d28137d65158cc1f2f3884d15c
SHA1: 495059dba83d7261950e7d88a43d0e06744642bd
SHA256: 73d337681a668b086f3dd875f789c40093234361a1c01d99740130806758cbbd
Infos:

Detection

Score: 48
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for dropped file
Drops PE files
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
Queries the installation date of Windows

Classification

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Virustotal: Detection: 10% Perma Link
Source: unknown HTTPS traffic detected: 18.66.121.171:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 18.66.121.171:443 -> 192.168.2.16:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 18.66.121.171:443 -> 192.168.2.16:49708 version: TLS 1.2
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic DNS traffic detected: DNS query: d3vnxrgxbv8od6.cloudfront.net
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown HTTPS traffic detected: 18.66.121.171:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknown HTTPS traffic detected: 18.66.121.171:443 -> 192.168.2.16:49707 version: TLS 1.2
Source: unknown HTTPS traffic detected: 18.66.121.171:443 -> 192.168.2.16:49708 version: TLS 1.2
Source: classification engine Classification label: mal48.winZIP@7/3@1/4
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp File created: C:\Users\user\AppData\Local\Programs
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Mutant created: \Sessions\1\BaseNamedObjects\{c4b370a2-7bdd-4171-a11d-9b50cd52258f}I
Source: C:\Users\user\Desktop\$R11M6SU.exe File created: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp
Source: C:\Users\user\Desktop\$R11M6SU.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\$R11M6SU.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\$R11M6SU.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\Desktop\$R11M6SU.exe Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Key opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp File read: C:\Users\user\Desktop\desktop.ini
Source: C:\Windows\System32\rundll32.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
Source: unknown Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknown Process created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknown Process created: C:\Users\user\Desktop\$R11M6SU.exe "C:\Users\user\Desktop\$R11M6SU.exe"
Source: C:\Users\user\Desktop\$R11M6SU.exe Process created: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp "C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp" /SL5="$60266,875199,832512,C:\Users\user\Desktop\$R11M6SU.exe"
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process created: C:\Users\user\Desktop\$R11M6SU.exe "C:\Users\user\Desktop\$R11M6SU.exe" /SPAWNWND=$402B6 /NOTIFYWND=$60266
Source: C:\Users\user\Desktop\$R11M6SU.exe Process created: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp "C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp" /SL5="$502B4,875199,832512,C:\Users\user\Desktop\$R11M6SU.exe" /SPAWNWND=$402B6 /NOTIFYWND=$60266
Source: C:\Users\user\Desktop\$R11M6SU.exe Process created: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp "C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp" /SL5="$60266,875199,832512,C:\Users\user\Desktop\$R11M6SU.exe"
Source: C:\Users\user\Desktop\$R11M6SU.exe Process created: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp "C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp" /SL5="$502B4,875199,832512,C:\Users\user\Desktop\$R11M6SU.exe" /SPAWNWND=$402B6 /NOTIFYWND=$60266
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: version.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: netapi32.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: netutils.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: edputil.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: windows.staterepositoryps.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: appresolver.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: bcp47langs.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: slc.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: sppc.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: onecorecommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: pcacli.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Section loaded: sfc_os.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: version.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: netapi32.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: netutils.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: uxtheme.dll
Source: C:\Users\user\Desktop\$R11M6SU.exe Section loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: mpr.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: winhttp.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: wtsapi32.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: winsta.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: textshaping.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: dwmapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: shfolder.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: rstrtmgr.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ncrypt.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ntasn1.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: winhttpcom.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: webio.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: iphlpapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: winnsi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: dnsapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: rasadhlp.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: fwpuclnt.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: schannel.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: mskeyprotect.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ncryptsslp.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: msasn1.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: gpapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: dpapi.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Section loaded: ondemandconnroutehelper.dll
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Window found: window name: TSelectLanguageForm
Source: MDE_File_Sample_d40d71effb912ebf90e190f862d1d86f16e1e4c6.zip Static file information: File size 1240227 > 1048576
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp File created: C:\Users\user\AppData\Local\Temp\is-MKE94.tmp\botva2.dll Jump to dropped file
Source: C:\Users\user\Desktop\$R11M6SU.exe File created: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp File created: C:\Users\user\AppData\Local\Temp\is-MKE94.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\$R11M6SU.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\$R11M6SU.exe Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MKE94.tmp\botva2.dll Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-MKE94.tmp\_isetup\_setup64.tmp Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp TID: 2972 Thread sleep time: -60000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp TID: 6772 Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp TID: 2336 Thread sleep time: -30000s >= -30000s
Source: C:\Users\user\AppData\Local\Temp\is-I76QC.tmp\$R11M6SU.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDate
Source: C:\Users\user\AppData\Local\Temp\is-MEH4D.tmp\$R11M6SU.tmp Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs