Source: onedrive.bat.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: onedrive.bat.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: |
Binary string: powershell.pdbUGP source: onedrive.bat.exe |
Source: |
Binary string: powershell.pdb source: onedrive.bat.exe |
Source: onedrive.bat.exe |
Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: onedrive.bat.exe, 00000001.00000000.890072128.0000000000D14000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe |
Source: onedrive.bat.exe |
Binary or memory string: OriginalFilenamePowerShell.EXEj% vs onedrive.bat.exe |
Source: onedrive.bat.exe |
Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Source: classification engine |
Classification label: clean1.winEXE@1/0@0/0 |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT |
Source: onedrive.bat.exe |
Static PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE |
Source: onedrive.bat.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG |
Source: |
Binary string: powershell.pdbUGP source: onedrive.bat.exe |
Source: |
Binary string: powershell.pdb source: onedrive.bat.exe |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |
Source: all processes |
Thread injection, dropped files, key value created, disk infection and DNS query: no activity detected |