Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UxTheme.dll.dll

Overview

General Information

Sample name:UxTheme.dll.dll
(renamed file extension from exe to dll)
Original sample name:UxTheme.dll.exe
Analysis ID:1468058
MD5:336bed2506b03c75235a8549888e64b9
SHA1:da0808fe16c9b3cf20a133d56343d45bf0faf8ea
SHA256:d25d0df1669dc0f2c1eff862518b263fb3ced9e4ec2a150de6af06939dd9738e
Tags:exe
Infos:

Detection

CobaltStrike
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains more sections than normal
PE file contains sections with non-standard names
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3868 cmdline: loaddll64.exe "C:\Users\user\Desktop\UxTheme.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7132 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 6376 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • regsvr32.exe (PID: 6472 cmdline: regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 6536 cmdline: rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4116 cmdline: rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedPaint MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 4348 cmdline: C:\Windows\system32\WerFault.exe -u -p 4116 -s 416 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 4812 cmdline: rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginPanningFeedback MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1280 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedAnimation MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4544 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedPaint MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6604 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginPanningFeedback MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6788 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdateSignature MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3644 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdatePanningFeedback MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6116 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",ThemeInitApiHook MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5216 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeAttribute MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6592 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowTheme MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 788 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetThemeAppProperties MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6272 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataForDpi MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5340 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataEx MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5380 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeData MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2340 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemePartDefined MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2024 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeDialogTextureEnabled MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6596 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeBackgroundPartiallyTransparent MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4904 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeActive MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1352 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsCompositionActive MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6516 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsAppThemed MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5684 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",HitTestThemeBackground MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3920 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetWindowTheme MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3732 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetUserColorPreference MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6376 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTransitionDuration MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6916 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTimingFunction MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4512 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextMetrics MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7116 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextExtent MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 792 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysString MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1424 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysSize MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1652 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysInt MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6464 cmdline: rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysFont MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 60000, "MaxGetSize": 11456204, "Jitter": 51, "C2Server": "us-central1-keepass-415209.cloudfunctions.net,/keepasswork/api/v1/metadata/private", "HttpPostUri": "/keepasswork/api/v1/metadata/user/avatar", "Malleable_C2_Instructions": ["Remove 2 bytes from the end", "Remove 60 bytes from the beginning", "Base64 URL-safe decode", "XOR mask w/ random key", "NetBIOS decode 'a'"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\WerFault.exe -u -p 1324 -s 1528", "Spawnto_x64": "%windir%\\sysnative\\WerFault.exe -u -p 1324 -s 1528", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 628807914, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "2024-03-31", "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 379133, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "kJCQkJCQkJCQ"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "kJCQkJCQkJCQ"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "NtQueueApcThread", "RtlCreateUserThread", "SetThreadContext", "CreateRemoteThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: us-central1-keepass-415209.cloudfunctions.net\r\n"}
SourceRuleDescriptionAuthorStrings
00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
    00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
      • 0x1b934:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
      00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
      • 0x24534:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
      00000010.00000002.2786136846.00000256A8758000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        16.3.rundll32.exe.256a6980000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
          16.3.rundll32.exe.256a6980000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            16.3.rundll32.exe.256a6980000.0.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
            • 0x1ad34:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
            0.3.loaddll64.exe.13678d70000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
              0.3.loaddll64.exe.13678d70000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                Click to see the 13 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 60000, "MaxGetSize": 11456204, "Jitter": 51, "C2Server": "us-central1-keepass-415209.cloudfunctions.net,/keepasswork/api/v1/metadata/private", "HttpPostUri": "/keepasswork/api/v1/metadata/user/avatar", "Malleable_C2_Instructions": ["Remove 2 bytes from the end", "Remove 60 bytes from the beginning", "Base64 URL-safe decode", "XOR mask w/ random key", "NetBIOS decode 'a'"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\WerFault.exe -u -p 1324 -s 1528", "Spawnto_x64": "%windir%\\sysnative\\WerFault.exe -u -p 1324 -s 1528", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 628807914, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": "2024-03-31", "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 379133, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "kJCQkJCQkJCQ"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "kJCQkJCQkJCQ"], "ProcInject_Execute": ["ntdll:RtlUserThreadStart", "CreateThread", "NtQueueApcThread-s", "NtQueueApcThread", "RtlCreateUserThread", "SetThreadContext", "CreateRemoteThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "True", "HostHeader": "Host: us-central1-keepass-415209.cloudfunctions.net\r\n"}
                Source: UxTheme.dll.dllVirustotal: Detection: 37%Perma Link
                Source: UxTheme.dll.dllReversingLabs: Detection: 34%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Binary string: Z:\data\loaders\EvilProxyDll-master\EvilProxyDLL\x64\Release\EvilProxyDLL.pdb source: loaddll64.exe, 00000000.00000003.2720535139.0000013678900000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.2763457463.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2632910459.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000003.2631971858.00000000009A0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2637825326.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000003.2631582760.000002ED45480000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2631492658.000001456FC70000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2658497704.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904790460.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000003.2660715337.0000020B67A00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2695239468.000001F028900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2700982334.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000003.2754046806.000001C9B9D90000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.2771474351.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000003.2751617374.000002C17C6E0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2855868309.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2770781756.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000003.2755178403.0000018A21B00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.2786576454.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000003.2749029102.00000256A6940000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.2754536935.0000024FEA5D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000002.2763985665.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2770313057.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000003.2755418217.0000011C193F0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2769167128.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000003.2754499454.0000021B3EE60000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000014.00000002.2765583596.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000003.2750128068.000001AB07A10000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2754033866.0000011319200
                Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.00007FFB0C6EA000.00000040.00000001.0100000
                Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: loaddll64.exe, loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.0

                Networking

                barindex
                Source: Malware configuration extractorURLs: us-central1-keepass-415209.cloudfunctions.net
                Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net

                System Summary

                barindex
                Source: 16.3.rundll32.exe.256a6980000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 0.3.loaddll64.exe.13678d70000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 0.3.loaddll64.exe.13678d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 6.3.rundll32.exe.14571620000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 6.3.rundll32.exe.14571620000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 16.3.rundll32.exe.256a6980000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000006.00000002.2658118414.0000014571670000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000010.00000002.2786000448.00000256A8720000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_00000136789100A0 NtAllocateVirtualMemory,NtAllocateVirtualMemory,0_3_00000136789100A0
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DC7250 NtFreeVirtualMemory,0_2_0000013678DC7250
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_000001367891712E0_3_000001367891712E
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000013678914F410_3_0000013678914F41
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_00000136789112C00_3_00000136789112C0
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DDFB380_2_0000013678DDFB38
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DE9B800_2_0000013678DE9B80
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DC45710_2_0000013678DC4571
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DF3E700_2_0000013678DF3E70
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DE6D980_2_0000013678DE6D98
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DC675E0_2_0000013678DC675E
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DF47E00_2_0000013678DF47E0
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DE91180_2_0000013678DE9118
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DC08F00_2_0000013678DC08F0
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DE8A540_2_0000013678DE8A54
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4116 -s 416
                Source: UxTheme.dll.dllStatic PE information: Number of sections : 12 > 10
                Source: UxTheme.dll.dllBinary or memory string: OriginalFilenameUxTheme.dllj% vs UxTheme.dll.dll
                Source: 16.3.rundll32.exe.256a6980000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 0.3.loaddll64.exe.13678d70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 0.3.loaddll64.exe.13678d70000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 6.3.rundll32.exe.14571620000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 6.3.rundll32.exe.14571620000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 16.3.rundll32.exe.256a6980000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000006.00000002.2658118414.0000014571670000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000010.00000002.2786000448.00000256A8720000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
                Source: UxTheme.dll.dllStatic PE information: Section: ZLIB complexity 0.9977936921296297
                Source: UxTheme.dll.dllStatic PE information: Section: ZLIB complexity 0.9974365234375
                Source: UxTheme.dll.dllStatic PE information: Section: ZLIB complexity 0.9931918806221889
                Source: classification engineClassification label: mal100.troj.evad.winDLL@76/5@0/0
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6700:120:WilError_03
                Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4116
                Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\93a05f0a-522e-47d9-8c16-75fbe37a3a9bJump to behavior
                Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation
                Source: UxTheme.dll.dllVirustotal: Detection: 37%
                Source: UxTheme.dll.dllReversingLabs: Detection: 34%
                Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\UxTheme.dll.dll"
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedPaint
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4116 -s 416
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginPanningFeedback
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedAnimation
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedPaint
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginPanningFeedback
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdateSignature
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdatePanningFeedback
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",ThemeInitApiHook
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeAttribute
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowTheme
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetThemeAppProperties
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataForDpi
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataEx
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeData
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemePartDefined
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeDialogTextureEnabled
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeBackgroundPartiallyTransparent
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeActive
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsCompositionActive
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsAppThemed
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",HitTestThemeBackground
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetWindowTheme
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetUserColorPreference
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTimingFunction
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextMetrics
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextExtent
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysString
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysSize
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysInt
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysFont
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimationJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedPaintJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginPanningFeedbackJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedAnimationJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedPaintJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginPanningFeedbackJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdateSignatureJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdatePanningFeedbackJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",ThemeInitApiHookJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeAttributeJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetThemeAppPropertiesJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataForDpiJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataExJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemePartDefinedJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeDialogTextureEnabledJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeBackgroundPartiallyTransparentJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeActiveJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsCompositionActiveJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsAppThemedJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",HitTestThemeBackgroundJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetWindowThemeJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetUserColorPreferenceJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTimingFunctionJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextMetricsJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextExtentJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysStringJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysSizeJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysIntJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysFontJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: UxTheme.dll.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: UxTheme.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
                Source: UxTheme.dll.dllStatic file information: File size 3842048 > 1048576
                Source: UxTheme.dll.dllStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x345c00
                Source: Binary string: Z:\data\loaders\EvilProxyDll-master\EvilProxyDLL\x64\Release\EvilProxyDLL.pdb source: loaddll64.exe, 00000000.00000003.2720535139.0000013678900000.00000004.00001000.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.2763457463.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2632910459.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000003.2631971858.00000000009A0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.2637825326.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000003.2631582760.000002ED45480000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2631492658.000001456FC70000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2658497704.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904790460.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000003.2660715337.0000020B67A00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2695239468.000001F028900000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2700982334.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000003.2754046806.000001C9B9D90000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.2771474351.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000003.2751617374.000002C17C6E0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000002.2855868309.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2770781756.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000003.2755178403.0000018A21B00000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.2786576454.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000003.2749029102.00000256A6940000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000003.2754536935.0000024FEA5D0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000011.00000002.2763985665.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2770313057.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000003.2755418217.0000011C193F0000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.2769167128.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000003.2754499454.0000021B3EE60000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000014.00000002.2765583596.00007FFB0C37E000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000003.2750128068.000001AB07A10000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2754033866.0000011319200
                Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb! source: loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.00007FFB0C6EA000.00000040.00000001.0100000
                Source: Binary string: c:\miniprojects\x86il\il86\x64\release\IL86.pdb source: loaddll64.exe, loaddll64.exe, 00000000.00000002.2768698425.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, regsvr32.exe, regsvr32.exe, 00000004.00000002.2633003757.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, rundll32.exe, 00000005.00000002.2637983839.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000006.00000002.2658617443.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000007.00000002.2904939987.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2701089699.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2773109484.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2856013589.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2772478758.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.2787040179.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.2764459215.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.2771861469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000013.00000002.2770124965.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.2766130893.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.2767828792.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.2772321065.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.2772170828.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.2768439722.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.2768538647.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.2776915066.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.2772216438.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.2773680469.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.2758812796.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.2772704180.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.2773205781.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000020.00000002.2772158510.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.2873398411.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.2775937894.00007FFB0C6EA000.00000040.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.2761298877.0
                Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name:
                Source: UxTheme.dll.dllStatic PE information: section name: .boot
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DD235D push edi; iretd 0_2_0000013678DD235E
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DF243F push ebp; iretd 0_2_0000013678DF2440
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DF245F push ebp; iretd 0_2_0000013678DF2460
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DD3D58 push ebp; iretd 0_2_0000013678DD3D59
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DF2488 push ebp; iretd 0_2_0000013678DF2489
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DE1EF6 push edx; ret 0_2_0000013678DE1EF7
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000013678DD271E push cs; retf 0_2_0000013678DD271F
                Source: UxTheme.dll.dllStatic PE information: section name: entropy: 7.96741105930464

                Boot Survival

                barindex
                Source: C:\Windows\System32\loaddll64.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\loaddll64.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\loaddll64.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\regsvr32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\regsvr32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\regsvr32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: FilemonClass
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                Source: C:\Windows\System32\rundll32.exeWindow searched: window name: RegmonClass
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\System32\loaddll64.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Windows\System32\regsvr32.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Windows\System32\loaddll64.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\regsvr32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: C:\Windows\System32\rundll32.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                Source: rundll32.exe, 00000023.00000002.2760933840.00000280F2458000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL$
                Source: rundll32.exe, 00000027.00000002.2773806655.000001D8CDF68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLJH
                Source: regsvr32.exe, 00000004.00000002.2632797000.00000000009EB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000012.00000002.2768545737.0000011C192B8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000016.00000002.2769800847.00000215C2788000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000018.00000002.2767556258.000001AE5C5E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: rundll32.exe, 00000024.00000002.2772781234.000001B683328000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL'
                Source: rundll32.exe, 0000000F.00000002.2767623987.0000018A21898000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL5
                Source: rundll32.exe, 00000019.00000002.2755670049.0000026D95968000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLS
                Source: rundll32.exe, 00000015.00000002.2767093911.0000011319018000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL}
                Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                Source: C:\Windows\System32\rundll32.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
                Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
                Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
                Source: rundll32.exe, 0000001D.00000002.2758361312.000001C4AED58000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001E.00000002.2769511865.000001DE1A4A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000020.00000002.2769852932.000001F8DCC48000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000025.00000002.2771437325.000001D464168000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                Source: Amcache.hve.10.drBinary or memory string: VMware
                Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: rundll32.exe, 00000015.00000002.2767093911.0000011319018000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000021.00000002.2873046801.00000240FF928000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__#
                Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.10.drBinary or memory string: vmci.sys
                Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
                Source: rundll32.exe, 00000029.00000002.2758721043.0000022766D98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__m?$tS
                Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.10.drBinary or memory string: VMware20,1
                Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: rundll32.exe, 00000026.00000002.2768659401.00000164F1AC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__m@
                Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.10.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\System32\loaddll64.exeSystem information queried: ModuleInformationJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\System32\loaddll64.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\regsvr32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeThread information set: HideFromDebugger
                Source: C:\Windows\System32\rundll32.exeOpen window title or class name: regmonclass
                Source: C:\Windows\System32\rundll32.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                Source: C:\Windows\System32\rundll32.exeOpen window title or class name: procmon_window_class
                Source: C:\Windows\System32\rundll32.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                Source: C:\Windows\System32\rundll32.exeOpen window title or class name: filemonclass
                Source: C:\Windows\System32\rundll32.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\regsvr32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\regsvr32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\regsvr32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandleJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugObjectHandle
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000013678914670 LdrLoadDll,0_3_0000013678914670

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Indirect: 0x7FFB0C885ADDJump to behavior
                Source: C:\Windows\System32\loaddll64.exeNtQueryInformationProcess: Indirect: 0x7FFB0C89C164Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Indirect: 0x13678910955Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeNtSetInformationThread: Indirect: 0x7FFB0C8B9FA2Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Indirect: 0x136789102AFJump to behavior
                Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Indirect: 0x136789101F2Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeNtQueryInformationProcess: Indirect: 0x7FFB0C8B3FF9Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 16.3.rundll32.exe.256a6980000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.loaddll64.exe.13678d70000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.loaddll64.exe.13678d70000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.3.rundll32.exe.14571620000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.3.rundll32.exe.14571620000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.3.rundll32.exe.256a6980000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2786136846.00000256A8758000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2658150493.00000145716A8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2754647446.0000013678DF8000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 3868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6376, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6788, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                11
                Process Injection
                32
                Virtualization/Sandbox Evasion
                OS Credential Dumping631
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Abuse Elevation Control Mechanism
                11
                Process Injection
                LSASS Memory32
                Virtualization/Sandbox Evasion
                Remote Desktop ProtocolData from Removable Media1
                Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                Obfuscated Files or Information
                NTDS3
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Regsvr32
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Rundll32
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1468058 Sample: UxTheme.dll.exe Startdate: 05/07/2024 Architecture: WINDOWS Score: 100 24 Found malware configuration 2->24 26 Malicious sample detected (through community Yara rule) 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 5 other signatures 2->30 7 loaddll64.exe 1 2->7         started        process3 signatures4 38 Query firmware table information (likely to detect VMs) 7->38 40 Hides threads from debuggers 7->40 42 Found direct / indirect Syscall (likely to bypass EDR) 7->42 44 2 other signatures 7->44 10 regsvr32.exe 7->10         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        17 32 other processes 7->17 process5 signatures6 46 Query firmware table information (likely to detect VMs) 10->46 48 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->48 50 Hides threads from debuggers 10->50 52 Tries to detect sandboxes and other dynamic analysis tools (window names) 13->52 54 Tries to detect sandboxes / dynamic malware analysis system (registry check) 13->54 56 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 13->56 19 rundll32.exe 17->19         started        22 WerFault.exe 20 16 17->22         started        process7 signatures8 32 Hides threads from debuggers 19->32 34 Tries to detect sandboxes / dynamic malware analysis system (registry check) 19->34 36 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 19->36

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                UxTheme.dll.dll38%VirustotalBrowse
                UxTheme.dll.dll34%ReversingLabsWin64.Trojan.Malgent
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://upx.sf.net0%URL Reputationsafe
                http://upx.sf.net0%URL Reputationsafe
                us-central1-keepass-415209.cloudfunctions.net0%Avira URL Cloudsafe
                us-central1-keepass-415209.cloudfunctions.net0%VirustotalBrowse
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                us-central1-keepass-415209.cloudfunctions.nettrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://upx.sf.netAmcache.hve.10.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1468058
                Start date and time:2024-07-05 09:39:00 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 10m 35s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:42
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:UxTheme.dll.dll
                (renamed file extension from exe to dll)
                Original Sample Name:UxTheme.dll.exe
                Detection:MAL
                Classification:mal100.troj.evad.winDLL@76/5@0/0
                EGA Information:
                • Successful, ratio: 33.3%
                HCA Information:Failed
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.42.73.29
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target regsvr32.exe, PID 6472 because there are no executed function
                • Execution Graph export aborted for target rundll32.exe, PID 6536 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                TimeTypeDescription
                03:42:37API Interceptor1x Sleep call for process: WerFault.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.7768697010274644
                Encrypted:false
                SSDEEP:192:LkcirzyZah0z5p6AR2KjEEzuiFDZ24lO8Y:xirGZZtdRzjXzuiFDY4lO8Y
                MD5:963F729CFA2F0A5832022AB29D559301
                SHA1:E9E0B7425F524C37DB1651DE4DF7C7177DBE2BB0
                SHA-256:6941170414F52CE5E071500A47654A05DFED0A8E36AA87E0839D0860D9F5444C
                SHA-512:7D4C713923254D045B326899EA099FA7BDD68BA8E7E20DF731974868BDBDF31C8DADC9AB13B55B293FC19E066B370F46330F1B1D65576210CE1ABE3C974E625F
                Malicious:false
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.6.3.8.9.3.5.3.1.4.9.9.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.6.3.8.9.3.5.9.5.5.6.2.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.f.5.a.3.7.d.7.-.5.4.8.7.-.4.7.c.5.-.a.d.c.5.-.6.5.1.e.d.7.6.d.0.d.8.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.2.8.b.8.4.a.e.-.f.9.a.3.-.4.7.6.2.-.9.3.1.3.-.6.5.6.2.7.6.e.0.a.e.f.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.U.x.T.h.e.m.e...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.1.4.-.0.0.0.1.-.0.0.1.4.-.9.e.c.a.-.8.e.d.a.a.e.c.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Fri Jul 5 07:42:15 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):70834
                Entropy (8bit):1.6308510172406367
                Encrypted:false
                SSDEEP:384:nZuxNPM8ga3mDuEQQ7+n9Arb/lHUwKII/n4:ExBM8ga3mDuEQQ7+n9Arb/ub4
                MD5:7D9C38D2089C8F309CDD9BB102F46EAB
                SHA1:8328E8E3D734B222660360F89C801BC771B32E54
                SHA-256:7D16A5AB474520A0B7E08AC5BBDB6B6C833D88C8431751E9FDEE5E6AD65370B8
                SHA-512:EB8356093C976CD8A2C6C00693981AD714241525E8C4D4130D9928A516D5CECCFFBB3439D44B5DA9766C03B11CA2BE52B02E4A86DE9FF70419AE13A4D41B158B
                Malicious:false
                Preview:MDMP..a..... .........f........................$...........4...2/..........T.......8...........T.......................................................................................................................eJ......t.......Lw......................T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8532
                Entropy (8bit):3.696948668820715
                Encrypted:false
                SSDEEP:192:R6l7wVeJXvJ6Y8NHLqgmfOk52ll6WjprO89bZZalfNwTm:R6lXJfJ6YOmgmfOkk9Zefr
                MD5:C00E1DE23D59905A278527DD7B49C252
                SHA1:7C094DC623A05B1EA5F60E3D728B8A8D98918F18
                SHA-256:B0BD6EE189C6A0570FC3CFA004CFD1EE0A92157716FDCDA9E1B58B195B47484D
                SHA-512:32B52177F496987487375AA219028F742111A4D4EB47F94D9A24EFC33C7645166F1ACD18DCBFAD295128A33FEE90EB12A2368057442B882948B17FCD43673FFC
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.1.1.6.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4766
                Entropy (8bit):4.484819997687503
                Encrypted:false
                SSDEEP:48:cvIwWl8zsiJg771I9wTWpW8VYlYm8M4JCDCb4bf6FPyq85m0QEftRoptSTS6d:uIjfwI73i7VpJawGDopoO6d
                MD5:81B1170D1AC8436C552B4C2F5B040B55
                SHA1:694AF4EC394791FC24DFA501FD42A3C659E947B4
                SHA-256:265EFC7621AB2B407BBE517AAA74CCEACC5DA3BAA77E32549A570DA332E34E83
                SHA-512:FB7F9CE4D0E6B54129E8CE74D7D08A85F246F386B61D62922D1C25E77CC3C83C53BCED3C031D862D69991BF402F8CBFF099BAD84AD323CF4D270E1CC30B080E2
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="397364" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.417562630385475
                Encrypted:false
                SSDEEP:6144:Dcifpi6ceLPL9skLmb0mNSWSPtaJG8nAgex285i2MMhA20X4WABlGuN55+:4i58NSWIZBk2MM6AFBTo
                MD5:895270160F47525D6805963733ACF6E3
                SHA1:9D74F9A14E735EAFEA097ABC986AD9D60FDA3C08
                SHA-256:07B6879BF759D08F02C74969DF8CE1C1474CEBF05EEF00B36F2FCE4E0755F948
                SHA-512:623A8D9DBF4F37E3C503DFDC2C93F4336BBF40A742A00EEB7CDB03918F64090FBF01CAA5E0C90067CE1E34FD8D2263D60C0F194424C7FE7F4507AA7341E33FC3
                Malicious:false
                Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.3.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                Entropy (8bit):7.969585217240325
                TrID:
                • Win64 Dynamic Link Library (generic) (102004/3) 84.97%
                • Win64 Executable (generic) (12005/4) 10.00%
                • Clipper DOS Executable (2020/12) 1.68%
                • Generic Win/DOS Executable (2004/3) 1.67%
                • DOS Executable Generic (2002/1) 1.67%
                File name:UxTheme.dll.dll
                File size:3'842'048 bytes
                MD5:336bed2506b03c75235a8549888e64b9
                SHA1:da0808fe16c9b3cf20a133d56343d45bf0faf8ea
                SHA256:d25d0df1669dc0f2c1eff862518b263fb3ced9e4ec2a150de6af06939dd9738e
                SHA512:fe9771061779aae98eb5e1f2c069234e7b24bff54436b7493dd8671ee4204da0a6c91d3af98e4d76f1455c1e037e0f0be42cb8fd9c19646f9addecdf305fbfc4
                SSDEEP:49152:ZuEhSSGlLCz7rOvqtJgGQ2TCH4dKG3Uhu7Vc8GnCxwkxZdV9Jp8BsSgMOcLi/CRy:MrFQPg47o4YYgzaTpT/
                TLSH:4406333EE794A311E42290FF527726954B427C41012B84151B3D727B988B31FBF7BA9E
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................................................................................................................V.........
                Icon Hash:7ae282899bbab082
                Entrypoint:0x180622058
                Entrypoint Section:.boot
                Digitally signed:false
                Imagebase:0x180000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
                Time Stamp:0x6050E9AC [Tue Mar 16 17:23:56 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:1ee602fa73839d068ce001610045c627
                Instruction
                call 00007FCBD4CFDCD7h
                inc ecx
                push edx
                dec ecx
                mov edx, esp
                inc ecx
                push edx
                dec ecx
                mov esi, dword ptr [edx+10h]
                dec ecx
                mov edi, dword ptr [edx+20h]
                cld
                mov dl, 80h
                mov al, byte ptr [esi]
                dec eax
                inc esi
                mov byte ptr [edi], al
                dec eax
                inc edi
                mov ebx, 00000002h
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                jnc 00007FCBD4CFDB36h
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                jnc 00007FCBD4CFDBB0h
                xor eax, eax
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                jnc 00007FCBD4CFDC58h
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                adc eax, eax
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                adc eax, eax
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                adc eax, eax
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                adc eax, eax
                je 00007FCBD4CFDB5Bh
                push edi
                mov eax, eax
                dec eax
                sub edi, eax
                mov al, byte ptr [edi]
                pop edi
                mov byte ptr [edi], al
                dec eax
                inc edi
                mov ebx, 00000002h
                jmp 00007FCBD4CFDADAh
                mov eax, 00000001h
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                adc eax, eax
                add dl, dl
                jne 00007FCBD4CFDB59h
                mov dl, byte ptr [esi]
                dec eax
                inc esi
                adc dl, dl
                jc 00007FCBD4CFDB38h
                sub eax, ebx
                mov ebx, 00000001h
                jne 00007FCBD4CFDB80h
                mov ecx, 00000001h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x720000x1bed.edata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x740590x88.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x750000x2c75.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5f2a700xde0.text
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                0x10000xb7100x6c0061e4ea28b40a5a5d6c35e1e66e6dcf30False0.9977936921296297data7.96741105930464IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                0xd0000xb0560x4000fa6501889363a4b1230c7bec43873a3dFalse0.9974365234375data7.919757017886685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                0x190000x546400x536006bb3700a1386fe667224c7c80781ac4cFalse0.9931918806221889data7.997561975945916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                0x6e0000xdc80x8005192ad92e4646acd96a90c3ece20bab6False0.95263671875data7.447430095951343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                0x6f0000xfc0x2009e076fd784712f5d899f3d7b496e91f3False0.70703125data5.156677793705186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                0x700000x1e00x2008ac07fcd9f594e0acc9411b007028de4False0.9609375data6.601045638978476IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                0x710000x6600x600211152a2eb7f9da796b11f822bde5a26False0.8138020833333334data7.262399670945199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                .edata0x720000x1c000x1c006d9172f91cf39d748bcd639fe6cca9c7False0.23465401785714285data5.161511276647459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .idata0x740000x10000x2005962833ab5f52f166e2a2c4cb1244358False0.22265625data1.6942228613747352IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x750000x2c750x2e0036fbd34f812fd4ef2c94c29dcddfdc5fFalse0.3226902173913043data4.8024961532845065IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .text0x780000x5aa0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .boot0x6220000x345c000x345c00542d6704d2affc689683ef56316b3cd8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_DIALOG0x755080x144dataEnglishUnited States0.5555555555555556
                RT_DIALOG0x7564c0x138dataEnglishUnited States0.5480769230769231
                RT_DIALOG0x757840x120dataEnglishUnited States0.625
                RT_DIALOG0x758a40x144dataEnglishUnited States0.5493827160493827
                RT_DIALOG0x759e80x188dataEnglishUnited States0.5637755102040817
                RT_DIALOG0x75b700xa4dataEnglishUnited States0.6402439024390244
                RT_DIALOG0x75c140xbcdataEnglishUnited States0.6648936170212766
                RT_DIALOG0x75cd00x148dataEnglishUnited States0.5365853658536586
                RT_STRING0x75e180xbASCII text, with no line terminatorsEnglishUnited States1.7272727272727273
                RT_STRING0x75e240xaASCII text, with no line terminatorsEnglishUnited States1.8
                RT_STRING0x75e300xbASCII text, with no line terminatorsEnglishUnited States1.7272727272727273
                RT_STRING0x75e3c0xeASCII text, with no line terminatorsEnglishUnited States1.5714285714285714
                RT_STRING0x75e4c0xbASCII text, with no line terminatorsEnglishUnited States1.7272727272727273
                RT_RCDATA0x75e580x1e6ASCII text0.5185185185185185
                RT_RCDATA0x760400xe7ASCII text0.7575757575757576
                RT_RCDATA0x761280x295ASCII text0.5052950075642966
                RT_RCDATA0x763c00x397ASCII text0.4646354733405876
                RT_RCDATA0x767580x3b1ASCII text0.4444444444444444
                RT_RCDATA0x76b0c0x340ASCII text0.49399038461538464
                RT_RCDATA0x76e4c0x2a8ASCII text0.4985294117647059
                RT_RCDATA0x770f40x313ASCII text0.49555273189326554
                RT_RCDATA0x774080x328ASCII text0.504950495049505
                RT_VERSION0x777300x3c8dataEnglishUnited States0.44834710743801653
                RT_MANIFEST0x77af80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                DLLImport
                kernel32.dllGetModuleHandleA
                USER32.dllGetCursorPos
                ADVAPI32.dllCryptDestroyKey
                NameOrdinalAddress
                BeginBufferedAnimation370x180072837
                BeginBufferedPaint380x18007286a
                BeginPanningFeedback50x1800727a5
                BufferedPaintClear390x180072899
                BufferedPaintInit400x1800728c8
                BufferedPaintRenderAnimation410x1800728f6
                BufferedPaintSetAlpha420x18007292f
                BufferedPaintStopAllAnimations510x180072993
                BufferedPaintUnInit520x1800729ce
                CloseThemeData530x1800729fe
                DllCanUnloadNow540x180072a29
                DllGetActivationFactory550x180072a55
                DllGetClassObject560x180072a89
                DrawThemeBackground570x180072ab7
                DrawThemeBackgroundEx470x180072961
                DrawThemeEdge580x180072ae7
                DrawThemeIcon590x180072b11
                DrawThemeParentBackground700x180072b67
                DrawThemeParentBackgroundEx710x180072b9d
                DrawThemeText890x180072bd5
                DrawThemeTextEx1030x180072c7a
                EnableThemeDialogTexture1140x180072ca6
                EnableTheming1290x180072d41
                EndBufferedAnimation1340x180072d6b
                EndBufferedPaint1400x180072d9c
                EndPanningFeedback60x1800727d6
                GetBufferedPaintBits1410x180072dc9
                GetBufferedPaintDC1420x180072dfa
                GetBufferedPaintTargetDC1430x180072e29
                GetBufferedPaintTargetRect1440x180072e5e
                GetColorFromPreference1210x180072d0e
                GetCurrentThemeName1450x180072e95
                GetImmersiveColorFromColorSetEx950x180072bff
                GetImmersiveUserColorSetPreference980x180072c3b
                GetThemeAnimationProperty1460x180072ec5
                GetThemeAnimationTransform1470x180072efb
                GetThemeAppProperties1480x180072f32
                GetThemeBackgroundContentRect1490x180072f64
                GetThemeBackgroundExtent1500x180072f9e
                GetThemeBackgroundRegion1510x180072fd3
                GetThemeBitmap1520x180073008
                GetThemeBool1530x180073033
                GetThemeColor1540x18007305c
                GetThemeDocumentationProperty1550x180073086
                GetThemeEnumValue1560x1800730c0
                GetThemeFilename1570x1800730ee
                GetThemeFont1580x18007311b
                GetThemeInt1590x180073144
                GetThemeIntList1600x18007316c
                GetThemeMargins1610x180073198
                GetThemeMetric1620x1800731c4
                GetThemePartSize1630x1800731ef
                GetThemePosition1640x18007321c
                GetThemePropertyOrigin1650x180073249
                GetThemeRect1660x18007327c
                GetThemeStream1670x1800732a5
                GetThemeString1680x1800732d0
                GetThemeSysBool1690x1800732fb
                GetThemeSysColor1700x180073327
                GetThemeSysColorBrush1710x180073354
                GetThemeSysFont1720x180073386
                GetThemeSysInt1730x1800733b2
                GetThemeSysSize1740x1800733dd
                GetThemeSysString1750x180073409
                GetThemeTextExtent1760x180073437
                GetThemeTextMetrics1770x180073466
                GetThemeTimingFunction1780x180073496
                GetThemeTransitionDuration1790x1800734c9
                GetUserColorPreference1200x180072cdb
                GetWindowTheme1800x180073500
                HitTestThemeBackground1810x18007352b
                IsAppThemed1820x18007355e
                IsCompositionActive1830x180073586
                IsThemeActive1840x1800735b6
                IsThemeBackgroundPartiallyTransparent1850x1800735e0
                IsThemeDialogTextureEnabled1860x180073622
                IsThemePartDefined1870x18007365a
                OpenThemeData1880x180073689
                OpenThemeDataEx610x180072b3b
                OpenThemeDataForDpi1890x1800736b3
                SetThemeAppProperties1900x1800736e3
                SetWindowTheme1910x180073715
                SetWindowThemeAttribute1920x180073740
                ThemeInitApiHook1930x180073774
                UpdatePanningFeedback120x180072805
                UpdateSignature70x180001340
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:03:42:11
                Start date:05/07/2024
                Path:C:\Windows\System32\loaddll64.exe
                Wow64 process (32bit):false
                Commandline:loaddll64.exe "C:\Users\user\Desktop\UxTheme.dll.dll"
                Imagebase:0x7ff7ddd10000
                File size:165'888 bytes
                MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2753368272.0000013678D70000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2754647446.0000013678DF8000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:1
                Start time:03:42:11
                Start date:05/07/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff75da10000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:03:42:11
                Start date:05/07/2024
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1
                Imagebase:0x7ff7cd350000
                File size:289'792 bytes
                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:03:42:11
                Start date:05/07/2024
                Path:C:\Windows\System32\regsvr32.exe
                Wow64 process (32bit):false
                Commandline:regsvr32.exe /s C:\Users\user\Desktop\UxTheme.dll.dll
                Imagebase:0x7ff614900000
                File size:25'088 bytes
                MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:03:42:11
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedAnimation
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:6
                Start time:03:42:11
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",#1
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000006.00000002.2658118414.0000014571670000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000002.2658150493.00000145716A8000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000006.00000003.2657321127.0000014571620000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:high
                Has exited:true

                Target ID:7
                Start time:03:42:14
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginBufferedPaint
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:03:42:15
                Start date:05/07/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 4116 -s 416
                Imagebase:0x7ff697ad0000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:03:42:17
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe C:\Users\user\Desktop\UxTheme.dll.dll,BeginPanningFeedback
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:13
                Start time:03:42:20
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedAnimation
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:14
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginBufferedPaint
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:15
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",BeginPanningFeedback
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:16
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdateSignature
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CobaltStrike_2, Description: Yara detected CobaltStrike, Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000010.00000003.2777687515.00000256A6980000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000010.00000002.2786136846.00000256A8758000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000010.00000002.2786000448.00000256A8720000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:high
                Has exited:true

                Target ID:17
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",UpdatePanningFeedback
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:18
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",ThemeInitApiHook
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:19
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowThemeAttribute
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:20
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetWindowTheme
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:21
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",SetThemeAppProperties
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:22
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataForDpi
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:23
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeDataEx
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:24
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",OpenThemeData
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:25
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemePartDefined
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:26
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeDialogTextureEnabled
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:27
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeBackgroundPartiallyTransparent
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:28
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsThemeActive
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:29
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsCompositionActive
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:30
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",IsAppThemed
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:31
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",HitTestThemeBackground
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:32
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetWindowTheme
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:33
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetUserColorPreference
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:34
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTransitionDuration
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:35
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTimingFunction
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:36
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextMetrics
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:37
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeTextExtent
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:38
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysString
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:39
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysSize
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:40
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysInt
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Target ID:41
                Start time:03:42:21
                Start date:05/07/2024
                Path:C:\Windows\System32\rundll32.exe
                Wow64 process (32bit):false
                Commandline:rundll32.exe "C:\Users\user\Desktop\UxTheme.dll.dll",GetThemeSysFont
                Imagebase:0x7ff6a9e10000
                File size:71'680 bytes
                MD5 hash:EF3179D498793BF4234F708D3BE28633
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:0.8%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:10.3%
                  Total number of Nodes:39
                  Total number of Limit Nodes:6
                  execution_graph 16782 13678dd4a74 16783 13678dd4a92 malloc 16782->16783 16785 13678dd4bdd 16783->16785 16798 13678de466c 16783->16798 16786 13678de466c ExitProcess 16785->16786 16787 13678dd4bf9 16785->16787 16786->16787 16788 13678de466c ExitProcess 16787->16788 16789 13678dd4c0e 16787->16789 16788->16789 16790 13678de466c ExitProcess 16789->16790 16791 13678dd4c1c malloc 16789->16791 16790->16791 16792 13678de466c ExitProcess 16791->16792 16797 13678dd4c5c _snprintf 16791->16797 16792->16797 16793 13678dd4ebb free 16794 13678de466c ExitProcess 16793->16794 16795 13678dd4ed0 16794->16795 16796 13678de466c ExitProcess 16796->16797 16797->16793 16797->16796 16801 13678de4680 16798->16801 16799 13678de46af 16800 13678de4704 ExitProcess 16801->16799 16801->16800 16802 13678dc7250 16804 13678dc7295 16802->16804 16803 13678dc734c 16804->16803 16805 13678dc7334 NtFreeVirtualMemory 16804->16805 16805->16803 16806 13678de8738 16807 13678de8754 _DllMainCRTStartup 16806->16807 16808 13678de87e4 16807->16808 16810 13678de87ae 16807->16810 16814 13678de85d8 16807->16814 16808->16810 16812 13678de85d8 _CRT_INIT GetFileType 16808->16812 16813 13678de882b 16808->16813 16811 13678de85d8 _CRT_INIT GetFileType 16811->16810 16812->16813 16813->16810 16813->16811 16815 13678de85f3 9 library calls 16814->16815 16816 13678de85ea _mtinit _heap_init _CRT_INIT _RTC_Initialize 16814->16816 16815->16808 16816->16815 16818 13678deea30 16816->16818 16821 13678deea5f _lock _calloc_crt 16818->16821 16819 13678deea83 _ioinit _initptd 16819->16815 16820 13678deecbe GetFileType 16820->16821 16821->16819 16821->16820 16822 13678dd79c8 _wputenv 16823 13678df55e8 _initptd _lock _putenv_helper 16822->16823

                  Control-flow Graph

                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeMemoryVirtual
                  • String ID: 0
                  • API String ID: 3963845541-4108050209
                  • Opcode ID: be7bf1ef473da28bb5f91f183d5ab39302a82fd461ef0e65bce11a6ed52e3569
                  • Instruction ID: a5f6c9e387af224af691ded328e58ff1f82aa2a4b1cc8ab945b9579a31a02132
                  • Opcode Fuzzy Hash: be7bf1ef473da28bb5f91f183d5ab39302a82fd461ef0e65bce11a6ed52e3569
                  • Instruction Fuzzy Hash: F2317231218B484FE754AB78845A79BBBD1FBC4354F908B2DF15AC22D1DF74C9418B82

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$ExitProcess
                  • String ID:
                  • API String ID: 1723042469-0
                  • Opcode ID: 5f2d819181d5e854bdf64fdbb18a83a8321b1100b31dbaa37a4cb39d60e3379a
                  • Instruction ID: a8abbff8f8ba09d93e0d2ab5900cc56dd3ad29d2c09099ea1eb6d026bf694390
                  • Opcode Fuzzy Hash: 5f2d819181d5e854bdf64fdbb18a83a8321b1100b31dbaa37a4cb39d60e3379a
                  • Instruction Fuzzy Hash: 0411DB72A0860497F768BB74C48A3EDBBD1E784318F40C62EE116D72D1DE398E004752
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                  • String ID: $@
                  • API String ID: 3613058218-1077428164
                  • Opcode ID: bd61a64bd559d6dcb89aea1aaa96a4f901907095869dcd47b38978befe06e487
                  • Instruction ID: d8b9fecda2e79058a35deca09aa0391c1a2c862804105eb17da192d247bf5f3d
                  • Opcode Fuzzy Hash: bd61a64bd559d6dcb89aea1aaa96a4f901907095869dcd47b38978befe06e487
                  • Instruction Fuzzy Hash: 80621932919A4AAAF7689A59C4477FDFBD1FBA1308FA4C11DE487C31C2DA24DE428741
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                  • String ID:
                  • API String ID: 3613058218-3916222277
                  • Opcode ID: da73a8991e0d2704c5fbc01b634f326b5676758f607846b3f36967d33a884184
                  • Instruction ID: 980647066d8ee45840dce9167b8f2a76e7b9fec7af0fb0e06ca8d2d7372abe15
                  • Opcode Fuzzy Hash: da73a8991e0d2704c5fbc01b634f326b5676758f607846b3f36967d33a884184
                  • Instruction Fuzzy Hash: 15622B3291AB49BAF7689A18C8933F9FBD2FB95318FA4921DD487C31D1D634DE028741

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 994 13678ddfb38-13678ddfbae call 13678de6120 call 13678de204c call 13678dde108 1001 13678ddfbb1-13678ddfbbf call 13678dde118 994->1001 1004 13678ddfbc5 1001->1004 1005 13678ddff4a-13678ddff4d 1001->1005 1006 13678ddfbcb-13678ddfbcd 1004->1006 1007 13678ddff29-13678ddff45 call 13678dd8de4 1004->1007 1008 13678ddff53-13678ddff55 1005->1008 1009 13678de0218-13678de0250 call 13678de6120 call 13678dde284 1005->1009 1011 13678de02f5-13678de02f8 1006->1011 1012 13678ddfbd3-13678ddfbd5 1006->1012 1026 13678de00b4-13678de00c4 call 13678de6120 1007->1026 1013 13678de0162-13678de01bb call 13678de6120 call 13678dde284 call 13678de622c 1008->1013 1014 13678ddff5b-13678ddff5d 1008->1014 1045 13678de0265-13678de0276 call 13678de622c 1009->1045 1046 13678de0252-13678de0263 call 13678de622c 1009->1046 1023 13678de03a3-13678de03c3 1011->1023 1024 13678de02fe-13678de0301 1011->1024 1018 13678ddfbdb-13678ddfbdd 1012->1018 1019 13678ddfed6-13678ddff17 call 13678de6120 call 13678dde284 call 13678de6510 1012->1019 1072 13678de02e5-13678de02e6 1013->1072 1093 13678de01c1-13678de01c5 1013->1093 1020 13678ddff63-13678ddff65 1014->1020 1021 13678de015b 1014->1021 1027 13678ddfbe3-13678ddfbe5 1018->1027 1028 13678ddfe4b-13678ddfe8c call 13678de6120 call 13678dde284 call 13678de6510 1018->1028 1108 13678ddff19-13678ddff20 1019->1108 1029 13678de00cb-13678de00fe call 13678de622c 1020->1029 1030 13678ddff6b-13678ddff6d 1020->1030 1021->1013 1024->1023 1033 13678de0307-13678de030f 1024->1033 1026->1029 1037 13678ddfe0e-13678ddfe2b call 13678dc9258 1027->1037 1038 13678ddfbeb-13678ddfbed 1027->1038 1115 13678ddfe8e-13678ddfe95 1028->1115 1071 13678de0104-13678de0108 1029->1071 1029->1072 1041 13678ddff73-13678ddff76 1030->1041 1042 13678de008c-13678de00a9 call 13678dd8d08 1030->1042 1033->1033 1034 13678de0311-13678de0314 1033->1034 1034->1023 1047 13678de031a-13678de0349 call 13678de622c 1034->1047 1037->1023 1085 13678ddfe31-13678ddfe49 call 13678de6120 1037->1085 1052 13678ddfbf3-13678ddfbf5 1038->1052 1053 13678ddfdf6-13678ddfe09 call 13678de6510 1038->1053 1056 13678de0074-13678de0087 call 13678dd8eb0 1041->1056 1057 13678ddff7c-13678ddff7e 1041->1057 1042->1023 1083 13678de00af-13678de00b0 1042->1083 1084 13678de027b-13678de028c 1045->1084 1046->1084 1090 13678de039b-13678de039e call 13678de6510 1047->1090 1091 13678de034b 1047->1091 1061 13678ddfbfb-13678ddfbfd 1052->1061 1062 13678ddfd17-13678ddfd53 call 13678de6120 call 13678dde284 1052->1062 1053->1001 1056->1042 1057->1001 1073 13678ddff84-13678ddffac call 13678de6120 call 13678dde284 1057->1073 1077 13678ddfbff-13678ddfc01 1061->1077 1078 13678ddfc58-13678ddfcba call 13678de6120 call 13678dde284 call 13678de622c 1061->1078 1128 13678ddfd55-13678ddfd6b call 13678de622c 1062->1128 1129 13678ddfd6d-13678ddfd83 call 13678de622c 1062->1129 1088 13678de010d-13678de0154 1071->1088 1086 13678de02eb-13678de02f0 call 13678de6510 1072->1086 1126 13678ddffe5-13678de0002 call 13678de622c 1073->1126 1127 13678ddffae-13678ddffaf 1073->1127 1077->1001 1094 13678ddfc03-13678ddfc13 call 13678dde118 1077->1094 1078->1072 1154 13678ddfcc0-13678ddfcc4 1078->1154 1083->1026 1084->1072 1096 13678de028e-13678de0292 1084->1096 1123 13678ddfec9-13678ddfed1 1085->1123 1086->1001 1088->1088 1101 13678de0156 1088->1101 1090->1023 1103 13678de0350-13678de0397 1091->1103 1106 13678de01ca-13678de0211 1093->1106 1130 13678ddfc15-13678ddfc2b call 13678de6510 1094->1130 1131 13678ddfc2d-13678ddfc30 1094->1131 1109 13678de0297-13678de02de 1096->1109 1101->1001 1103->1103 1117 13678de0399 1103->1117 1106->1106 1119 13678de0213 1106->1119 1108->1108 1121 13678ddff22-13678ddff24 1108->1121 1109->1109 1122 13678de02e0 1109->1122 1115->1115 1125 13678ddfe97-13678ddfeaa call 13678de6510 1115->1125 1117->1023 1119->1001 1121->1001 1122->1001 1123->1086 1149 13678ddfeac-13678ddfeb3 1125->1149 1143 13678de0007-13678de0017 1126->1143 1134 13678ddffb1-13678ddffb9 1127->1134 1145 13678ddfd88-13678ddfd99 1128->1145 1129->1145 1130->1001 1131->1001 1139 13678ddfc36-13678ddfc53 call 13678de6510 1131->1139 1134->1134 1142 13678ddffbb-13678ddffbe 1134->1142 1139->1001 1142->1126 1150 13678ddffc0-13678ddffe3 call 13678de622c 1142->1150 1143->1072 1151 13678de001d-13678de0021 1143->1151 1145->1072 1152 13678ddfd9f-13678ddfda3 1145->1152 1149->1149 1156 13678ddfeb5-13678ddfec7 call 13678de6120 1149->1156 1150->1143 1158 13678de0026-13678de006d 1151->1158 1159 13678ddfda8-13678ddfdef 1152->1159 1155 13678ddfcc9-13678ddfd10 1154->1155 1155->1155 1160 13678ddfd12 1155->1160 1156->1123 1158->1158 1163 13678de006f 1158->1163 1159->1159 1164 13678ddfdf1 1159->1164 1160->1001 1163->1001 1164->1001
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _snprintf$_errno_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 3442832105-0
                  • Opcode ID: ed4f66b9eb0b60d96691592701bfff5024a698260740415106ba7419c4ba1338
                  • Instruction ID: 804c33571e2b7b320edcf29e293c9709f2909d209302b227fae040b4b02b2fbb
                  • Opcode Fuzzy Hash: ed4f66b9eb0b60d96691592701bfff5024a698260740415106ba7419c4ba1338
                  • Instruction Fuzzy Hash: D552E531118D89ABF75AAB2CD4437E5F7E0FF68309F949219D985C7152EB30EA82C781
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000003.2753428763.0000013678910000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000013678910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_13678910000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: $0$ZL;
                  • API String ID: 0-1570617776
                  • Opcode ID: c04e10647534e64838dc4e7ec501509a6b3f9f35b150a2a9bb91aa4b7e0437e3
                  • Instruction ID: 525a07bc029731a22f244b7923a41cea08f8c27ad885634961711aefc1bf879c
                  • Opcode Fuzzy Hash: c04e10647534e64838dc4e7ec501509a6b3f9f35b150a2a9bb91aa4b7e0437e3
                  • Instruction Fuzzy Hash: 63133C3061CB488FE7B5EF28C455B9AB7E5FB98304F908A5D908EC3291DF749945CB82
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: $0$ZL;
                  • API String ID: 0-1570617776
                  • Opcode ID: 06448746b24deac0e15ab91d32f829ce41d75453b0dc82c18b22bb16e3d55171
                  • Instruction ID: 4102af80c2b5df878adca28d6e749ffd1458fb170b92fb58932ba5d6c32e7a4e
                  • Opcode Fuzzy Hash: 06448746b24deac0e15ab91d32f829ce41d75453b0dc82c18b22bb16e3d55171
                  • Instruction Fuzzy Hash: C0132F71218B488FE7B5EF28C459B9AB7E1FB98304F508A5DD09EC3291CF749945CB82
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000003.2753428763.0000013678910000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000013678910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_13678910000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: ZL;
                  • API String ID: 0-564850408
                  • Opcode ID: 5be2b335273847eff61db50915aac6bc2c5abc6be7d181fcbd48a9f44d8961f0
                  • Instruction ID: fd079675fa2ad512cebd76b99bf8a0ad44c4dcda70a61bf82a0e8b38d55fdfa7
                  • Opcode Fuzzy Hash: 5be2b335273847eff61db50915aac6bc2c5abc6be7d181fcbd48a9f44d8961f0
                  • Instruction Fuzzy Hash: 2C423D3061CB485FE7A5EB28C4597EAB6E6FBD8305F90892D908EC3295DF34D9418B42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ZL;
                  • API String ID: 0-564850408
                  • Opcode ID: 27dad52b2cb306d087f1098c6ef93517f008046be043ce7dcd771719f9afa9e7
                  • Instruction ID: a8b551228cda293676199d32b15edd66296376034d4f3db6fbce9ad69deec182
                  • Opcode Fuzzy Hash: 27dad52b2cb306d087f1098c6ef93517f008046be043ce7dcd771719f9afa9e7
                  • Instruction Fuzzy Hash: DA423131618B484FE7A5EB68C8597DBB7D2FBD8305F908A2DD08EC3291DF3499458B42
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _initp_misc_winsig
                  • String ID:
                  • API String ID: 2710132595-0
                  • Opcode ID: f753d6ac8f4332dcfcf60cdb62b0aa11027d34c576d5b5c95b1f215df632f05e
                  • Instruction ID: 99e61af40c9f6124365749c40ce0bba3c708fd5efc596ed69e61d7d467c5a1fd
                  • Opcode Fuzzy Hash: f753d6ac8f4332dcfcf60cdb62b0aa11027d34c576d5b5c95b1f215df632f05e
                  • Instruction Fuzzy Hash: 61A1EC31659A098FFFA4EFB5EC98AA537E2F774301721893A900AC3174DA3CD549DB50
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000003.2753428763.0000013678910000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000013678910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_13678910000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: ZL;
                  • API String ID: 0-564850408
                  • Opcode ID: 19013c7192c2998db012b5ee5c76ee51a9e6526d6ad9021287d7df6c0835f1a3
                  • Instruction ID: 15c7d7f49815998a0320eeae460d6d76502b612fb0e852f5b1d1b3aaa49fafd9
                  • Opcode Fuzzy Hash: 19013c7192c2998db012b5ee5c76ee51a9e6526d6ad9021287d7df6c0835f1a3
                  • Instruction Fuzzy Hash: 24029230A1CB489FE764EB2CC45A7AABBD5FBC8304F90855DA48AC3295DF34D945CB42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ZL;
                  • API String ID: 0-564850408
                  • Opcode ID: 8442d524e6c4a38b84636862eb89b104e0f66f5dd2435c5a69de2ac9332ee4c9
                  • Instruction ID: bc49cf56bf1a5e21d7ad1cd5f57a131cf963bd34d50f1006aaa62bfd1f698029
                  • Opcode Fuzzy Hash: 8442d524e6c4a38b84636862eb89b104e0f66f5dd2435c5a69de2ac9332ee4c9
                  • Instruction Fuzzy Hash: 06025431618B484FE764EF68D45A79ABBD1FBD8304F508A2DE48AC3292DF34D945CB42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000003.2753428763.0000013678910000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000013678910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_13678910000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID: ZL;
                  • API String ID: 0-564850408
                  • Opcode ID: 142b7ce1c7c986fae891d25b87e90acd813b815d1038af7ae6a49a0aef6ea954
                  • Instruction ID: 7d6a02e63ba37d1b0f7ac739a204d1900834f6ae5c66faad6f307f9f64aed323
                  • Opcode Fuzzy Hash: 142b7ce1c7c986fae891d25b87e90acd813b815d1038af7ae6a49a0aef6ea954
                  • Instruction Fuzzy Hash: FA719731A18B085FE754EF38C84A7DABBE5FBD4304F90861DA49AC3295EB34D945C782
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d28c713b99873312a6933a1e950f04861f45586520b813f328f06fa975c3fb11
                  • Instruction ID: f6f87918bc5f7a4c9f0cb12c23516d2ed87fad2548e5ddfa94d09b520fd65ec0
                  • Opcode Fuzzy Hash: d28c713b99873312a6933a1e950f04861f45586520b813f328f06fa975c3fb11
                  • Instruction Fuzzy Hash: 0662FA312286558FD31CCB1CC5B1B7AB7E1FB8A340F44896DE28BCB692C639D945CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40edf187d78bb53a1f4ec515dd6ec4c77522bea898fc053b18807d4a7f53a1ad
                  • Instruction ID: fa34ebf27cf353819bedfa316ad59e925fad1518607cd465422404837ee60c98
                  • Opcode Fuzzy Hash: 40edf187d78bb53a1f4ec515dd6ec4c77522bea898fc053b18807d4a7f53a1ad
                  • Instruction Fuzzy Hash: AA52FD312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE286CB692C639E945CB91
                  Memory Dump Source
                  • Source File: 00000000.00000003.2753428763.0000013678910000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000013678910000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_3_13678910000_loaddll64.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c3e8c8b596b043d19c8d9660ca9e6a667663a4d49c3b47da1907467d2da9a5ba
                  • Instruction ID: 95c63885c69c30dc6875f417c685e748e009b042d61ef927b6b6cacba2bb59a1
                  • Opcode Fuzzy Hash: c3e8c8b596b043d19c8d9660ca9e6a667663a4d49c3b47da1907467d2da9a5ba
                  • Instruction Fuzzy Hash: FC51C43071CB085FEB68AB2C84167BB7AD6FBC9314F90892DA04BC3285DE34DD028781

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 388111225-0
                  • Opcode ID: 18132ebb3f4a70da883eecaa0bb4194176adacf636e917766caae3702a5b6196
                  • Instruction ID: bf85d4c4c64ceb163b6b5f08731cf2e4900fb031abb77d9c4cacc62ed2cc4b63
                  • Opcode Fuzzy Hash: 18132ebb3f4a70da883eecaa0bb4194176adacf636e917766caae3702a5b6196
                  • Instruction Fuzzy Hash: 2D3136322087456EE3256F6C98973ECBFD0EB42328F958259E426972D3DAB09E018742

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                  • String ID:
                  • API String ID: 2644381645-0
                  • Opcode ID: 8a1414846f8ae69c8c0834781321c211a3ea89d75d9112808f99b657bddc2b01
                  • Instruction ID: 718067c77fec28ea24af43288a67956ca0726f0e145066733be1d70c29a40e38
                  • Opcode Fuzzy Hash: 8a1414846f8ae69c8c0834781321c211a3ea89d75d9112808f99b657bddc2b01
                  • Instruction Fuzzy Hash: 57213532618A442EF3186B589C833FCBFD0EB8A339FC48249E46AC72D3C6B45D014362

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                  • String ID:
                  • API String ID: 1078912150-0
                  • Opcode ID: e08e8afefb5e1ed1288eaa8c70c349a183a38912cda52555ccd69b221b02a642
                  • Instruction ID: f0cc49f96de5c76a9f11520ecfe3238e3a13c09525549a441bc003a04f76cfb3
                  • Opcode Fuzzy Hash: e08e8afefb5e1ed1288eaa8c70c349a183a38912cda52555ccd69b221b02a642
                  • Instruction Fuzzy Hash: E021F732A186406EF3197B18DC833FDBFD0DB8A339F958618E55A872D3D6B45D014752

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                  • String ID:
                  • API String ID: 2464146582-0
                  • Opcode ID: 1c3ae7bf2f131d3204e76b71d06c8acbef8e564e58e59c1052b2c6176ef77bc0
                  • Instruction ID: 0cea419fc14e5a0e0fe7ba0bcb10d02ad4af2b885684e45ad57c0c09882f2ca8
                  • Opcode Fuzzy Hash: 1c3ae7bf2f131d3204e76b71d06c8acbef8e564e58e59c1052b2c6176ef77bc0
                  • Instruction Fuzzy Hash: 4A2105326086442FF3156B1CDC977FCBFD0EB82329F998249E46AC72D3DAA45D024352

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                  • String ID:
                  • API String ID: 2140805544-0
                  • Opcode ID: 3d70402c67917632d9f1476d61cf5255035b19131c76902cc54b22fe87e88aa3
                  • Instruction ID: 93263f78e9827135e77fb05990a8c6f10e44ac7c501bb551976e7cab28399612
                  • Opcode Fuzzy Hash: 3d70402c67917632d9f1476d61cf5255035b19131c76902cc54b22fe87e88aa3
                  • Instruction Fuzzy Hash: 1F212733525A446EF3186B248CD33ECBF90EB45339FE5855DE05A972D3D6B88E408751

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1166 13678de6b5c-13678de6b80 1168 13678de6b82-13678de6b88 1166->1168 1169 13678de6b9c-13678de6bb6 call 13678de5e34 1166->1169 1170 13678de6b95-13678de6b96 1168->1170 1171 13678de6b8a-13678de6b93 call 13678de5e34 1168->1171 1176 13678de6bd2-13678de6c11 call 13678de5e34 * 3 1169->1176 1177 13678de6bb8-13678de6bbe 1169->1177 1170->1169 1171->1168 1171->1170 1188 13678de6c25-13678de6c3f 1176->1188 1189 13678de6c13-13678de6c1b 1176->1189 1178 13678de6bc0-13678de6bc9 call 13678de5e34 1177->1178 1179 13678de6bcb-13678de6bcc 1177->1179 1178->1177 1178->1179 1179->1176 1193 13678de6c41-13678de6c47 call 13678de5e34 1188->1193 1194 13678de6c4e-13678de6c58 1188->1194 1189->1188 1190 13678de6c1d-13678de6c20 call 13678de5e34 1189->1190 1190->1188 1193->1194 1196 13678de6c5a-13678de6c60 call 13678de5e34 1194->1196 1197 13678de6c67-13678de6c76 1194->1197 1196->1197 1199 13678de6c78-13678de6c89 1197->1199 1200 13678de6c97-13678de6ca1 1197->1200 1199->1200 1203 13678de6c8b-13678de6c91 call 13678de5e34 1199->1203 1203->1200
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno
                  • String ID:
                  • API String ID: 2288870239-0
                  • Opcode ID: 48841d5b384ec69418d2f44923ace36953bcf12c7c2bb233f82406c8f8afdcd4
                  • Instruction ID: 36e1116a8667cb4619c3694cf68c1262f6bf663bb534faa7946ad2f8f254e451
                  • Opcode Fuzzy Hash: 48841d5b384ec69418d2f44923ace36953bcf12c7c2bb233f82406c8f8afdcd4
                  • Instruction Fuzzy Hash: 37419532215E095FFBA5EB98E8D6BE8BBE1F75831DFD480289409C6191CA3C8E45CB10

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1206 13678dcc60c-13678dcc63f call 13678dcc11c 1209 13678dcc8c5-13678dcc8d5 1206->1209 1210 13678dcc645-13678dcc653 call 13678dcc48c 1206->1210 1210->1209 1213 13678dcc659-13678dcc68f 1210->1213 1214 13678dcc695-13678dcc6a1 1213->1214 1215 13678dcc8c0 1213->1215 1214->1215 1216 13678dcc6a7-13678dcc6c9 call 13678de5e74 * 3 1214->1216 1215->1209 1223 13678dcc89f-13678dcc8a2 1216->1223 1224 13678dcc6cf-13678dcc6d2 1216->1224 1225 13678dcc8a4-13678dcc8a7 call 13678de5e34 1223->1225 1226 13678dcc8ac-13678dcc8af 1223->1226 1227 13678dcc897-13678dcc89a call 13678de5e34 1224->1227 1228 13678dcc6d8-13678dcc6db 1224->1228 1225->1226 1230 13678dcc8b1-13678dcc8b4 call 13678de5e34 1226->1230 1231 13678dcc8b9-13678dcc8be 1226->1231 1227->1223 1228->1227 1232 13678dcc6e1-13678dcc6f3 1228->1232 1230->1231 1231->1209 1235 13678dcc6f5-13678dcc70a 1232->1235 1236 13678dcc70c-13678dcc718 1232->1236 1237 13678dcc71c-13678dcc727 call 13678dc98bc 1235->1237 1236->1237 1240 13678dcc87b-13678dcc895 call 13678de5e34 * 3 1237->1240 1241 13678dcc72d-13678dcc795 call 13678de6120 call 13678de6510 1237->1241 1240->1209 1253 13678dcc7a1-13678dcc7c3 call 13678dcd4f0 1241->1253 1254 13678dcc797-13678dcc79c 1241->1254 1253->1240 1257 13678dcc7c9-13678dcc7cc 1253->1257 1254->1240 1258 13678dcc7ce-13678dcc7d8 1257->1258 1259 13678dcc7e7-13678dcc800 call 13678dcd4f0 1257->1259 1260 13678dcc7da-13678dcc7e5 1258->1260 1259->1240 1263 13678dcc802-13678dcc808 1259->1263 1260->1259 1260->1260 1264 13678dcc823-13678dcc82d 1263->1264 1265 13678dcc80a-13678dcc814 1263->1265 1266 13678dcc82f-13678dcc836 1264->1266 1267 13678dcc838-13678dcc879 call 13678de6510 * 2 1264->1267 1268 13678dcc816-13678dcc821 1265->1268 1266->1240 1267->1240 1268->1264 1268->1268
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$malloc$_errno$_callnewh
                  • String ID:
                  • API String ID: 4160633307-0
                  • Opcode ID: 5d381bd07e07abc5cc61bca33b8e964a0049242f17c35a6925a1d6c8d9ec1d95
                  • Instruction ID: 89e0ffb7cafff120d085f9212f895257cc35f3fa82d9a7d9b384f3aa84153810
                  • Opcode Fuzzy Hash: 5d381bd07e07abc5cc61bca33b8e964a0049242f17c35a6925a1d6c8d9ec1d95
                  • Instruction Fuzzy Hash: 0B910A32318B485FD759AA2C94437FA7BD1EB85768F90535ED58AC32C3EE24DD028782

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 2917016420-0
                  • Opcode ID: e40d3c8a52f00debdf29b23577ddc16d369424b82a41f8c403c46455c076bb21
                  • Instruction ID: 4cd2a199fb446852e803faeefc6302d51b840409c707a4a06782eb6c5aa8156d
                  • Opcode Fuzzy Hash: e40d3c8a52f00debdf29b23577ddc16d369424b82a41f8c403c46455c076bb21
                  • Instruction Fuzzy Hash: AF31F831614A095FFB58AF69A8063EABBD1FB88318F54C15DA40AC32D6DA38CD41C741

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1304 13678df132c-13678df1343 1305 13678df1355-13678df1357 1304->1305 1306 13678df1345-13678df1350 call 13678de8908 1304->1306 1308 13678df13e2-13678df13ed call 13678de8908 call 13678de8f30 1305->1308 1309 13678df135d-13678df1363 1305->1309 1313 13678df13f2 1306->1313 1308->1313 1309->1308 1311 13678df1365-13678df1389 1309->1311 1311->1308 1314 13678df138b-13678df139c call 13678df0ea0 1311->1314 1316 13678df13f5-13678df1402 1313->1316 1320 13678df139e-13678df13b0 call 13678df11dc 1314->1320 1321 13678df13c9-13678df13d4 call 13678de8908 1314->1321 1330 13678df13b2-13678df13ba 1320->1330 1331 13678df13bc 1320->1331 1326 13678df13d7-13678df13e0 call 13678df1300 1321->1326 1326->1316 1332 13678df13be-13678df13c0 1330->1332 1331->1332 1332->1326 1333 13678df13c2-13678df13c7 call 13678de8898 1332->1333 1333->1321
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                  • String ID:
                  • API String ID: 4120058822-0
                  • Opcode ID: f27d13967f6dfcd6a5307430cad8985e1ca3dc7c562c85e054a4792eecbdb70d
                  • Instruction ID: 3e1c8e75cd2132d614b35d5f0d84f4b38b564907a4d70b0b1596096f857a0d68
                  • Opcode Fuzzy Hash: f27d13967f6dfcd6a5307430cad8985e1ca3dc7c562c85e054a4792eecbdb70d
                  • Instruction Fuzzy Hash: 98216432604741AEFB26ABA898933EC7EC0EB55318FC4821CE036872D2C6B49E009B51

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1337 13678de7700-13678de7730 1338 13678de7732-13678de7735 1337->1338 1339 13678de774c 1337->1339 1338->1339 1341 13678de7737-13678de773a 1338->1341 1340 13678de774e-13678de7762 1339->1340 1342 13678de7763-13678de776e 1341->1342 1343 13678de773c-13678de7741 call 13678de8908 1341->1343 1344 13678de7770-13678de777c 1342->1344 1345 13678de777e-13678de7782 1342->1345 1351 13678de7747 call 13678de8f30 1343->1351 1344->1345 1347 13678de77a6-13678de77b7 1344->1347 1348 13678de7784-13678de778f call 13678de6120 1345->1348 1349 13678de7793-13678de7796 1345->1349 1354 13678de77be 1347->1354 1355 13678de77b9-13678de77bc 1347->1355 1348->1349 1349->1343 1353 13678de7798-13678de77a4 1349->1353 1351->1339 1353->1343 1353->1347 1358 13678de77c3-13678de77ca 1354->1358 1355->1358 1359 13678de77d0-13678de77dd 1358->1359 1360 13678de78da-13678de78dd 1358->1360 1361 13678de77df-13678de77e6 1359->1361 1362 13678de7837-13678de783d 1359->1362 1360->1340 1363 13678de7832-13678de7833 1361->1363 1364 13678de77e8 1361->1364 1365 13678de78a2-13678de78ad call 13678ded840 1362->1365 1366 13678de783f-13678de7841 1362->1366 1363->1362 1367 13678de7905 1364->1367 1368 13678de77ee-13678de77fb 1364->1368 1375 13678de7909-13678de7914 1365->1375 1383 13678de78af-13678de78b2 1365->1383 1370 13678de7862-13678de7869 1366->1370 1371 13678de7843-13678de7848 1366->1371 1367->1375 1373 13678de78e2-13678de78e6 1368->1373 1374 13678de7801-13678de7821 call 13678ded984 1368->1374 1372 13678de786c-13678de7872 1370->1372 1377 13678de7854-13678de785b 1371->1377 1378 13678de784a-13678de7852 1371->1378 1372->1373 1379 13678de7874-13678de7890 call 13678dec644 call 13678dedb28 1372->1379 1380 13678de78f5-13678de7900 call 13678de8908 1373->1380 1381 13678de78e8-13678de78f0 call 13678de6120 1373->1381 1392 13678de7823-13678de782d 1374->1392 1375->1340 1384 13678de785d-13678de7860 1377->1384 1378->1384 1397 13678de7919-13678de791d 1379->1397 1398 13678de7896-13678de7899 1379->1398 1380->1351 1381->1380 1383->1373 1389 13678de78b4-13678de78c3 1383->1389 1384->1372 1393 13678de78c7-13678de78cf 1389->1393 1392->1393 1393->1359 1395 13678de78d5-13678de78d6 1393->1395 1395->1360 1397->1375 1398->1367 1399 13678de789b-13678de78a0 1398->1399 1399->1392
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                  • String ID:
                  • API String ID: 2328795619-0
                  • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                  • Instruction ID: 01000f89bb79e4e257398d5a927c6661b13cdbe1890b31871b193fbc76e29c09
                  • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
                  • Instruction Fuzzy Hash: F3610D32228F092AE7AC666C48873B9FBD1E795734FA4832ED455C32D1DE60DD5283C1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1400 13678df67c0-13678df67fc call 13678de81f0 1404 13678df6805-13678df6808 1400->1404 1405 13678df67fe-13678df6800 1400->1405 1407 13678df680f-13678df6824 call 13678de8908 call 13678de8f30 1404->1407 1408 13678df680a-13678df680d 1404->1408 1406 13678df6897-13678df689c 1405->1406 1411 13678df689e-13678df68a3 1406->1411 1412 13678df68aa-13678df68c6 1406->1412 1407->1406 1408->1407 1409 13678df6826-13678df682e 1408->1409 1413 13678df6842-13678df684b 1409->1413 1414 13678df6830-13678df6840 call 13678de8908 call 13678de8f30 1409->1414 1411->1412 1417 13678df6862-13678df6892 call 13678df7774 1413->1417 1418 13678df684d-13678df6860 call 13678df732c 1413->1418 1414->1406 1417->1406 1428 13678df6894 1417->1428 1418->1406 1428->1406
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: __updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 2808835054-0
                  • Opcode ID: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                  • Instruction ID: e968198e772fd0bc8bd7d55de3d454c87f99ed868a994202fa0c68d4f80c1090
                  • Opcode Fuzzy Hash: 04a51c6534ba67d8c2ce71a0e6c0b8946822a3beaaa0ad6abf8e1e016199c0f5
                  • Instruction Fuzzy Hash: 5631E571518B486FD754DF58A0827A9BFD0FB68328F90829DE429C72D6DB70DD40DB81
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                  • String ID:
                  • API String ID: 1547050394-0
                  • Opcode ID: aea42a6da675c9ef6e6bb8b8e91e805078560935a98c47ae5044fabd1e1da4ae
                  • Instruction ID: 71c22e6880299bba51d10b310f7b8dca6c1a184f378e253b13ebd27fddda7d74
                  • Opcode Fuzzy Hash: aea42a6da675c9ef6e6bb8b8e91e805078560935a98c47ae5044fabd1e1da4ae
                  • Instruction Fuzzy Hash: B521F832618B496FF790AB2848033AAFFD1FB99318F85855A9445D3292DF34CE414391
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc
                  • String ID:
                  • API String ID: 2761444284-0
                  • Opcode ID: c2f67a7a0a72836e94fad93a939ec52e5ab87d845e1a419a5e47157519d33b6e
                  • Instruction ID: 0fb461771d9f2c709f5e686b441936602fa629d2b0567b60b7caf8bb02c30a09
                  • Opcode Fuzzy Hash: c2f67a7a0a72836e94fad93a939ec52e5ab87d845e1a419a5e47157519d33b6e
                  • Instruction Fuzzy Hash: 0751E731618F096FE7599B6894463BAB7D0FB49318F90526DD94AC3287EF20DD028784
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                  • String ID:
                  • API String ID: 74200508-0
                  • Opcode ID: 047208885cf629ea2cae4dbf681448a9bb5cd42041197bd2c6b9d61aa6dad07d
                  • Instruction ID: 19245e931eb3804c10314d827e7c66631fa3851ac11eb5af0376b317fec8d5fc
                  • Opcode Fuzzy Hash: 047208885cf629ea2cae4dbf681448a9bb5cd42041197bd2c6b9d61aa6dad07d
                  • Instruction Fuzzy Hash: 8DD18632704A0467EB58BB7494577E9BBD2EB84308FE0956EB446C32C3EE24DE058B91
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: freemallocstrchr$_errno
                  • String ID:
                  • API String ID: 4025974267-0
                  • Opcode ID: 5673eae19a0e561bdbd1139d9e451eb32bd38d37b55d865a525908fae5e06296
                  • Instruction ID: a113b19bbd4949fd33f4385c8897c5d6f469ab7071924ea9f45c25542af3cd24
                  • Opcode Fuzzy Hash: 5673eae19a0e561bdbd1139d9e451eb32bd38d37b55d865a525908fae5e06296
                  • Instruction Fuzzy Hash: 5781F931618E886AE766AB2C94033FAFBD1FF9930DF80416ED589C7193DE248E46C751
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$_callnewh_fseek_nolock_ftelli64fclose
                  • String ID:
                  • API String ID: 2887643383-0
                  • Opcode ID: 9720734a985e3cbddb0c986b5420d504e31cc35e52c12b4a9c10f9ebd5591f36
                  • Instruction ID: e774fcec972e4f365f674fd0b17b8ef09c382628e5cec9d51ae095118edd5fb5
                  • Opcode Fuzzy Hash: 9720734a985e3cbddb0c986b5420d504e31cc35e52c12b4a9c10f9ebd5591f36
                  • Instruction Fuzzy Hash: C951B432618A085FE749EB2894577F976D1FB88714F90826EE44BC32D7DD249E028BC1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _lock$_calloc_crt_mtinitlocknum
                  • String ID:
                  • API String ID: 3962633935-0
                  • Opcode ID: bf4c13b5270503a4abd82548ba536fbf1806decc40b0578f94ecd9bb06afaf17
                  • Instruction ID: db3eaf8301c884173bc7916b792a7894d54933dcf4ac5837abad24fa1457a5f8
                  • Opcode Fuzzy Hash: bf4c13b5270503a4abd82548ba536fbf1806decc40b0578f94ecd9bb06afaf17
                  • Instruction Fuzzy Hash: 36513A31518B499FEB149F18C8427A5BBD0FF68314F91815DE85AC71A2D774DD41CF82
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc
                  • String ID:
                  • API String ID: 2761444284-0
                  • Opcode ID: f976f75d609109cfe45b7f42c156cc71c0f6e702b52c7f4d8ab9b9eb4d0c589d
                  • Instruction ID: 46357c68de09261fa550220982e5d0661be2ad28a09306f55efd3572a02726cc
                  • Opcode Fuzzy Hash: f976f75d609109cfe45b7f42c156cc71c0f6e702b52c7f4d8ab9b9eb4d0c589d
                  • Instruction Fuzzy Hash: A7412B32258B0D5FE759AB28485B3BA7BD4E795358F94822DE48BC3243ED20DD0387C0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                  • String ID:
                  • API String ID: 304646821-0
                  • Opcode ID: 9fabdea84d0824fac2734452a9f63b1252c016be94808478d1f2e6cd97a01d2a
                  • Instruction ID: 5bca3b2522c87bbaab35af9d4fbc4603f404c88b2accb549baf3adf5caca9dab
                  • Opcode Fuzzy Hash: 9fabdea84d0824fac2734452a9f63b1252c016be94808478d1f2e6cd97a01d2a
                  • Instruction Fuzzy Hash: 4351D532114A486FEB98EF18C483BA5BBD2FB54314FD48559D855CB2C6D674CE41C781
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 761449704-0
                  • Opcode ID: 7fbd6a351a4cb820a75f12ea8225a7df12219c348c581bb7f064621535b48d3b
                  • Instruction ID: 5b184c578cd273fe21f947b6abaf3acfe1b4e91c59337b987824872a37132d47
                  • Opcode Fuzzy Hash: 7fbd6a351a4cb820a75f12ea8225a7df12219c348c581bb7f064621535b48d3b
                  • Instruction Fuzzy Hash: 4F41BC3170CD481FDB58AB2C68573F8BBE2E789314F94829DD08EC3297D924DD028781
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno$free$_callnewhfclosefwritemalloc
                  • String ID:
                  • API String ID: 1696598829-0
                  • Opcode ID: 4044c7cfb370f8cbb2fe880fee6f96d794ba6fb0331d43b2e22f2d93f87d349f
                  • Instruction ID: 91021c5432d90cb6d0dc3d915154f6a28fd3f836da0a5cf46aa5fb0ac8503c91
                  • Opcode Fuzzy Hash: 4044c7cfb370f8cbb2fe880fee6f96d794ba6fb0331d43b2e22f2d93f87d349f
                  • Instruction Fuzzy Hash: AD218632218E085BE798F72C44567EDBAD1FB9C348FA0856E744AC32C6DD248E014791
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _getptd_noexit$__doserrno_errno
                  • String ID:
                  • API String ID: 2964073243-0
                  • Opcode ID: 37268f2f3763d0ffa2fcafc6510c2b93f8b56cf813f77b885a3d7f14ba8a0b7c
                  • Instruction ID: ed956d86a5ed9a8d647cb29d180ea0c3a867b8d4fdddabb430407a1f0d44fc40
                  • Opcode Fuzzy Hash: 37268f2f3763d0ffa2fcafc6510c2b93f8b56cf813f77b885a3d7f14ba8a0b7c
                  • Instruction Fuzzy Hash: 2B0186325645896EFB5AA76488533D87EA1FB2232EFD4C244E429C71D2E67C4F409712
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _snprintf
                  • String ID:
                  • API String ID: 3512837008-0
                  • Opcode ID: 97546a0ab56648f0e12b9c4261f5022597e73a89edba6ec666ef57aa91bfa1fd
                  • Instruction ID: 228623ddeb1a04b14aee07386fa44eb0a0a524c48ed7ca65dfe38febbf716cff
                  • Opcode Fuzzy Hash: 97546a0ab56648f0e12b9c4261f5022597e73a89edba6ec666ef57aa91bfa1fd
                  • Instruction Fuzzy Hash: E691FB31118A489FEB55FF68E886BE9BBE5FB94304F50816AE446C3192DF34DE41CB81
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                  • String ID:
                  • API String ID: 2026495703-0
                  • Opcode ID: 5cf36a0f46bdde7e2e607a114f81d07c702ff0cc7ddf641e62925f8ba8e7d262
                  • Instruction ID: f867b78c5efee33a8639cab9546a2f20921a9f9228f40fdf2f1599d6fd7c5155
                  • Opcode Fuzzy Hash: 5cf36a0f46bdde7e2e607a114f81d07c702ff0cc7ddf641e62925f8ba8e7d262
                  • Instruction Fuzzy Hash: 2A11213161CF085FE798EB6CA446395BBE1E78C710F50465EE04AC3296DA349D4147D5
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                  • String ID:
                  • API String ID: 634798775-0
                  • Opcode ID: fe3cbb59b92623254f31535bbcc3535ec3896c7653a338e87c95c01442f4d144
                  • Instruction ID: 3c931efd35986e1d7ec65093fcaafb85ec72e545ec6d0a4e001c28823af95f93
                  • Opcode Fuzzy Hash: fe3cbb59b92623254f31535bbcc3535ec3896c7653a338e87c95c01442f4d144
                  • Instruction Fuzzy Hash: 46512C31218F091FE6E8995D54473B9FBC1E754318F94C26EE89AC31D6EA50DE424382
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: clock
                  • String ID:
                  • API String ID: 3195780754-0
                  • Opcode ID: 1f39cef3506f56873464473c822950bba433c316edd6cd9574543658a040bd63
                  • Instruction ID: 51048e5dea47330feb70276e8392bc26f80ea93f7d9a90ee8e769d287464762c
                  • Opcode Fuzzy Hash: 1f39cef3506f56873464473c822950bba433c316edd6cd9574543658a040bd63
                  • Instruction Fuzzy Hash: 05212E3340C7093EE764AD9894473B6BBD1E755354F15932EE896C3343F5509E4286C1
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                  • String ID:
                  • API String ID: 1991439119-0
                  • Opcode ID: cc5de2a5ab8d425de91fc795c60406dbd1dbe31fd1b87bcf1b4a8227761dc4fd
                  • Instruction ID: f90134a551212e7b9ef281919cbee7de8ee180fcb9926d9db902999368940c0c
                  • Opcode Fuzzy Hash: cc5de2a5ab8d425de91fc795c60406dbd1dbe31fd1b87bcf1b4a8227761dc4fd
                  • Instruction Fuzzy Hash: 7F11CA33115A0D9AF74AEB60FC967EAB7A4F754308FC4852AD452D60E1EE389E44C744
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                  • String ID: B
                  • API String ID: 1812809483-1255198513
                  • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                  • Instruction ID: bc492754f1ac6324c5a637efdf27f33416ca756577273bd5ad572364ae9f9971
                  • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
                  • Instruction Fuzzy Hash: 9711B231628A085FD754EF5894467A9BBD1FB98328F9043AEA059C32A1CB74C940C782
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: free$_errno$_callnewhmalloc
                  • String ID:
                  • API String ID: 2761444284-0
                  • Opcode ID: e25408eb960958c7e3879afad934e268323eef93c99906fc31d4779dc69f5fd0
                  • Instruction ID: df7329488446addd7593969e64e5bb22f0384ea028ed87718c89bc04093d19d6
                  • Opcode Fuzzy Hash: e25408eb960958c7e3879afad934e268323eef93c99906fc31d4779dc69f5fd0
                  • Instruction Fuzzy Hash: 9E61C632318A085BEB69EB28D4437EDB7D1FB95314F904A5DE44AC32C7EE249E068781
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2754622278.0000013678DC0000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000013678DC0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_13678dc0000_loaddll64.jbxd
                  Yara matches
                  Similarity
                  • API ID: malloc
                  • String ID:
                  • API String ID: 2803490479-0
                  • Opcode ID: 0ec438b910e9f8ed57fb52a771f8cb7a2d564e7f60b966302d312431711d2172
                  • Instruction ID: baf4bec9ebe450028e306fa6bbea20e39e5fba34c67df1e566169450298e69e2
                  • Opcode Fuzzy Hash: 0ec438b910e9f8ed57fb52a771f8cb7a2d564e7f60b966302d312431711d2172
                  • Instruction Fuzzy Hash: D851A53261CA055FDB58DF28D4866BA77D1FB84314F84966DE94BC3287EA30ED028685