Edit tour
Windows
Analysis Report
MediaCreationTool.bat
Overview
General Information
Detection
Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Powershell uses Background Intelligent Transfer Service (BITS)
Self deletion via cmd or bat file
Sigma detected: PowerShell Base64 Encoded IEX Cmdlet
Uses cmd line tools excessively to alter registry or file data
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Too many similar processes found
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64_ra
- cmd.exe (PID: 5560 cmdline:
C:\Windows \system32\ cmd.exe /c ""C:\User s\user\Des ktop\Media CreationTo ol.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6060 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 5232 cmdline:
chcp 437 MD5: 33395C4732A49065EA72590B14B64F32) - reg.exe (PID: 5720 cmdline:
reg add HK CU\Console /v ForceV 2 /d 0x01 /t reg_dwo rd /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 2224 cmdline:
reg add "H KCU\Consol e\MCT" /v ScreenColo rs /d 31 / t reg_dwor d /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 5668 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 00 /d 0x00 0000 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 5652 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 08 /d 0x76 7676 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 5628 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 01 /d 0x9e 5a00 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 1952 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 09 /d 0xff 783b /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 4756 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 02 /d 0x0e a113 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 3632 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 10 /d 0x0c c616 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 4216 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 03 /d 0xdd 963a /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6568 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 11 /d 0xd6 d661 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6848 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 04 /d 0x1f 0fc5 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 460 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 12 /d 0x56 48e7 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6548 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 05 /d 0x98 1788 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 2524 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 13 /d 0x9e 00b4 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 3552 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 06 /d 0x00 9cc1 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 3528 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 14 /d 0xa5 f1f9 /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6196 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 07 /d 0xcc cccc /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6836 cmdline:
reg add "H KCU\Consol e\MCT" /v ColorTable 15 /d 0xff ffff /t re g_dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 452 cmdline:
reg add "H KCU\Consol e\MCT" /v QuickEdit /d 0x000 0 /t reg_d word /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6684 cmdline:
reg add "H KCU\Consol e\MCT" /v LineWrap / d 0 /t reg _dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 4700 cmdline:
reg add "H KCU\Consol e\MCT" /v LineSelect ion /d 0x0 001 /t reg _dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 3680 cmdline:
reg add "H KCU\Consol e\MCT" /v CtrlKeySho rtcutsDisa bled /d 0 /t reg_dwo rd /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 4760 cmdline:
reg add "H KCU\Consol e\MCT" /v WindowSize /d 20972 72 /t reg_ dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 376 cmdline:
reg add "H KCU\Consol e\MCT" /v ScreenBuff erSize /d 655294584 /t reg_dwo rd /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 5372 cmdline:
reg add "H KCU\Consol e\MCT" /v FontSize /d 0x00100 008 /t reg _dword /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - reg.exe (PID: 6552 cmdline:
reg add "H KCU\Consol e\MCT" /v FaceName / d "Consola s" /t reg_ sz /f MD5: 227F63E1D9008B36BDBCC4B397780BE4) - attrib.exe (PID: 6740 cmdline:
attrib -R -S -H "C:\ ESD" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - Robocopy.exe (PID: 6920 cmdline:
robocopy " C:\Users\u ser\Deskto p\/" "C:\E SD/" "Medi aCreationT ool.bat" MD5: A4044E84AA1B75389DAA08398D90DFFD) - cmd.exe (PID: 6764 cmdline:
cmd /d /x /c set "RO OT=C:\User s\user\Des ktop" & ca ll "C:\ESD \MediaCrea tionTool.b at" set MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5664 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - chcp.com (PID: 3860 cmdline:
chcp 437 MD5: 33395C4732A49065EA72590B14B64F32) - attrib.exe (PID: 2888 cmdline:
attrib -R -S -H "C:\ ESD" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - Robocopy.exe (PID: 2952 cmdline:
robocopy " C:\ESD\/" "C:\ESD/" "MediaCrea tionTool.b at" MD5: A4044E84AA1B75389DAA08398D90DFFD) - cmd.exe (PID: 6344 cmdline:
C:\Windows \system32\ cmd.exe /c echo prom pt $h$s$h: |cmd /d MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 7016 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" ec ho prompt $h$s$h:" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2004 cmdline:
cmd /d MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 2948 cmdline:
C:\Windows \system32\ cmd.exe /c reg query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n" /v "Cur rentBuildN umber" /se "|" 2>nul MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - reg.exe (PID: 7012 cmdline:
reg query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion " /v "Curr entBuildNu mber" /se "|" MD5: 227F63E1D9008B36BDBCC4B397780BE4) - cmd.exe (PID: 6268 cmdline:
C:\Windows \system32\ cmd.exe /c reg query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n" /v "Dis playVersio n" /se "|" 2>nul MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - reg.exe (PID: 340 cmdline:
reg query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion " /v "Disp layVersion " /se "|" MD5: 227F63E1D9008B36BDBCC4B397780BE4) - cmd.exe (PID: 5464 cmdline:
C:\Windows \system32\ cmd.exe /c reg query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n" /v "Edi tionID" /s e "|" 2>nu l MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - reg.exe (PID: 1200 cmdline:
reg query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion " /v "Edit ionID" /se "|" MD5: 227F63E1D9008B36BDBCC4B397780BE4) - cmd.exe (PID: 1248 cmdline:
C:\Windows \system32\ cmd.exe /c reg query "HKLM\SOF TWARE\Micr osoft\Wind ows NT\Cur rentVersio n" /v "Pro ductName" /se "|" 2> nul MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - reg.exe (PID: 1036 cmdline:
reg query "HKLM\SOFT WARE\Micro soft\Windo ws NT\Curr entVersion " /v "Prod uctName" / se "|" MD5: 227F63E1D9008B36BDBCC4B397780BE4) - cmd.exe (PID: 6352 cmdline:
C:\Windows \system32\ cmd.exe /c reg query "HKU\S-1- 5-18\Contr ol Panel\D esktop\Mui Cached" /v "MachineP referredUI Languages" /se "|" 2 >nul MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - reg.exe (PID: 5704 cmdline:
reg query "HKU\S-1-5 -18\Contro l Panel\De sktop\MuiC ached" /v "MachinePr eferredUIL anguages" /se "|" MD5: 227F63E1D9008B36BDBCC4B397780BE4) - cmd.exe (PID: 5516 cmdline:
C:\Windows \system32\ cmd.exe /c cmd /q /v :on /c ech o !.:~2,1! MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 6996 cmdline:
cmd /q /v: on /c echo !.:~2,1! MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 1888 cmdline:
C:\Windows \system32\ cmd.exe /c cmd /q /v :on /c ech o !.:~2,1! MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - cmd.exe (PID: 4016 cmdline:
cmd /q /v: on /c echo !.:~2,1! MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - findstr.exe (PID: 3848 cmdline:
findstr /c :\ /a:f0 " Detected Media "\.. \c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 4532 cmdline:
findstr /c :\ /a:6f " en-US "\. .\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 7036 cmdline:
findstr /c :\ /a:9f " Enterpris e "\..\c n ul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 2204 cmdline:
findstr /c :\ /a:2f " x64 "\..\ c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 3492 cmdline:
findstr /c :\ /a:1f " 1 Auto Upg rade : MCT gets dete cted media , script a ssists set upprep for upgrading "\..\c nu l MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 6504 cmdline:
findstr /c :\ /a:1f " 2 Auto IS O : MCT g ets detect ed media, script ass ists makin g ISO here | C:ESD " \..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 4628 cmdline:
findstr /c :\ /a:1f " 3 Auto US B : MCT g ets detect ed media, script ass ists makin g USB stic k target " \..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 3944 cmdline:
findstr /c :\ /a:1f " 4 Select : MCT g ets select ed Edition , Language , Arch ont o specifie d target " \..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 1164 cmdline:
findstr /c :\ /a:1f " 5 MCT Defa ults : MCT runs unas sisted, cr eating med ia without script mo dification "\..\c nu l MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 5096 cmdline:
findstr /c :\ /a:17 " 1-4 adds t o media: P ID.txt, EI .cfg, $ISO $ dir, aut o.cmd for upgrade an d tpm chec ks "\..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 5816 cmdline:
findstr /c :\ /a:17 " can rename script: " \..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 6568 cmdline:
findstr /c :\ /a:1f " def MediaC reationToo l.bat"\..\ c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 6848 cmdline:
findstr /c :\ /a:17 " to always create un modified M CT media " \..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - cmd.exe (PID: 6544 cmdline:
C:\Windows \system32\ cmd.exe /c powershel l -nop -c ";$f0=[io. file]::Rea dAllText($ env:0); $0 =($f0-spli t '#\:CHOI CES2\:' ,3 )[1]; $1=$ env:1-repl ace'([`@$] )','`$1'; iex($0+$1) " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - powershell.exe (PID: 6960 cmdline:
powershell -nop -c " ;$f0=[io.f ile]::Read AllText($e nv:0); $0= ($f0-split '#\:CHOIC ES2\:' ,3) [1]; $1=$e nv:1-repla ce'([`@$]) ','`$1'; i ex($0+$1)" MD5: 04029E121A0CFA5991749937DD22A1D9) - fltMC.exe (PID: 4192 cmdline:
fltmc MD5: 6AB08CADCE7DF971A043DCD1257D7374) - attrib.exe (PID: 7036 cmdline:
attrib -R -S -H "C:\ ESD" /D MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - findstr.exe (PID: 2204 cmdline:
findstr /c :\ /a:f0 " Windows 1 1 Version "\..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 3492 cmdline:
findstr /c :\ /a:5f " 23H2 "\.. \c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 6504 cmdline:
findstr /c :\ /a:f1 " 22631.286 1.231204-0 538.23H2_n i_release_ svc_refres h "\..\c n ul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 1744 cmdline:
findstr /c :\ /a:6f " en-US "\. .\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 4756 cmdline:
findstr /c :\ /a:9f " Enterpris e "\..\c n ul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - findstr.exe (PID: 6692 cmdline:
findstr /c :\ /a:2f " x64 "\..\ c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - powershell.exe (PID: 4216 cmdline:
powershell -nop -c " ;$f0=[io.f ile]::Read AllText($e nv:0); $0= ($f0-split '#\:DOWNL OAD\:' ,3) [1]; $1=$e nv:1-repla ce'([`@$]) ','`$1'; i ex($0+$1)" MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 1388 cmdline:
powershell -nop -c " ;$f0=[io.f ile]::Read AllText($e nv:0); $0= ($f0-split '#\:DOWNL OAD\:' ,3) [1]; $1=$e nv:1-repla ce'([`@$]) ','`$1'; i ex($0+$1)" MD5: 04029E121A0CFA5991749937DD22A1D9) - expand.exe (PID: 7028 cmdline:
expand.exe -R produc ts11_23H2. cab -F:* . MD5: 3080AD9250254478269B486EC15C25FF) - findstr.exe (PID: 1304 cmdline:
findstr /c :\ /a:0f " Auto Upgr ade "\..\c nul MD5: 804A6AE28E88689E0CF1946A6CB3FEE5) - powershell.exe (PID: 1068 cmdline:
powershell -nop -c " ;$f0=[io.f ile]::Read AllText($e nv:0); $0= ($f0-split '#\:PRODU CTS_XML\:' ,3)[1]; $ 1=$env:1-r eplace'([` @$])','`$1 ';iex($0+$ 1)" MD5: 04029E121A0CFA5991749937DD22A1D9) - makecab.exe (PID: 364 cmdline:
makecab pr oducts.xml products. cab MD5: FF47E32B1B45D1DE2ECC39107B365563) - powershell.exe (PID: 640 cmdline:
powershell -nop -c " iex ([io.f ile]::Read AllText($e nv:0) -spl it '[:]gen erate_auto _cmd')[1]; " MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 552 cmdline:
powershell -nop -c " iex ([io.f ile]::Read AllText($e nv:0) -spl it '[:]gen erate_Auto Unattend_x ml')[1];" MD5: 04029E121A0CFA5991749937DD22A1D9) - Dism.exe (PID: 1984 cmdline:
dism /clea nup-wim MD5: EBCC4E59DE824F22C090F20168FB5EAE) - powershell.exe (PID: 2072 cmdline:
powershell -nop -c " iex ([io.f ile]::Read AllText($e nv:0) -spl it '[:]Ass isted_MCT' )[1];" MD5: 04029E121A0CFA5991749937DD22A1D9) - MediaCreationTool11_23H2.exe (PID: 6776 cmdline:
"C:\ESD\MC T\MediaCre ationTool1 1_23H2.exe " /SelfHos t /Action CreateMedi a /MediaLa ngCode en- US /MediaE dition Ent erprise /M ediaArch x 64 /Pkey D efer /Comp at IgnoreW arning /Mi grateDrive rs All /Re sizeRecove ryPartitio n Disable /ShowOOBE None /Tele metry Disa ble /Compa ctOS Disab le /Dynami cUpdate Di sable /Ski pSummary / Eula Accep t MD5: 25C9285C00EF7D41B28823A053A9A372) - SetupHost.exe (PID: 3608 cmdline:
"C:\$Windo ws.~WS\Sou rces\Setup Host.Exe" /Download /Web /Eula Accept /S elfhost "/ Action" "C reateMedia " "/MediaL angCode" " en-US" "/M ediaEditio n" "Enterp rise" "/Me diaArch" " x64" "/Pke y" "Defer" "/Compat" "IgnoreWa rning" "/M igrateDriv ers" "All" "/ResizeR ecoveryPar tition" "D isable" "/ ShowOOBE" "None" "/T elemetry" "Disable" "/CompactO S" "Disabl e" "/Dynam icUpdate" "Disable" "/SkipSumm ary" MD5: ED6DA1611D817426E4B7DE89FE458F76)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDecodeAndExecute | Yara detected Powershell decode and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security | ||
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
Source: | File created: | ||
Source: | File created: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 99_2_7036EA08 | |
Source: | Code function: | 99_2_703727A0 |
Source: | Code function: | 99_2_70372580 |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: |
Source: | Code function: | 99_2_703888F1 |
Source: | File created: |
Source: | Code function: | 99_2_70370B70 | |
Source: | Code function: | 99_2_70374EE0 | |
Source: | Code function: | 99_2_703706E0 | |
Source: | Code function: | 99_2_703616DC |
Source: | Process token adjusted: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process created: |
Source: | Binary string: |