Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dfsvc.exe

Overview

General Information

Sample name:dfsvc.exe
Analysis ID:1541358
MD5:3597d9e93852fddb92e0a0cf0452bb61
SHA1:d25c62a57ac3000244741bda129f483f2347efa6
SHA256:6e6cb0729cb902420739148ae23bf1c7959bc8ea2bf6b6277c5c0de45aa77df6
Infos:

Detection

Score:4
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w7x64
  • dfsvc.exe (PID: 3584 cmdline: "C:\Users\user\Desktop\dfsvc.exe" MD5: 3597D9E93852FDDB92E0A0CF0452BB61)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: dfsvc.exeStatic PE information: certificate valid
Source: dfsvc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: dfsvc.pdbD.^. P._CorExeMainmscoree.dll source: dfsvc.exe
Source: Binary string: dfsvc.pdb source: dfsvc.exe
Source: dfsvc.exe, 00000000.00000002.751715006.000000000049D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs dfsvc.exe
Source: classification engineClassification label: clean4.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\dfsvc.exeMutant created: NULL
Source: dfsvc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: dfsvc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\dfsvc.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeSection loaded: rpcrtremote.dllJump to behavior
Source: dfsvc.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: dfsvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: dfsvc.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: dfsvc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: dfsvc.pdbD.^. P._CorExeMainmscoree.dll source: dfsvc.exe
Source: Binary string: dfsvc.pdb source: dfsvc.exe
Source: C:\Users\user\Desktop\dfsvc.exeCode function: 0_2_000007FE93D500BD pushad ; iretd 0_2_000007FE93D500C1
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeMemory allocated: 3B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeMemory allocated: 1A400000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Users\user\Desktop\dfsvc.exe TID: 3644Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exe TID: 3648Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exe TID: 3648Thread sleep time: -600000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\dfsvc.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\dfsvc.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeQueries volume information: C:\Users\user\Desktop\dfsvc.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\dfsvc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping32
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts32
Virtualization/Sandbox Evasion
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
dfsvc.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
bg.microsoft.map.fastly.net
199.232.210.172
truefalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1541358
    Start date and time:2024-10-24 18:22:43 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:3
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:dfsvc.exe
    Detection:CLEAN
    Classification:clean4.winEXE@1/0@0/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 1
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
    • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net
    • Execution Graph export aborted for target dfsvc.exe, PID 3584 because it is empty
    • VT rate limit hit for: dfsvc.exe
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    bg.microsoft.map.fastly.netQN1BkRVd.emlGet hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://na2.docusign.net/Signing/EmailStart.aspx?a=c6104538-ac3b-4407-b24b-a0b641ee4589&etti=24&acct=7853161b-6814-4528-85bc-ffe96cfca42f&er=09ab18a7-8de5-4c92-931d-cb9cd9f7b00dGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://egift.activationshub.com/gift-card/view/8lPFUrjq1LGzg7JHwS8hJJRdLGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://www.canva.com/design/DAGUUU-VdiI/DdL4Z-_loK4X7NMMbGGnJg/view?utm_content=DAGUUU-VdiI&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    Windows-StandardCollector-x64.exeGet hashmaliciousCodoso GhostBrowse
    • 199.232.210.172
    Payment for outstanding statements.pdfGet hashmaliciousHTMLPhisherBrowse
    • 199.232.214.172
    ATT25322.htmlGet hashmaliciousUnknownBrowse
    • 199.232.210.172
    https://app.pandadoc.com/document/v2?token=69b8ae0059c2551a9a27ed1b65653c1a0b5ee1ffGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    file.exeGet hashmaliciousUnknownBrowse
    • 199.232.214.172
    https://1drv.ms/o/c/3e563d3fb2a98d1c/Emlo5KUbYYNEvKtIF-7SS0EBYSeT3hOOGuv_MbeT-n2y4g?e=HPjqUnGet hashmaliciousHtmlDropperBrowse
    • 199.232.214.172
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):6.618100720659971
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
    • Win32 Executable (generic) a (10002005/4) 49.97%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:dfsvc.exe
    File size:18'336 bytes
    MD5:3597d9e93852fddb92e0a0cf0452bb61
    SHA1:d25c62a57ac3000244741bda129f483f2347efa6
    SHA256:6e6cb0729cb902420739148ae23bf1c7959bc8ea2bf6b6277c5c0de45aa77df6
    SHA512:5af245a68516698f0bcb63829f1c3abe429a06e94755ab50a29f51914b39e4719a901d2174550b691d5b0fdf1e23ca921714a2c5b2739925ef902766e4ab10d0
    SSDEEP:384:kNqQPZrpWKvX16WVFeyHRN7kpQtR9zusk0jUNu:k4IZbX1hYuCQP9zuDwUNu
    TLSH:22826CD28BAC5113EC9718B016A5EA837E3C53DB48C6996B31CEE5593F837C1CB21369
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....:.b.........."...0.............n.... ...@....@.. ....................................`................................
    Icon Hash:aaf3e3e3918382a0
    Entrypoint:0x402e6e
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x62B63ABF [Fri Jun 24 22:29:19 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Signature Valid:true
    Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 9/2/2021 11:32:59 AM 9/1/2022 11:32:59 AM
    Subject Chain
    • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Version:3
    Thumbprint MD5:D15B2B9631F8B37BA8D83A5AE528A8BB
    Thumbprint SHA-1:8740DF4ACB749640AD318E4BE842F72EC651AD80
    Thumbprint SHA-256:2EB421FBB33BBF9C8F6B58C754B0405F40E02CB6328936AAE39DB7A24880EA21
    Serial:33000002528B33AAF895F339DB000000000252
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2e1c0x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000xa0c.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x20000x27a0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x2ce40x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000xe740x10001b510bfedb939f08b6dc96ba7e47c02eFalse0.55712890625data5.389483992507497IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x40000xa0c0xc00c1ecdb1eda940036a01100f23ed09cf8False0.3424479166666667data4.225801393109791IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x60000xc0x200ef563e389af6842eb23cd90f4dcd24b2False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x40900x3b0dataEnglishUnited States0.4713983050847458
    RT_MANIFEST0x44500x5b5exported SGML document, ASCII textEnglishUnited States0.37782340862423
    DLLImport
    mscoree.dll_CorExeMain
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 24, 2024 18:23:49.881988049 CEST8.8.8.8192.168.2.220xdd47No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
    Oct 24, 2024 18:23:49.881988049 CEST8.8.8.8192.168.2.220xdd47No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
    Oct 24, 2024 18:23:49.893004894 CEST8.8.8.8192.168.2.220x9680No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
    Oct 24, 2024 18:23:49.893004894 CEST8.8.8.8192.168.2.220x9680No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:12:23:33
    Start date:24/10/2024
    Path:C:\Users\user\Desktop\dfsvc.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\dfsvc.exe"
    Imagebase:0xff0000
    File size:18'336 bytes
    MD5 hash:3597D9E93852FDDB92E0A0CF0452BB61
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.751987156.000007FE93D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE93D50000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7fe93d50000_dfsvc.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 58b8b3ba04fe01de1ef81cfae2a1fa1482ca15eee0f34f96e056e83fddf6b2a5
      • Instruction ID: c08559d767c8229f4c5acb48c8f5c0f246d6efe650709f522b700bd03f725803
      • Opcode Fuzzy Hash: 58b8b3ba04fe01de1ef81cfae2a1fa1482ca15eee0f34f96e056e83fddf6b2a5
      • Instruction Fuzzy Hash: 9CC08C1091D0818BCB02BB758CAC3D13F70DB59204F8804A2C884CA02BD66C40DE8B22