Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5490 RtlAllocateHeap,RtlAllocateHeap,wcscpy,wcslen,FindFirstFileExW,wcscpy,wcsrchr,wcslen,wcscpy,GetFileAttributesW,PathIsDirectoryEmptyW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE5490 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE67AD RtlAllocateHeap,RtlAllocateHeap,wcscpy,GetFileAttributesW,PathAddBackslashW,wcslen,FindFirstFileExW,wcscpy,wcslen,wcscpy,_wcsicmp,wcsstr,wcsstr,GetFileAttributesW,wcsrchr,FindNextFileW,FindClose,wcsrchr,wcsrchr,PathIsDirectoryEmptyW,RemoveDirectoryW,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE67AD |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE525B wcscpy,wcslen,FindFirstFileExW,wcscpy,wcsrchr,wcscpy,FindNextFileW,FindClose, |
0_2_00CE525B |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5368 wcscpy,wcslen,FindFirstFileExW,wcscpy,wcslen,wcscpy,FindNextFileW,FindClose, |
0_2_00CE5368 |
Source: powershell.exe, 00000006.00000002.287565271.00000165FE112000.00000004.00000001.sdmp |
String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: README.418990b0.TXT.0.dr |
String found in binary or memory: http://darksidfqzcuhtk2.onion/CZEX8E0GR0AO4ASUCJE1K824OKJA1G24B8B3G0P84LJTTE7W8EC86JBE7NBXLMRT |
Source: powershell.exe, 00000006.00000002.284710832.00000165901A3000.00000004.00000001.sdmp |
String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000006.00000002.280232531.0000016580211000.00000004.00000001.sdmp |
String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000006.00000002.279994844.0000016580001000.00000004.00000001.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000006.00000002.280232531.0000016580211000.00000004.00000001.sdmp |
String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000006.00000002.284710832.00000165901A3000.00000004.00000001.sdmp |
String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000006.00000002.284710832.00000165901A3000.00000004.00000001.sdmp |
String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000006.00000002.284710832.00000165901A3000.00000004.00000001.sdmp |
String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000006.00000002.280232531.0000016580211000.00000004.00000001.sdmp |
String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000006.00000002.282581454.000001658117D000.00000004.00000001.sdmp |
String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000006.00000002.284710832.00000165901A3000.00000004.00000001.sdmp |
String found in binary or memory: https://nuget.org/nuget.exe |
Source: rUUR0qQI22.exe, 00000000.00000002.431464752.0000000003855000.00000004.00000001.sdmp, rUUR0qQI22.exe, 00000000.00000002.431628037.00000000038C0000.00000004.00000001.sdmp |
String found in binary or memory: https://securebestapp20.com/jVPuJOnhRSBl |
Source: rUUR0qQI22.exe, 00000000.00000002.431628037.00000000038C0000.00000004.00000001.sdmp |
String found in binary or memory: https://securebestapp20.com/jVPuJOnhRSBlO |
Source: README.418990b0.TXT.0.dr |
String found in binary or memory: https://torproject.org/ |
Source: Yara match |
File source: 00000000.00000003.293094493.00000000007DC000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.292893139.00000000007DC000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.256370495.00000000007DC000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.209248518.00000000007E9000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.292412422.00000000007DC000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.290688765.00000000007DC000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.210042199.00000000007E9000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000003.209243107.00000000007C6000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000000.00000002.428838029.00000000007AA000.00000004.00000020.sdmp, type: MEMORY |
Source: Yara match |
File source: C:\README.418990b0.TXT, type: DROPPED |
Source: Yara match |
File source: C:\README.418990b0.TXT, type: DROPPED |
Source: Yara match |
File source: C:\README.418990b0.TXT, type: DROPPED |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE4255 CreateFontW,RtlFreeHeap,SelectObject,RtlAllocateHeap,_swprintf,GetTextExtentPoint32W,SelectObject,SetTextColor,SetBkMode,SetBkColor,DrawTextW,SelectObject,SHGetSpecialFolderPathW,PathAddBackslashW,wcscat,wcslen,CreateFileW,WriteFile,WriteFile,WriteFile,CloseHandle,RegOpenKeyExW,wcslen,RegSetValueExW,wcslen,RegSetValueExW,SystemParametersInfoW,RtlFreeHeap,RtlFreeHeap,RtlFreeHeap,RegCloseKey,CloseHandle,DeleteObject,DeleteObject,RtlFreeHeap,DeleteObject,DeleteDC,DeleteDC, |
0_2_00CE4255 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE4DDA RtlAllocateHeap,NtQuerySystemInformation,RtlReAllocateHeap,RtlFreeHeap,_wcslwr,wcsstr,OpenProcess,TerminateProcess,CloseHandle,wcslen,RtlFreeHeap, |
0_2_00CE4DDA |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE7E5D NtSetInformationThread,IsUserAnAdmin,GetCommandLineW,CommandLineToArgvW,_wcsicmp,wcsrchr,_wcsicmp,wcsrchr,_wcsicmp,OpenMutexW,CreateMutexW,CloseHandle,CloseHandle,CloseHandle, |
0_2_00CE7E5D |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE4C32 NtSetInformationProcess,NtSetInformationProcess, |
0_2_00CE4C32 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE57E5 wcsrchr,GetCurrentProcessId,RtlAllocateHeap,NtQuerySystemInformation,RtlReAllocateHeap,RtlFreeHeap,RtlAllocateHeap,OpenProcess,DuplicateHandle,wcsrchr,_wcsicmp,RtlAllocateHeap,NtQueryInformationProcess,wcsrchr,_wcsicmp,wcslen,CloseHandle,TerminateProcess,WaitForSingleObject,CloseHandle,RtlFreeHeap,CloseHandle,CloseHandle,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE57E5 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE56F9 CreateFileW,RtlAllocateHeap,NtQuerySystemInformation,RtlReAllocateHeap,GetCurrentProcessId,RtlFreeHeap,CloseHandle, |
0_2_00CE56F9 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5787 NtQuerySystemInformation,GetCurrentProcessId,RtlFreeHeap,CloseHandle, |
0_2_00CE5787 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE285C NtQueryInformationProcess, |
0_2_00CE285C |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE585D NtQuerySystemInformation,RtlAllocateHeap,OpenProcess,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE585D |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5650 NtQueryInformationFile, |
0_2_00CE5650 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5765 NtQuerySystemInformation,GetCurrentProcessId,RtlFreeHeap,CloseHandle, |
0_2_00CE5765 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE587F NtQuerySystemInformation,RtlAllocateHeap,OpenProcess,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE587F |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE380C GetWindowsDirectoryW,wcscat,wcscat,NtAllocateVirtualMemory,wcscpy,RtlEnterCriticalSection,RtlInitUnicodeString,RtlInitUnicodeString,RtlLeaveCriticalSection,LdrEnumerateLoadedModules, |
0_2_00CE380C |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE4E18 NtQuerySystemInformation,_wcslwr,wcsstr,OpenProcess,TerminateProcess,CloseHandle,RtlFreeHeap, |
0_2_00CE4E18 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE4E3A NtQuerySystemInformation,_wcslwr,wcsstr,OpenProcess,TerminateProcess,CloseHandle,RtlFreeHeap, |
0_2_00CE4E3A |
Source: rUUR0qQI22.exe, type: SAMPLE |
Matched rule: Unspecified_Malware_Sep1_A1 date = 2017-09-12, hash1 = 28143c7638f22342bff8edcd0bedd708e265948a5fcca750c302e2dca95ed9f0, author = Florian Roth, description = Detects malware from DrqgonFly APT report, reference = https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.rUUR0qQI22.exe.ce0000.1.unpack, type: UNPACKEDPE |
Matched rule: Unspecified_Malware_Sep1_A1 date = 2017-09-12, hash1 = 28143c7638f22342bff8edcd0bedd708e265948a5fcca750c302e2dca95ed9f0, author = Florian Roth, description = Detects malware from DrqgonFly APT report, reference = https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.0.rUUR0qQI22.exe.ce0000.0.unpack, type: UNPACKEDPE |
Matched rule: Unspecified_Malware_Sep1_A1 date = 2017-09-12, hash1 = 28143c7638f22342bff8edcd0bedd708e265948a5fcca750c302e2dca95ed9f0, author = Florian Roth, description = Detects malware from DrqgonFly APT report, reference = https://www.symantec.com/connect/blogs/dragonfly-western-energy-sector-targeted-sophisticated-attack-group, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5490 RtlAllocateHeap,RtlAllocateHeap,wcscpy,wcslen,FindFirstFileExW,wcscpy,wcsrchr,wcslen,wcscpy,GetFileAttributesW,PathIsDirectoryEmptyW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE5490 |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE67AD RtlAllocateHeap,RtlAllocateHeap,wcscpy,GetFileAttributesW,PathAddBackslashW,wcslen,FindFirstFileExW,wcscpy,wcslen,wcscpy,_wcsicmp,wcsstr,wcsstr,GetFileAttributesW,wcsrchr,FindNextFileW,FindClose,wcsrchr,wcsrchr,PathIsDirectoryEmptyW,RemoveDirectoryW,RtlFreeHeap,RtlFreeHeap, |
0_2_00CE67AD |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE525B wcscpy,wcslen,FindFirstFileExW,wcscpy,wcsrchr,wcscpy,FindNextFileW,FindClose, |
0_2_00CE525B |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
Code function: 0_2_00CE5368 wcscpy,wcslen,FindFirstFileExW,wcscpy,wcslen,wcscpy,FindNextFileW,FindClose, |
0_2_00CE5368 |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\ VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Queries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\58ea1f927c503c2b_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOCK |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\MANIFEST-000001 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\index |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\000003.log |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\5febb783fe057117_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\33d102032f141cd7_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\CURRENT |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\fee6704ec67d5ed1_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Current Session |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000003.log |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\000003.log |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\the-real-index |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000003.log |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\000003.log |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\CURRENT |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000009 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\MANIFEST-000002 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000008 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOCK |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000007 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000006 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000001 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_3 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000005 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_2 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000004 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_1 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\f_000003 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\data_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\181db4280bb3db70_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG.old |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies-journal |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\fc9785cdcbaea0b7_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOCK |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\e868dd9b-f73d-43ab-8047-36e4bd92d922\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\LOCK |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\CURRENT |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\78ce8e30f78a2d10_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Current Tabs |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\MANIFEST-000001 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\LOG |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\e868dd9b-f73d-43ab-8047-36e4bd92d922 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\MANIFEST-000001 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules\CURRENT |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State\MANIFEST-000001 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\NULL |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOCK |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\244f905c10de3c26_0 |
Jump to behavior |
Source: C:\Users\user\Desktop\rUUR0qQI22.exe |
File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT |
Jump to behavior |