Loading ...

Play interactive tourEdit tour

Analysis Report V7F2H10gJw

Overview

General Information

Sample Name:V7F2H10gJw (renamed file extension from none to dll)
Analysis ID:346323
MD5:0562f10f0c926a05eb28d3579fc86663
SHA1:f75ad2980002d655410e7270825d51dcc53de0cc
SHA256:8794893f687e487bfafaf085154a5b932612d9de0825a3b392931d414b2c1985
Tags:Mingloa

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
PE file has a writeable .text section
Checks if the current process is being debugged
One or more processes crash
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6148 cmdline: loaddll32.exe 'C:\Users\user\Desktop\V7F2H10gJw.dll' MD5: 2D39D4DFDE8F7151723794029AB8A034)
    • WerFault.exe (PID: 4292 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6148 -s 612 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 6588 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 6608 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6576 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
          • rundll32.exe (PID: 4176 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
            • rundll32.exe (PID: 1256 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
              • rundll32.exe (PID: 5992 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                • rundll32.exe (PID: 6132 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                  • rundll32.exe (PID: 5212 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                    • rundll32.exe (PID: 6464 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                      • rundll32.exe (PID: 5708 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                        • rundll32.exe (PID: 6788 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                          • rundll32.exe (PID: 6688 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                            • rundll32.exe (PID: 6768 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                              • rundll32.exe (PID: 6656 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                                • rundll32.exe (PID: 6792 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                                  • rundll32.exe (PID: 6760 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                                    • rundll32.exe (PID: 6552 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                                      • rundll32.exe (PID: 6916 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                                        • rundll32.exe (PID: 7028 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                                          • rundll32.exe (PID: 6860 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5788 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 5688 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 5624 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
          • rundll32.exe (PID: 6684 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
            • rundll32.exe (PID: 6716 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
              • rundll32.exe (PID: 6784 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                • rundll32.exe (PID: 6672 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                  • rundll32.exe (PID: 6828 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                    • rundll32.exe (PID: 6932 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                      • rundll32.exe (PID: 7036 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
                        • rundll32.exe (PID: 6996 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6648 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 6536 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6912 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
          • rundll32.exe (PID: 7012 cmdline: rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
V7F2H10gJw.dllAPT34_PICKPOCKETunknownunknown
  • 0x1ffc9c:$s2: \nss3.dll
  • 0x248d10:$s2: \nss3.dll
  • 0x3fb4f0:$s4: | %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
  • 0x1cfd44:$s5: \Login Data
  • 0x1cfe34:$s5: \Login Data
  • 0x1cff24:$s5: \Login Data
  • 0x1d0064:$s5: \Login Data
  • 0x1d0274:$s5: \Login Data
  • 0x1d02f4:$s5: \Login Data
  • 0x1d0374:$s5: \Login Data
  • 0x1d0438:$s5: \Login Data
  • 0x1d0634:$s5: \Login Data
  • 0x1d0744:$s5: \Login Data
  • 0x1d08d4:$s5: \Login Data
  • 0x1d0944:$s5: \Login Data
  • 0x1ffd10:$s6: %s\Mozilla\Firefox\profiles.ini
  • 0x248d90:$s6: %s\Mozilla\Firefox\profiles.ini
  • 0x1cfd45:$s7: Login Data
  • 0x1cfe35:$s7: Login Data
  • 0x1cff25:$s7: Login Data
  • 0x1d0065:$s7: Login Data

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: V7F2H10gJw.dllVirustotal: Detection: 20%Perma Link
Source: V7F2H10gJw.dllReversingLabs: Detection: 44%
Machine Learning detection for sampleShow sources
Source: V7F2H10gJw.dllJoe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE filesShow sources
Source: V7F2H10gJw.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Binary contains paths to debug symbolsShow sources
Source: Binary string: winhttp.pdbV source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wininet.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000003.00000003.678504903.0000000005912000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: crypt32.pdbN source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wldap32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.678504903.0000000005912000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.674734776.0000000003688000.00000004.00000001.sdmp
Source: Binary string: version.pdb\ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wldap32.pdb~ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.674970320.000000000367C000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: msasn1.pdbp source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdbh source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdbb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: f:\sys\objfre_wxp_x86\i386\FsFilter32.pdb source: V7F2H10gJw.dll
Source: Binary string: version.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdbd source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdbZ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: msasn1.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: f:\sys\objfre_wxp_x86\i386\FsFilter32.pdbpJ source: V7F2H10gJw.dll
Source: Binary string: setupapi.pdb@ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: sechost.pdbk source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000003.00000003.674734776.0000000003688000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000003.00000003.674651326.0000000003682000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: f:\sys\objfre_win7_amd64\amd64\FsFilter64.pdb source: V7F2H10gJw.dll
Source: Binary string: apmjrsmCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000003.00000002.682013956.00000000032B2000.00000004.00000010.sdmp
Source: Binary string: crypt32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: V7F2H10gJw.dllString found in binary or memory: "name":"fb_dtsg","value":"name="fb_dtsg" value="Sec-Fetch-Dest: documentSec-Fetch-Mode: navigateSec-Fetch-Site: nonehttps://www.facebook.com/""2%d0https://graph.facebook.com/me/friends?access_token=%s&pretty=1&limit=1summarytotal_count{}summarytotal_count%dquery_friends.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: count = %d equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: -3https://www.facebook.com/payments/settings/payment_methods/index.php?__a=1errorSummaryconfirmemail.phpcard_type_name-110query_payment2.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: ret = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9sec-fetch-dest: documentsec-fetch-mode: navigatesec-fetch-site: same-originreferer: https://www.messenger.com/origin: https://www.messenger.comhttps://www.messenger.com/login/nonce/ookie: c_user=ookie: xs=ookie: ;%[^;]; https://m.facebook.com/settings/email/<span class="_52ji _8uk3">accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9sec-fetch-dest: documentsec-fetch-mode: navigatesec-fetch-site: noneupgrade-insecure-requests: 1</span></span>@&#064;@&#064;https://m.facebook.com/settings/sms/<strong><span dir="ltr">accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9sec-fetch-dest: documentsec-fetch-mode: navigatesec-fetch-site: noneupgrade-insecure-requests: 1</span></span>+ https://m.facebook.com/pages/creation_flow/?step=name&cat_ref_page_id=0&ref_type=launch_point"dtsg":{"token":"accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9sec-fetch-dest: documentsec-fetch-mode: navigatesec-fetch-site: noneupgrade-insecure-requests: 1"https://m.facebook.com/pages/create/edit_name/"draftID":Accept: */*Origin: https://m.facebook.comReferer: https://m.facebook.com/pages/creation_flow/?step=name&cat_ref_page_id=0&ref_type=launch_pointSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: same-originX-Requested-With: XMLHttpRequestX-Response-Format: JSONStreampage_name=&m_sess=&fb_dtsg=&jazoest=&__csr=&__req=3&__user=,"https://m.facebook.com/pages/creation_flow/?step=category&draft_id=&cat_ref_page_id=0&extra_data=%7B%22page_name%22%3A%22%22%7D"dtsg":{"token":"accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9Referer: https://m.facebook.com/pages/creation_flow/?step=name&cat_ref_page_id=0&ref_type=launch_pointsec-fetch-dest: documentsec-fetch-mode: navigatesec-fetch-site: same-originSec-Fetch-User: ?1upgrade-insecure-requests: 1"https://m.facebook.com/pages/create/edit_category/"pageID":Referer: https://m.facebook.com/pages/creation_flow/?step=category&draft_id=&cat_ref_page_id=0&extra_data=%7B%22page_name%22%3A%22%22%7DAccept: */*Origin: https://m.facebook.comSec-Fetch-Dest: emptySec-Fetch-Mode: corsSec-Fetch-Site: same-originX-Response-Format: JSONStreamX-Requested-With: XMLHttpRequestpage_category=1300&draft_id=&m_sess=&fb_dtsg=&jazoest=&__csr=&__req=9&__user=}"+ .-_@@friends2page.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: pageid = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: bad allocationSOFTWARE\Mozilla\Mozilla FirefoxCurrentVersion\\MainInstall Directory%s\firefox.exe{}[]"1""2""3"123bad allocationc_user=xs=https://www.facebook.com/adsmanager/manage/adshttps://business.facebook.com/adsmanager/manage/adssettings/?act=&access_token:""access_token":""query_token_account_id.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: account_id = %s token =%s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: c_user=xs=https://www.facebook.com/ads/manager/account_settingsaccountID:"access_token:"Sec-Fetch-Dest: documentSec-Fetch-Mode: navigateSec-Fetch-Site: none""query_token_account_id_laomaozi.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: account_id = %s token =%s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: c_user=xs=https://www.facebook.com/adsmanager/manage/adshttps://business.facebook.com/adsmanager/manage/adswindow.location.replace("")/act___accessToken="Sec-Fetch-Dest: documentSec-Fetch-Mode: navigateSec-Fetch-Site: nonehttps:act=/\/"%[0-9]query_token_account_id2.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: account_id = %s token =%s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/"name="fb_dtsg" value=""logout_hash":"""logout_hash":"logoutToken:""logoutToken:"https://www.facebook.com/comet/try/source=SETTINGS_MENU&nctr[_mod]=pagelet_bluebar&__user=&__a=1&__csr=&__req=14&__beoa=0&__pc=PHASED%3ADEFAULT&dpr=1&__ccg=EXCELLENT&fb_dtsg=&jazoest=for (;;);{https://m.facebook.com/logout.php?h=%s&t=%sc_user=deleted"encrypted":"https://m.facebook.com/?_rdr""name="fb_dtsg" value="logout.phpm_sess=&fb_dtsg=&jazoest=&__csr=&__req=9&__a=&__user=https://m.facebook.com/bookmarks/flyout/body/?id=u_0_6\https://m.facebook.com/logout.php%sc_user=deletedhttps://m.facebook.com/?soft=bookmarks"logoutURL":"\"logout.phphttps://m.facebook.com&source=mtouch_logout_button&persist_locale=1&button_name=logout&button_location=settings%s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/ads/manager/account_settings equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/adsmanager/manage/ads equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/bookmarks/pages?ref_type=logout_gear equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/comet/try/ equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/connect/ping?client_id=124024574287414&domain=www.instagram.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F1e2RywyANNe.js%3Fversion%3D42%23cb%3Df19f2d8a0dd2f24%26domain%3Dwww.instagram.com%26origin%3Dhttps%253A%252F%252Fwww.instagram.com%252Ff2dc055ae1b1274%26relation%3Dparent&response_type=token%2Csigned_request%2Ccode&sdk=joey&version=v2.2 equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/connect/ping?client_id=124024574287414&domain=www.instagram.com&origin=1&redirect_uri=https%3A%2F%2Fstaticxx.facebook.com%2Fconnect%2Fxd_arbiter%2Fr%2F1e2RywyANNe.js%3Fversion%3D42%23cb%3Df19f2d8a0dd2f24%26domain%3Dwww.instagram.com%26origin%3Dhttps%253A%252F%252Fwww.instagram.com%252Ff2dc055ae1b1274%26relation%3Dparent&response_type=token%2Csigned_request%2Ccode&sdk=joey&version=v2.2&access_token=&expires_in=Location: query_instagram_cookie.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: token = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/dialog/oauth?client_id=124024574287414&redirect_uri=https%3A%2F%2Fwww.instagram.com%2Faccounts%2Fsignup%2F&state=%7B%22fbLoginKey%22%3A%221l3a6gcoxzmx9bogry41n78unr193ooptzd1bmk8ggfxw5bdph1%22%2C%22fbLoginReturnURL%22%3A%22%2F%22%7D&scope=email&response_type=code%2Cgranted_scopes equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/dialog/oauth?client_id=124024574287414&redirect_uri=https%3A%2F%2Fwww.instagram.com%2Faccounts%2Fsignup%2F&state=%7B%22fbLoginKey%22%3A%221l3a6gcoxzmx9bogry41n78unr193ooptzd1bmk8ggfxw5bdph1%22%2C%22fbLoginReturnURL%22%3A%22%2F%22%7D&scope=email&response_type=code%2Cgranted_scopesLocation: equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/dialog/oauth?client_id=124024574287414&redirect_uri=https%3A%2F%2Fwww.instagram.com%2Faccounts%2Fsignup%2F&state=%7B%22fbLoginKey%22%3A%221l3a6gcoxzmx9bogry41n78unr193ooptzd1bmk8ggfxw5bdph1%22%2C%22fbLoginReturnURL%22%3A%22%2F%22%7D&scope=email&response_type=code%2Cgranted_scopesocation: equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/login/async_sso/messenger_dot_com/?__a=1 equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/login/async_sso/messenger_dot_com/?__a=1x-auth-result: query_mess_cookie.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: x_auth_result = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/payments/settings/payment_methods/index.php?__a=1 equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/x/oauth/status?client_id=124024574287414&input_token&origin=1&redirect_uri= equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.facebook.com/x/oauth/status?client_id=124024574287414&input_token&origin=1&redirect_uri=origin: https://www.instagram.comsec-fetch-mode: corsreferer: https://www.instagram.com/sec-fetch-site: cross-sitefb-ar: equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.com/accounts/login/ajax/facebook/ equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: x-csrftoken: xhttps://www.instagram.com/accounts/login/ajax/facebook/"userId": "sessionid="";sessionid=;query_instagram_cookie.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: sessionid = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: x-csrftoken: xhttps://www.instagram.com/accounts/login/ajax/facebook/"userId": "sessionid="";sessionid=;query_instagram_cookie_20191224.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: sessionid = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: x-csrftoken: xhttps://www.instagram.com/accounts/login/ajax/facebook/"userId": "sessionid="";sessionid=;query_instagram_cookie_20200229.\task_cookie\facebook_agreement.cpp[HIJACK][%s][%s][%d]: sessionid = %s equals www.facebook.com (Facebook)
Source: V7F2H10gJw.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceCodeSigningCA-1.crt0
Source: V7F2H10gJw.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: V7F2H10gJw.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceCodeSigningCA.crt0
Source: V7F2H10gJw.dllString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: V7F2H10gJw.dllString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0O
Source: V7F2H10gJw.dllString found in binary or memory: http://crl3.digicert.com/ha-cs-2011a.crl0.
Source: V7F2H10gJw.dllString found in binary or memory: http://crl3.digicert.com/sha2-ha-cs-g1.crl00
Source: V7F2H10gJw.dllString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: V7F2H10gJw.dllString found in binary or memory: http://crl4.digicert.com/ha-cs-2011a.crl0L
Source: V7F2H10gJw.dllString found in binary or memory: http://crl4.digicert.com/sha2-ha-cs-g1.crl0L
Source: V7F2H10gJw.dllString found in binary or memory: http://ocsp.digicert.com0I
Source: V7F2H10gJw.dllString found in binary or memory: http://ocsp.digicert.com0P
Source: V7F2H10gJw.dllString found in binary or memory: http://ocsp.digicert.com0R
Source: V7F2H10gJw.dllString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: V7F2H10gJw.dllString found in binary or memory: http://www.interestvideo.com/video1.php
Source: V7F2H10gJw.dllString found in binary or memory: https://01%s08%s15%s22%sWebGL%d%02d%s.club/http://01%s08%s15%s22%sFrankLin%d%02d%s.xyz/post_info.
Source: V7F2H10gJw.dllString found in binary or memory: https://ads.google.com/nav/_/rpc/GaiaInfoService/Get?authuser=0&rpcTrackingId=GaiaInfoService.Get%3A
Source: V7F2H10gJw.dllString found in binary or memory: https://ads.google.com/nav/_/rpc/UserByGaiaService/Get?authuser=0&rpcTrackingId=UserByGaiaService.Ge
Source: V7F2H10gJw.dllString found in binary or memory: https://ads.google.com/nav/_/rpc/UserCustomerAccessService/List?authuser=0&rpcTrackingId=UserCustome
Source: V7F2H10gJw.dllString found in binary or memory: https://ads.google.com/nav/selectaccount
Source: V7F2H10gJw.dllString found in binary or memory: https://ads.google.com/nav/selectaccountocation:
Source: V7F2H10gJw.dllString found in binary or memory: https://ads.google.comsec-fetch-dest:
Source: V7F2H10gJw.dllString found in binary or memory: https://api.twitter.com/1.1/statuses/update.json
Source: V7F2H10gJw.dllString found in binary or memory: https://api.twitter.com/1.1/statuses/update.jsoninclude_profile_interstitial_type=1&include_blocking
Source: V7F2H10gJw.dllString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: V7F2H10gJw.dllString found in binary or memory: https://twitter.com/
Source: V7F2H10gJw.dllString found in binary or memory: https://twitter.com/compose/tweetsec-fetch-dest:
Source: V7F2H10gJw.dllString found in binary or memory: https://twitter.com/compose/tweetsec-fetch-mode:
Source: V7F2H10gJw.dllString found in binary or memory: https://twitter.com/ookie:
Source: V7F2H10gJw.dllString found in binary or memory: https://twitter.comReferer:
Source: V7F2H10gJw.dllString found in binary or memory: https://twitter.comsec-fetch-dest:
Source: V7F2H10gJw.dllString found in binary or memory: https://upload.twitter.com/i/media/upload.json
Source: V7F2H10gJw.dllString found in binary or memory: https://upload.twitter.com/i/media/upload.json%dcommand=INIT&total_bytes=&media_type=image%2Fjpeg&me
Source: V7F2H10gJw.dllString found in binary or memory: https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0
Source: V7F2H10gJw.dllString found in binary or memory: https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0accept:
Source: V7F2H10gJw.dllString found in binary or memory: https://upload.twitter.com/i/media/upload.jsoncommand=FINALIZE&media_id=
Source: V7F2H10gJw.dllString found in binary or memory: https://www.digicert.com/CPS0
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.com/
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.com/accept:
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.com/accounts/login/ajax/facebook/
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.com/graphql/query/?query_hash=149bef52a3b2af88c0fec37913fe1cbc&variables=%7B%2
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.com/sec-fetch-site:
Source: V7F2H10gJw.dllString found in binary or memory: https://www.instagram.comsec-fetch-mode:
Source: V7F2H10gJw.dllString found in binary or memory: https://www.messenger.com
Source: V7F2H10gJw.dllString found in binary or memory: https://www.messenger.com/
Source: V7F2H10gJw.dllString found in binary or memory: https://www.messenger.com/accept:
Source: V7F2H10gJw.dllString found in binary or memory: https://www.messenger.com/login/nonce/
Source: V7F2H10gJw.dllString found in binary or memory: https://www.messenger.com/origin:
Source: V7F2H10gJw.dllString found in binary or memory: https://www.messenger.comhttps://www.messenger.com/login/nonce/ookie:

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: V7F2H10gJw.dll, type: SAMPLEMatched rule: APT34_PICKPOCKET Author: unknown
PE file has a writeable .text sectionShow sources
Source: V7F2H10gJw.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6148 -s 612
Source: V7F2H10gJw.dllStatic PE information: Resource name: CRX type: 7-zip archive data, version 0.3
Source: V7F2H10gJw.dllStatic PE information: Resource name: FF type: 7-zip archive data, version 0.3
Source: V7F2H10gJw.dllStatic PE information: Resource name: FRIENDS type: 7-zip archive data, version 0.3
Source: V7F2H10gJw.dllBinary or memory string: OriginalFilenameFsFilter.sys vs V7F2H10gJw.dll
Source: V7F2H10gJw.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: V7F2H10gJw.dll, type: SAMPLEMatched rule: APT34_PICKPOCKET Description = Detects the PICKPOCKET malware used by APT34, a browser credential-theft tool identified by FireEye in May 2018, Reference = https://www.fireeye.com/blog/threat-research/2019/07/hard-pass-declining-apt34-invite-to-join-their-professional-network.html
Source: V7F2H10gJw.dllStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
Source: V7F2H10gJw.dllStatic PE information: Section: .rsrc ZLIB complexity 0.999259599673
Source: classification engineClassification label: mal64.winDLL@75/4@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6148
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A2C.tmpJump to behavior
Source: V7F2H10gJw.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: V7F2H10gJw.dllVirustotal: Detection: 20%
Source: V7F2H10gJw.dllReversingLabs: Detection: 44%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\V7F2H10gJw.dll'
Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6148 -s 612
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: unknown unknown
Source: V7F2H10gJw.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: V7F2H10gJw.dllStatic file information: File size 4919296 > 1048576
Source: V7F2H10gJw.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x16f000
Source: V7F2H10gJw.dllStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x118000
Source: V7F2H10gJw.dllStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x180000
Source: Binary string: winhttp.pdbV source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wininet.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdbk source: WerFault.exe, 00000003.00000003.678504903.0000000005912000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: crypt32.pdbN source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wldap32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000003.00000003.678504903.0000000005912000.00000004.00000040.sdmp
Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: shcore.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: fltLib.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: advapi32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: shell32.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000003.00000003.674734776.0000000003688000.00000004.00000001.sdmp
Source: Binary string: version.pdb\ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wimm32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: setupapi.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: winhttp.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wldap32.pdb~ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000003.00000003.674970320.000000000367C000.00000004.00000001.sdmp
Source: Binary string: profapi.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: sechost.pdb source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: msasn1.pdbp source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: powrprof.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: shlwapi.pdbh source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: cfgmgr32.pdbb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: f:\sys\objfre_wxp_x86\i386\FsFilter32.pdb source: V7F2H10gJw.dll
Source: Binary string: version.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ole32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: ws2_32.pdbd source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: fltLib.pdbZ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: msasn1.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: f:\sys\objfre_wxp_x86\i386\FsFilter32.pdbpJ source: V7F2H10gJw.dll
Source: Binary string: setupapi.pdb@ source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: sechost.pdbk source: WerFault.exe, 00000003.00000003.678546892.0000000005915000.00000004.00000040.sdmp
Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000003.00000003.674734776.0000000003688000.00000004.00000001.sdmp
Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: combase.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000003.00000003.678541937.0000000005910000.00000004.00000040.sdmp
Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000003.00000003.674651326.0000000003682000.00000004.00000001.sdmp
Source: Binary string: apphelp.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: wuser32.pdb source: WerFault.exe, 00000003.00000003.678490919.0000000005791000.00000004.00000001.sdmp
Source: Binary string: f:\sys\objfre_win7_amd64\amd64\FsFilter64.pdb source: V7F2H10gJw.dll
Source: Binary string: apmjrsmCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000003.00000002.682013956.00000000032B2000.00000004.00000010.sdmp
Source: Binary string: crypt32.pdb source: WerFault.exe, 00000003.00000003.678513455.0000000005918000.00000004.00000040.sdmp
Source: V7F2H10gJw.dllStatic PE information: real checksum: 0x4b39df should be: 0x4be8c9
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: WerFault.exe, 00000003.00000002.683217839.0000000005930000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: WerFault.exe, 00000003.00000002.683217839.0000000005930000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: WerFault.exe, 00000003.00000002.683217839.0000000005930000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: WerFault.exe, 00000003.00000002.683217839.0000000005930000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Virtualization/Sandbox Evasion1OS Credential DumpingSecurity Software Discovery11Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRundll321LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 346323 Sample: V7F2H10gJw Startdate: 30/01/2021 Architecture: WINDOWS Score: 64 60 Malicious sample detected (through community Yara rule) 2->60 62 Multi AV Scanner detection for submitted file 2->62 64 Machine Learning detection for sample 2->64 66 PE file has a writeable .text section 2->66 14 loaddll32.exe 1 2->14         started        process3 process4 16 rundll32.exe 14->16         started        18 rundll32.exe 14->18         started        20 rundll32.exe 14->20         started        22 WerFault.exe 3 9 14->22         started        process5 24 rundll32.exe 16->24         started        26 rundll32.exe 18->26         started        28 rundll32.exe 20->28         started        process6 30 rundll32.exe 24->30         started        32 rundll32.exe 26->32         started        34 rundll32.exe 28->34         started        process7 36 rundll32.exe 30->36         started        38 rundll32.exe 32->38         started        40 rundll32.exe 34->40         started        process8 42 rundll32.exe 36->42         started        44 rundll32.exe 38->44         started        process9 46 rundll32.exe 42->46         started        48 rundll32.exe 44->48         started        process10 50 rundll32.exe 46->50         started        52 rundll32.exe 48->52         started        process11 54 rundll32.exe 50->54         started        56 rundll32.exe 52->56         started        process12 58 rundll32.exe 54->58         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
V7F2H10gJw.dll20%VirustotalBrowse
V7F2H10gJw.dll45%ReversingLabsWin32.Trojan.Mingloa
V7F2H10gJw.dll100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://01%s08%s15%s22%sWebGL%d%02d%s.club/http://01%s08%s15%s22%sFrankLin%d%02d%s.xyz/post_info.0%Avira URL Cloudsafe
https://twitter.comsec-fetch-dest:0%Avira URL Cloudsafe
https://www.instagram.comsec-fetch-mode:0%Avira URL Cloudsafe
https://twitter.comReferer:0%Avira URL Cloudsafe
http://www.interestvideo.com/video1.php0%Avira URL Cloudsafe
https://www.messenger.comhttps://www.messenger.com/login/nonce/ookie:0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://01%s08%s15%s22%sWebGL%d%02d%s.club/http://01%s08%s15%s22%sFrankLin%d%02d%s.xyz/post_info.V7F2H10gJw.dllfalse
  • Avira URL Cloud: safe
low
https://upload.twitter.com/i/media/upload.jsoncommand=FINALIZE&media_id=V7F2H10gJw.dllfalse
    high
    https://twitter.com/compose/tweetsec-fetch-dest:V7F2H10gJw.dllfalse
      high
      https://www.instagram.com/V7F2H10gJw.dllfalse
        high
        https://www.messenger.com/V7F2H10gJw.dllfalse
          high
          https://upload.twitter.com/i/media/upload.json%dcommand=INIT&total_bytes=&media_type=image%2Fjpeg&meV7F2H10gJw.dllfalse
            high
            https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0accept:V7F2H10gJw.dllfalse
              high
              https://api.twitter.com/1.1/statuses/update.jsoninclude_profile_interstitial_type=1&include_blockingV7F2H10gJw.dllfalse
                high
                https://www.messenger.com/origin:V7F2H10gJw.dllfalse
                  high
                  https://twitter.com/V7F2H10gJw.dllfalse
                    high
                    https://twitter.com/ookie:V7F2H10gJw.dllfalse
                      high
                      https://api.twitter.com/1.1/statuses/update.jsonV7F2H10gJw.dllfalse
                        high
                        https://curl.haxx.se/docs/http-cookies.htmlV7F2H10gJw.dllfalse
                          high
                          https://twitter.comsec-fetch-dest:V7F2H10gJw.dllfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://upload.twitter.com/i/media/upload.jsonV7F2H10gJw.dllfalse
                            high
                            https://twitter.com/compose/tweetsec-fetch-mode:V7F2H10gJw.dllfalse
                              high
                              https://www.instagram.comsec-fetch-mode:V7F2H10gJw.dllfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.instagram.com/accounts/login/ajax/facebook/V7F2H10gJw.dllfalse
                                high
                                https://www.instagram.com/sec-fetch-site:V7F2H10gJw.dllfalse
                                  high
                                  https://twitter.comReferer:V7F2H10gJw.dllfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.messenger.com/accept:V7F2H10gJw.dllfalse
                                    high
                                    http://www.interestvideo.com/video1.phpV7F2H10gJw.dllfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://www.messenger.comV7F2H10gJw.dllfalse
                                      high
                                      https://www.instagram.com/accept:V7F2H10gJw.dllfalse
                                        high
                                        https://www.messenger.com/login/nonce/V7F2H10gJw.dllfalse
                                          high
                                          https://upload.twitter.com/i/media/upload.json?command=APPEND&media_id=%s&segment_index=0V7F2H10gJw.dllfalse
                                            high
                                            https://www.messenger.comhttps://www.messenger.com/login/nonce/ookie:V7F2H10gJw.dllfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.instagram.com/graphql/query/?query_hash=149bef52a3b2af88c0fec37913fe1cbc&variables=%7B%2V7F2H10gJw.dllfalse
                                              high

                                              Contacted IPs

                                              No contacted IP infos

                                              General Information

                                              Joe Sandbox Version:31.0.0 Emerald
                                              Analysis ID:346323
                                              Start date:30.01.2021
                                              Start time:14:16:28
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 8m 44s
                                              Hypervisor based Inspection enabled:false
                                              Report type:light
                                              Sample file name:V7F2H10gJw (renamed file extension from none to dll)
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:40
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal64.winDLL@75/4@0/0
                                              EGA Information:Failed
                                              HDC Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 100%
                                              • Number of executed functions: 0
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              Warnings:
                                              Show All
                                              • Exclude process from analysis (whitelisted): WerFault.exe, svchost.exe
                                              • Report size exceeded maximum capacity and may have missing behavior information.

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              14:17:43API Interceptor1x Sleep call for process: loaddll32.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              No context

                                              Domains

                                              No context

                                              ASN

                                              No context

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_c9fe8838cffade97faaf2b4b1f1bdd540aa1221_b4806494_108474bb\Report.wer
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):10690
                                              Entropy (8bit):3.756808408671022
                                              Encrypted:false
                                              SSDEEP:96:4TfCW0yWey9hTzFD7fVpXIQcQEc6ncE1cw35j+a+z+HbHg9yVG4rmMoVazWbSmfd:RUeJHqj/NDjoyq/u7sNS274ItWe
                                              MD5:4E699D681620248ACD5DFA2DEA3BA7B9
                                              SHA1:6FEB84914BF690DB1302EA63DC29860C7800B4F7
                                              SHA-256:6C8454C0112760072ABA461CA9B2A81B968E0EA90A370CB149D03343CC6A6C74
                                              SHA-512:6A52339C347E64A6D3B9DBE0A97531D70B3D75BB504A83FF22DA7BBE6A493ACE578A1385360DCA1C11DB0FAB0FE1FCEF7D0717A8F506852933098DC52BD4DEDC
                                              Malicious:false
                                              Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.6.4.8.6.2.4.9.7.1.0.4.3.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.d.5.8.1.f.5.0.-.d.0.f.3.-.4.a.f.f.-.a.0.c.b.-.5.b.d.a.a.6.4.9.c.6.4.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.8.7.5.1.5.9.4.-.1.5.b.5.-.4.f.e.9.-.b.7.0.2.-.e.6.b.d.8.c.d.4.9.a.0.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.0.4.-.0.0.0.1.-.0.0.1.b.-.4.b.6.1.-.b.f.4.0.0.a.f.7.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.0././.1.1././.3.0.:.1.2.:.1.5.:.2.1.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A2C.tmp.dmp
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:Mini DuMP crash report, 15 streams, Sat Jan 30 13:17:31 2021, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):51280
                                              Entropy (8bit):2.0109397708123162
                                              Encrypted:false
                                              SSDEEP:192:waEwHQehyNyAy0uk8RZiW4UOLGqY+yOJLWuj9cm7/P2+p:sE/kI83jUujve+p
                                              MD5:0AB3DC0535E3AE6CD84526DE07F8146E
                                              SHA1:5111A6143A65A39DF91EC6C27897284CF95DBA16
                                              SHA-256:99B9D1C19E28F0B4F70982760011694539CE71A75935E48131AA5663339B2C6A
                                              SHA-512:EB16A690BAE03E6D9D510D60AFE62DF2BE568DBBF418427A858DFFAF1B49735410BADB2E67B11E50F958C3569DBE3EBA0A4C87972D854AA2A36E0F07AA928957
                                              Malicious:false
                                              Preview: MDMP....... .......k\.`...................U...........B..............GenuineIntelW...........T...........f\.`.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WER6FDA.tmp.WERInternalMetadata.xml
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8288
                                              Entropy (8bit):3.6952939069491113
                                              Encrypted:false
                                              SSDEEP:192:Rrl7r3GLNiBo6Km6YreSUc7ngmfR0RSwM+pBe89b/nEsfnVm:RrlsNiO616YSSUc7ngmfR0RSw1/n3f4
                                              MD5:B0750D1084BC796380ED0ADE74594FE8
                                              SHA1:73006542D25B7935568DFFC316DC678FD71B1E5D
                                              SHA-256:BD0526E96167E9B357F10B85AF38093845D881AE54702537EDC854130E44D7D5
                                              SHA-512:EDE0EE1D6B725E40977537D49F9A65B8EB897DA7252BD42010A62FDED229832B4F5EEC592E2D000C577D14ABF3B1DE0B1164BB3E6096CECBF65C636B81FC171E
                                              Malicious:false
                                              Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.4.8.<./.P.i.d.>.......
                                              C:\ProgramData\Microsoft\Windows\WER\Temp\WER71A0.tmp.xml
                                              Process:C:\Windows\SysWOW64\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4563
                                              Entropy (8bit):4.450489240462594
                                              Encrypted:false
                                              SSDEEP:48:cvIwSD8zsxeJgtWI9Y2WSC8Bk8fm8M4JO0Fx+q8yJKcQIcQwv+Td:uITfKjXSNrJthKkwv+Td
                                              MD5:DDC3C95B95F150C900E490FCA441E423
                                              SHA1:662BE3D44DCBB017B19BBD2786C54F82976D01C2
                                              SHA-256:37034CE0E2FC7D5AFF231D2270C32A07AFC2E0416C1A1849F121CA0639129C10
                                              SHA-512:4A9C22583C40F2C93BDAB1534A20C6E0BE68CE692EB40F92342B7848BC909DD15955A9F26D532D153074540C8201B9E768F2848742F8274D562AA6B2A5E4C1DE
                                              Malicious:false
                                              Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="839428" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..

                                              Static File Info

                                              General

                                              File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.402189489957624
                                              TrID:
                                              • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                              • Generic Win/DOS Executable (2004/3) 0.20%
                                              • DOS Executable Generic (2002/1) 0.20%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:V7F2H10gJw.dll
                                              File size:4919296
                                              MD5:0562f10f0c926a05eb28d3579fc86663
                                              SHA1:f75ad2980002d655410e7270825d51dcc53de0cc
                                              SHA256:8794893f687e487bfafaf085154a5b932612d9de0825a3b392931d414b2c1985
                                              SHA512:956ba87811b21ba6584d9b213d0e78429d4dcb48dca777dcc46e859819e4df4d9eb67ceb4df1294942ea72c074e26ee1dc5784b02d3278552790837f6b158619
                                              SSDEEP:98304:42fbNEOO9ojnF+x6Fk+1mKi7SVSVSRDEdxA0L6EwSlyZ/9kXUVje32:46htO9oz2umKESVSVSR/i6Ewx98d2
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......JG ..&N..&N..&N......&N...0..&N.).3./&N.). .@&N.).#.9'N..)...&N..)...&N..&O.4'N.).<.I&N.).4..&N.).2..&N.).6..&N.Rich.&N........

                                              File Icon

                                              Icon Hash:74f0e4ecccdce0e4

                                              Static PE Info

                                              General

                                              Entrypoint:0x2de88f0
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x2dc0000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                              DLL Characteristics:
                                              Time Stamp:0x5FBCCF22 [Tue Nov 24 09:15:14 2020 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:c046337d6f2b7d6f6998381b0c3e7501

                                              Entrypoint Preview

                                              Instruction
                                              cmp dword ptr [esp+08h], 01h
                                              jne 00007F08809EA587h
                                              call 00007F08809F63D2h
                                              push dword ptr [esp+04h]
                                              mov ecx, dword ptr [esp+10h]
                                              mov edx, dword ptr [esp+0Ch]
                                              call 00007F08809EA472h
                                              pop ecx
                                              retn 000Ch
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 20h
                                              mov eax, dword ptr [ebp+08h]
                                              push esi
                                              push edi
                                              push 00000008h
                                              pop ecx
                                              mov esi, 02F30808h
                                              lea edi, dword ptr [ebp-20h]
                                              rep movsd
                                              mov dword ptr [ebp-08h], eax
                                              mov eax, dword ptr [ebp+0Ch]
                                              test eax, eax
                                              pop edi
                                              mov dword ptr [ebp-04h], eax
                                              pop esi
                                              je 00007F08809EA58Eh
                                              test byte ptr [eax], 00000008h
                                              je 00007F08809EA589h
                                              mov dword ptr [ebp-0Ch], 01994000h
                                              lea eax, dword ptr [ebp-0Ch]
                                              push eax
                                              push dword ptr [ebp-10h]
                                              push dword ptr [ebp-1Ch]
                                              push dword ptr [ebp-20h]
                                              call dword ptr [02F30320h]
                                              leave
                                              retn 0008h
                                              push ebp
                                              mov ebp, esp
                                              push ecx
                                              push ebx
                                              mov eax, dword ptr [ebp+0Ch]
                                              add eax, 0Ch
                                              mov dword ptr [ebp-04h], eax
                                              mov ebx, dword ptr fs:[00000000h]
                                              mov eax, dword ptr [ebx]
                                              mov dword ptr fs:[00000000h], eax
                                              mov eax, dword ptr [ebp+08h]
                                              mov ebx, dword ptr [ebp+0Ch]
                                              mov ebp, dword ptr [ebp-04h]
                                              mov esp, dword ptr [ebx-04h]
                                              jmp eax
                                              pop ebx
                                              leave
                                              retn 0008h
                                              pop eax
                                              pop ecx
                                              xchg dword ptr [esp], eax
                                              jmp eax
                                              push ebp
                                              mov ebp, esp
                                              push ecx
                                              push ecx
                                              push ebx
                                              push esi
                                              push edi
                                              mov esi, dword ptr fs:[00000000h]
                                              mov dword ptr [ebp-04h], esi
                                              mov dword ptr [ebp-08h], 02DE89BBh
                                              push 00000000h
                                              push dword ptr [ebp+0Ch]
                                              push dword ptr [ebp-08h]
                                              push dword ptr [ebp+08h]
                                              call 00007F08809EA5A2h

                                              Rich Headers

                                              Programming Language:
                                              • [RES] VS2005 build 50727
                                              • [ C ] VS2005 build 50727
                                              • [EXP] VS2005 build 50727
                                              • [C++] VS2005 build 50727
                                              • [ASM] VS2005 build 50727
                                              • [LNK] VS2005 build 50727

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x2878f00x6e.rdata
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4b00000x1cc.reloc
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4080000x98db0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a10000xb218.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x27ac480x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x1700000x4dc.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x16f0000x16f000False0.486302180901data6.4550270524IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rdata0x1700000x1180000x118000False0.453717041016data6.47622570334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                              .data0x2880000x1800000x180000False0.945496877035data7.95536782686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                              .rsrc0x4080000x990000x99000False0.999259599673data7.99961070533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                              .reloc0x4a10000x100000x10000False0.00935363769531data0.137993413483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              CRX0x4081500x93697-zip archive data, version 0.3EnglishUnited States
                                              FF0x4114bc0x870507-zip archive data, version 0.3EnglishUnited States
                                              FRIENDS0x49850c0x884a7-zip archive data, version 0.3EnglishUnited States
                                              RT_MANIFEST0x4a0d580x56ASCII text, with CRLF line terminatorsEnglishUnited States

                                              Imports

                                              DLLImport
                                              KERNEL32.dllSetFilePointer, MapViewOfFile, UnmapViewOfFile, SetEndOfFile, HeapAlloc, QueryPerformanceCounter, HeapFree, WaitForSingleObject, InterlockedCompareExchange, UnlockFile, FlushViewOfFile, LockFile, WaitForSingleObjectEx, OutputDebugStringW, GetTickCount, UnlockFileEx, GetProcessHeap, GetSystemTimeAsFileTime, FormatMessageA, InitializeCriticalSection, LoadLibraryW, FormatMessageW, HeapDestroy, LeaveCriticalSection, GetFileAttributesA, HeapCreate, HeapValidate, GetFileAttributesW, FlushFileBuffers, GetTempPathW, HeapSize, LockFileEx, EnterCriticalSection, GetDiskFreeSpaceW, CreateFileMappingA, CreateFileMappingW, GetDiskFreeSpaceA, GetSystemInfo, GetFileAttributesExW, DeleteCriticalSection, GetCurrentThreadId, GetVersionExA, DeleteFileW, HeapCompact, GetTempPathA, AreFileApisANSI, WinExec, GetPrivateProfileStringA, CreateSemaphoreA, VirtualFree, VirtualAlloc, GetLocalTime, OpenFileMappingA, lstrcpynA, CopyFileA, SetFileAttributesA, FindResourceA, LoadResource, SizeofResource, MoveFileA, LockResource, GetWindowsDirectoryA, GetThreadContext, SetThreadContext, VirtualAllocEx, GetModuleHandleA, WriteProcessMemory, ResumeThread, GetThreadLocale, GetFileInformationByHandle, GetDriveTypeA, FileTimeToLocalFileTime, FileTimeToSystemTime, CreateMutexW, HeapReAlloc, GetFullPathNameA, GetFullPathNameW, GetModuleHandleW, DeviceIoControl, CreateFileW, GetVersionExW, GetVolumeInformationW, GetSystemDirectoryW, GetComputerNameW, OutputDebugStringA, DeleteFileA, GetSystemTime, LocalFree, CloseHandle, CreateMutexA, FindNextFileA, LocalAlloc, OpenMutexA, LoadLibraryA, FindClose, GetProcAddress, GetLastError, FindFirstFileA, MultiByteToWideChar, GetTimeZoneInformation, ReadFile, CreateProcessA, WideCharToMultiByte, WriteFile, CompareFileTime, GetCurrentProcess, SystemTimeToFileTime, FreeLibrary, lstrlenA, GetFileSize, CreateFileA, GetStringTypeExA, GetSystemDirectoryA, ExpandEnvironmentStringsA, WaitForMultipleObjects, PeekNamedPipe, SleepEx, SetCurrentDirectoryA, SetFileTime, SetFileAttributesW, CreateDirectoryW, GetCurrentDirectoryA, SetEnvironmentVariableA, GetCurrentProcessId, Sleep, CompareStringW, CompareStringA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetLocaleInfoW, IsValidCodePage, IsValidLocale, EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, GetStringTypeW, GetStringTypeA, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetConsoleMode, GetConsoleCP, GetStartupInfoA, GetFileType, SetHandleCount, GetModuleFileNameA, GetStdHandle, ExitProcess, InterlockedIncrement, InterlockedDecrement, InterlockedExchange, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, CreateDirectoryA, ExitThread, CreateThread, GetCommandLineA, RaiseException, RtlUnwind, GetCPInfo, LCMapStringA, LCMapStringW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, GetACP, GetOEMCP
                                              USER32.dllwsprintfA, LoadStringA, wsprintfW, GetSystemMetrics
                                              ADVAPI32.dllGetSidIdentifierAuthority, CryptDestroyKey, CryptEncrypt, CryptReleaseContext, CryptImportKey, CryptAcquireContextA, GetSecurityDescriptorSacl, SetSecurityInfo, ControlService, OpenSCManagerA, StartServiceA, CreateServiceA, DeleteService, CloseServiceHandle, OpenServiceA, LookupAccountNameW, GetSidSubAuthorityCount, GetSidSubAuthority, CryptCreateHash, RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, RegOpenKeyExA, RegCreateKeyExA, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegQueryValueExW, LookupAccountSidA, RegQueryValueExA, RegSetValueExA, GetTokenInformation, OpenProcessToken, CryptDestroyHash, CryptGetHashParam, CryptHashData
                                              SHELL32.dllSHGetPathFromIDListA, SHGetMalloc, SHGetSpecialFolderLocation, SHFileOperationA, SHGetSpecialFolderPathA
                                              ole32.dllCoInitialize, CoUninitialize, CoCreateInstance
                                              SHLWAPI.dllPathFindFileNameA, PathRemoveFileSpecA, PathFileExistsA, SHGetValueA
                                              WS2_32.dllgetpeername, closesocket, socket, connect, sendto, recvfrom, accept, listen, inet_addr, gethostbyname, inet_ntoa, getservbyname, gethostbyaddr, getservbyport, ioctlsocket, gethostname, getsockopt, htons, bind, ntohs, setsockopt, WSAIoctl, select, __WSAFDIsSet, WSASetLastError, send, recv, WSAGetLastError, WSAStartup, WSACleanup, htonl, getsockname, ntohl
                                              CRYPT32.dllCryptUnprotectData
                                              VERSION.dllGetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
                                              WINHTTP.dllWinHttpAddRequestHeaders, WinHttpQueryOption, WinHttpReceiveResponse, WinHttpSetTimeouts, WinHttpSetOption, WinHttpSendRequest, WinHttpConnect, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpOpenRequest, WinHttpReadData, WinHttpSetCredentials
                                              WININET.dllInternetGetCookieExA, InternetGetCookieA
                                              SETUPAPI.dllSetupDiGetDeviceRegistryPropertyA, SetupDiEnumDeviceInfo, SetupDiDestroyDeviceInfoList, SetupDiGetClassDevsA
                                              WLDAP32.dll
                                              msvcp_win.dll??5?$basic_istream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@AAI@Z
                                              msvcp_win.dll??5?$basic_istream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@AAK@Z
                                              WS2_32.dllgetaddrinfo
                                              WS2_32.dllgetnameinfo
                                              WS2_32.dllFreeAddrInfoW
                                              SHCORE.dllSetProcessDpiAwareness
                                              GDI32.dllgdiPlaySpoolStream
                                              ADVAPI32.dllConvertStringSecurityDescriptorToSecurityDescriptorW
                                              gdi32full.dllEndPageImpl

                                              Exports

                                              NameOrdinalAddress
                                              Hello00110x2f08270
                                              Hello00220x2f081e0
                                              Hello00330x2f08170

                                              Possible Origin

                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States

                                              Network Behavior

                                              No network behavior found

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:14:17:26
                                              Start date:30/01/2021
                                              Path:C:\Windows\System32\loaddll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:loaddll32.exe 'C:\Users\user\Desktop\V7F2H10gJw.dll'
                                              Imagebase:0x250000
                                              File size:120832 bytes
                                              MD5 hash:2D39D4DFDE8F7151723794029AB8A034
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate

                                              General

                                              Start time:14:17:27
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\WerFault.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6148 -s 612
                                              Imagebase:0xbd0000
                                              File size:434592 bytes
                                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:33
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:33
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:34
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:34
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:35
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:35
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:35
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:36
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:36
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:36
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:37
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:37
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high

                                              General

                                              Start time:14:17:37
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:37
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:38
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:38
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:38
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:38
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:39
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:39
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:39
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:39
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:40
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:40
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:40
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:40
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:40
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:41
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:41
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:41
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:42
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:42
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:42
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello003
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:42
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello002
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              General

                                              Start time:14:17:44
                                              Start date:30/01/2021
                                              Path:C:\Windows\SysWOW64\rundll32.exe
                                              Wow64 process (32bit):true
                                              Commandline:rundll32.exe C:\Users\user\Desktop\V7F2H10gJw.dll,Hello001
                                              Imagebase:0xfd0000
                                              File size:61952 bytes
                                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language

                                              Disassembly

                                              Code Analysis

                                              Reset < >