
:max_bytes(150000):strip_icc()/003-what-is-the-rundll32.exe-process-and-what-does-it-do-f5c34e316bcf41308f78db870467f82b.jpg)

Key DecisionĪ code location where a decision has been made to avoid execution of potentially malicious behavior. Program entry point, most likely the entry point of the PE file. They include additional runtime information such as the execution status which is highlighted with different colors and shapes. Remotely Track Device Without AuthorizationĮxecution Graphs are highly condensed control flow graphs which give the user a synthetic view of the code detected during Hybrid Code Analysis. Static PE information: data direc tory type: IMAGE_DIR ECTORY_ENT RY_DEBUGīinary string: C:\Users\S tan\source \repos\Fur ry\Furry\o bj\Debug\F urry.pdb s ource: Fur ry.dllīinary string: C:\Users\S tan\source \repos\Fur ry\Furry\o bj\Debug\F urry.pdbk/ source: F urry.dllĮavesdrop on Insecure Network Communication Static PE information: NO_SEH, TE RMINAL_SER VER_AWARE, DYNAMIC_B ASE, NX_CO MPAT, HIGH _ENTROPY_V A Static PE information: data direc tory type: IMAGE_DIR ECTORY_ENT RY_COM_DES CRIPTORĬontains modern PE file flags such as dynamic base (ASLR) or NX PE file contains a COM descriptor data directory Joe Sandbox Cloud Basic: Detection: clean Sco re: 0 dll',#1įound detection on Joe Sandbox Cloud Basic with higher score Process created: C:\Windows \SysWOW64\ cmd.exe cm d.exe /C r undll32.ex e 'C:\User s\user\Des ktop\Furry. exe loaddl l32.exe 'C :\Users\us er\Desktop \Furry.dll ' Process created: C:\Windows \System32\ loaddll32. Process created: C:\Windows \SysWOW64\ rundll32.e xe rundll3 2.exe 'C: \Users\use r\Desktop\ Furry.dll' ,#1 Key opened: HKEY_CURRE NT_USER\So ftware\Pol icies\Micr osoft\Wind ows\Safer\ CodeIdenti fiersĬlassification label: mal48.winD a DLL by calling functions text IMAGE _SCN_MEM_E XECUTE, IM AGE_SCN_CN T_CODE, IM AGE_SCN_ME M_READ text section and no other executable section
