Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Newtonsoft.dll

Overview

General Information

Sample name:Newtonsoft.dll
(renamed file extension from Json to dll)
Original sample name:Newtonsoft.Json
Analysis ID:1431806
MD5:195ffb7167db3219b217c4fd439eedd6
SHA1:1e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256:e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

.NET source code contains potential unpacker
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample is a C# Dll, sample needs to be analyzed in a .Net context
  • System is w10x64
  • loaddll32.exe (PID: 6756 cmdline: loaddll32.exe "C:\Users\user\Desktop\Newtonsoft.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6904 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6984 cmdline: rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: Newtonsoft.dllStatic PE information: certificate valid
Source: Newtonsoft.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: Newtonsoft.dll
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: Newtonsoft.dll
Source: Newtonsoft.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Newtonsoft.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertCSRSA4096RootG5.crt0E
Source: Newtonsoft.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Newtonsoft.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Newtonsoft.dllString found in binary or memory: http://cacerts.digicert.com/NETFoundationProjectsCodeSigningCA2.crt0
Source: Newtonsoft.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Newtonsoft.dllString found in binary or memory: http://crl3.digicert.com/DigiCertCSRSA4096RootG5.crl0
Source: Newtonsoft.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Newtonsoft.dllString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Newtonsoft.dllString found in binary or memory: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0F
Source: Newtonsoft.dllString found in binary or memory: http://crl4.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0=
Source: Newtonsoft.dllString found in binary or memory: http://james.newtonking.com/projects/json
Source: Newtonsoft.dllString found in binary or memory: http://ocsp.digicert.com0A
Source: Newtonsoft.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: Newtonsoft.dllString found in binary or memory: http://ocsp.digicert.com0O
Source: Newtonsoft.dllString found in binary or memory: http://ocsp.digicert.com0X
Source: Newtonsoft.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: Newtonsoft.dllString found in binary or memory: https://github.com/JamesNK/Newtonsoft.Json
Source: Newtonsoft.dllString found in binary or memory: https://www.newtonsoft.com/json
Source: Newtonsoft.dllString found in binary or memory: https://www.newtonsoft.com/jsonschema
Source: Newtonsoft.dllString found in binary or memory: https://www.nuget.org/packages/Newtonsoft.Json.Bson
Source: Newtonsoft.dllBinary or memory string: OriginalFilenameNewtonsoft.Json.dll2 vs Newtonsoft.dll
Source: classification engineClassification label: sus22.evad.winDLL@6/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6784:120:WilError_03
Source: Newtonsoft.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Newtonsoft.dllStatic file information: TRID: Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 50.14%
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\Newtonsoft.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: Newtonsoft.dllStatic PE information: certificate valid
Source: Newtonsoft.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Newtonsoft.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Newtonsoft.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdbSHA256 source: Newtonsoft.dll
Source: Binary string: /_/Src/Newtonsoft.Json/obj/Release/net45/Newtonsoft.Json.pdb source: Newtonsoft.dll

Data Obfuscation

barindex
Source: Newtonsoft.dll, DynamicUtils.cs.Net Code: CreateSharpArgumentInfoArray
Source: Newtonsoft.dll, LateBoundReflectionDelegateFactory.cs.Net Code: CreateDefaultConstructor
Source: Newtonsoft.dllStatic PE information: 0xB73F2470 [Fri Jun 3 23:17:04 2067 UTC]
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1Jump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1431806 Sample: Newtonsoft.Json Startdate: 25/04/2024 Architecture: WINDOWS Score: 22 15 .NET source code contains potential unpacker 2->15 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        process5 13 rundll32.exe 9->13         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Newtonsoft.dll0%ReversingLabs
Newtonsoft.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://james.newtonking.com/projects/json0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.newtonsoft.com/jsonNewtonsoft.dllfalse
    high
    https://www.nuget.org/packages/Newtonsoft.Json.BsonNewtonsoft.dllfalse
      high
      http://james.newtonking.com/projects/jsonNewtonsoft.dllfalse
      • URL Reputation: safe
      unknown
      https://www.newtonsoft.com/jsonschemaNewtonsoft.dllfalse
        high
        https://github.com/JamesNK/Newtonsoft.JsonNewtonsoft.dllfalse
          high
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1431806
          Start date and time:2024-04-25 20:03:12 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 2m 13s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Newtonsoft.dll
          (renamed file extension from Json to dll)
          Original Sample Name:Newtonsoft.Json
          Detection:SUS
          Classification:sus22.evad.winDLL@6/0@0/0
          EGA Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Stop behavior analysis, all processes terminated
          • Not all processes where analyzed, report is missing behavior information
          TimeTypeDescription
          20:04:05API Interceptor1x Sleep call for process: loaddll32.exe modified
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):5.967185619483575
          TrID:
          • Win32 Dynamic Link Library (generic) Net Framework (1011504/3) 50.14%
          • Win32 Dynamic Link Library (generic) (1002004/3) 49.67%
          • Generic Win/DOS Executable (2004/3) 0.10%
          • DOS Executable Generic (2002/1) 0.10%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Newtonsoft.dll
          File size:711'952 bytes
          MD5:195ffb7167db3219b217c4fd439eedd6
          SHA1:1e76e6099570ede620b76ed47cf8d03a936d49f8
          SHA256:e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
          SHA512:56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
          SSDEEP:12288:GBja5bBvR8Q0TE2HB0WLmvXbsVG1Gw03RzxNHgKhwFBkjSHXP36RMGy1NqTUO:GBjk38WuBcAbwoA/BkjSHXP36RMG/
          TLSH:66E4394123F98F2BE1AF6B75B4704E1543F9F917A6B5E78F9A04D9A91C43B408E403A3
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...p$?..........." ..0.............B.... ........... ....................... ............`................................
          Icon Hash:7ae282899bbab082
          Entrypoint:0x100ac042
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x10000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0xB73F2470 [Fri Jun 3 23:17:04 2067 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:dae02f32a21e03ce65412f6e56942daa
          Signature Valid:true
          Signature Issuer:CN=.NET Foundation Projects Code Signing CA2, O=.NET Foundation, C=US
          Signature Validation Error:The operation completed successfully
          Error Number:0
          Not Before, Not After
          • 13/08/2021 01:00:00 29/10/2024 23:59:59
          Subject Chain
          • CN=Json.NET (.NET Foundation), O=Json.NET (.NET Foundation), L=Redmond, S=Washington, C=US, SERIALNUMBER=603 389 068, OID.1.3.6.1.4.1.311.60.2.1.2=Washington, OID.1.3.6.1.4.1.311.60.2.1.3=US, OID.2.5.4.15=Private Organization
          Version:3
          Thumbprint MD5:0D202C238B454A049A3A715FADC70F7D
          Thumbprint SHA-1:667E87438D93824A8042D1E7C934BDD7F519C44E
          Thumbprint SHA-256:D60F9A9BD35829CCF4684D4B1E0B62EB3D982FCD55159F337348BB18EA25B8A7
          Serial:0CD1407A5ABDED43D5C173121D38C529
          Instruction
          jmp dword ptr [10002000h]
          or al, 00h
          add byte ptr [eax], al
          push es
          add byte ptr [eax], al
          add byte ptr [edi], al
          add byte ptr [eax], al
          add byte ptr [eax], cl
          add byte ptr [eax], al
          add byte ptr [0D000000h], al
          add byte ptr [eax], al
          add byte ptr [ecx], cl
          add byte ptr [eax], al
          add byte ptr [esi], cl
          add byte ptr [eax], al
          add byte ptr [edi], cl
          add byte ptr [eax], al
          add byte ptr [ecx], dl
          add byte ptr [eax], al
          add byte ptr [eax], dl
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [edx], ah
          add byte ptr [edi], ah
          add byte ptr [eax+eax], bh
          add byte ptr [esi], ah
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [edx], al
          add byte ptr [eax], al
          add byte ptr [edx], al
          add byte ptr [eax], al
          add byte ptr [ecx], cl
          add byte ptr [eax], al
          add byte ptr [ecx], cl
          add byte ptr [eax], al
          add byte ptr [edx], al
          add byte ptr [eax], al
          add byte ptr [edx], al
          add byte ptr [eax], al
          add byte ptr [edx], al
          add byte ptr [eax], al
          add byte ptr [edx], al
          add byte ptr [eax], al
          add byte ptr [ecx], cl
          add byte ptr [eax], al
          add byte ptr [ecx], cl
          add byte ptr [eax], al
          add byte ptr [esi], al
          add byte ptr [eax], al
          add byte ptr [edi], al
          add byte ptr [eax], al
          add byte ptr [eax], cl
          add byte ptr [eax], al
          add byte ptr [0D000000h], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax+eax], al
          add byte ptr [eax], al
          add al, 00h
          add byte ptr [eax], al
          or dword ptr [eax], eax
          add byte ptr [eax], al
          or dword ptr [eax], eax
          add byte ptr [eax], al
          add al, 00h
          add byte ptr [eax], al
          add al, 00h
          add byte ptr [eax], al
          add al, 00h
          add byte ptr [eax], al
          add al, 00h
          add byte ptr [eax], al
          or dword ptr [eax], eax
          add byte ptr [eax], al
          or dword ptr [eax], eax
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0xabff00x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x4b4.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0xaae000x2f10
          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0xabf200x54.text
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000xaa3100xaa400b617b6ad4de89c85c99f52ab0454f0e9False0.3718236623531571data5.931528908377675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0xae0000x4b40x600d2f99adc24ac828a3d2bafebbc6f35b0False0.34375data2.804217239420186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0xb00000xc0x200c1bdec0a5a718409351d2965bd974f4dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0xae0580x456data0.44144144144144143
          DLLImport
          mscoree.dll_CorDllMain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:20:04:05
          Start date:25/04/2024
          Path:C:\Windows\System32\loaddll32.exe
          Wow64 process (32bit):true
          Commandline:loaddll32.exe "C:\Users\user\Desktop\Newtonsoft.dll"
          Imagebase:0x910000
          File size:126'464 bytes
          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:1
          Start time:20:04:05
          Start date:25/04/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:2
          Start time:20:04:05
          Start date:25/04/2024
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
          Imagebase:0x240000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:20:04:05
          Start date:25/04/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:rundll32.exe "C:\Users\user\Desktop\Newtonsoft.dll",#1
          Imagebase:0xbe0000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          No disassembly