Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PrefetchParser.exe

Overview

General Information

Sample name:PrefetchParser.exe
Analysis ID:1587110
MD5:620346b4e1b7a7b853ec4d94fa93c165
SHA1:83d382e44669118fb91cf8c43e35ce73152f4aa0
SHA256:100406a9da5c039f752afa40a136f6e03cd6fe9d8c2d9f1c47362e4dddc263cb
Tags:exeuser-jxsonbfd92180

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Binary or sample is protected by dotNetProtector
Potentially malicious time measurement code found
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Contains functionality for execution timing, often used to detect debuggers
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64
  • PrefetchParser.exe (PID: 7708 cmdline: "C:\Users\user\Desktop\PrefetchParser.exe" MD5: 620346B4E1B7A7B853EC4D94FA93C165)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: PrefetchParser.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: $h = /C:\\Users\\PC\\Desktop\\Cleaner-main\\obj\\x64\\Release\\WindowsFormsApp3\.pdb/i ascii wide source: PrefetchParser.exe, 00000000.00000002.3809739820.0000018EAF1A0000.00000004.00000020.00020000.00000000.sdmp, PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: $y = /C:\\Users\\Daniel\\Desktop\\client-top\\x64\\Release\\top-internal\.pdb/i ascii wide source: PrefetchParser.exe, 00000000.00000002.3809739820.0000018EAF1A0000.00000004.00000020.00020000.00000000.sdmp, PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: $x = /C:\\Users\\Daniel\\Desktop\\client-top\\x64\\Release\\top-external\.pdb/i ascii wide source: PrefetchParser.exe, 00000000.00000002.3809739820.0000018EAF1A0000.00000004.00000020.00020000.00000000.sdmp, PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmp
Source: PrefetchParser.exeString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFL
Source: PrefetchParser.exeString found in binary or memory: http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright
Source: PrefetchParser.exeString found in binary or memory: http://www.google.com/fontshttp://www.hubertfischer.comThis
Source: C:\Users\user\Desktop\PrefetchParser.exeCode function: 0_2_00007FF66A1115000_2_00007FF66A111500
Source: classification engineClassification label: mal52.evad.winEXE@1/0@0/0
Source: PrefetchParser.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PrefetchParser.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PrefetchParser.exeString found in binary or memory: id-cmc-addExtensions
Source: PrefetchParser.exeString found in binary or memory: set-addPolicy
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: xinput1_4.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: inputhost.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: PrefetchParser.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: PrefetchParser.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: PrefetchParser.exeStatic file information: File size 3219968 > 1048576
Source: PrefetchParser.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x222400
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: PrefetchParser.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: PrefetchParser.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: $h = /C:\\Users\\PC\\Desktop\\Cleaner-main\\obj\\x64\\Release\\WindowsFormsApp3\.pdb/i ascii wide source: PrefetchParser.exe, 00000000.00000002.3809739820.0000018EAF1A0000.00000004.00000020.00020000.00000000.sdmp, PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: $y = /C:\\Users\\Daniel\\Desktop\\client-top\\x64\\Release\\top-internal\.pdb/i ascii wide source: PrefetchParser.exe, 00000000.00000002.3809739820.0000018EAF1A0000.00000004.00000020.00020000.00000000.sdmp, PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: $x = /C:\\Users\\Daniel\\Desktop\\client-top\\x64\\Release\\top-external\.pdb/i ascii wide source: PrefetchParser.exe, 00000000.00000002.3809739820.0000018EAF1A0000.00000004.00000020.00020000.00000000.sdmp, PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmp
Source: PrefetchParser.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: PrefetchParser.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: PrefetchParser.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: PrefetchParser.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: PrefetchParser.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation

barindex
Source: PrefetchParser.exe, 00000000.00000003.1425001903.0000018EAB307000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: $e = /dotNetProtector/i ascii wide
Source: PrefetchParser.exe, 00000000.00000003.1445542799.0000018EAB307000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: $e = /dotNetProtector/i ascii wide
Source: PrefetchParser.exe, 00000000.00000002.3808552843.0000018EAB307000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: $e = /dotNetProtector/i ascii wide
Source: PrefetchParser.exe, 00000000.00000002.3807643508.00000006C40F5000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: $e = /dotNetProtector/i ascii wide
Source: C:\Users\user\Desktop\PrefetchParser.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\PrefetchParser.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT DeviceID, VolumeSerialNumber FROM Win32_LogicalDisk
Source: C:\Users\user\Desktop\PrefetchParser.exeCode function: 0_2_00007FF66A111380 rdtsc 0_2_00007FF66A111380
Source: C:\Users\user\Desktop\PrefetchParser.exeWindow / User API: foregroundWindowGot 593Jump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeWindow / User API: foregroundWindowGot 1182Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\PrefetchParser.exeCode function: 0_2_00007FF66A1113800_2_00007FF66A111380
Source: C:\Users\user\Desktop\PrefetchParser.exeCode function: 0_2_00007FF66A1113300_2_00007FF66A111330
Source: C:\Users\user\Desktop\PrefetchParser.exeCode function: 0_2_00007FF66A111380 rdtsc 0_2_00007FF66A111380
Source: C:\Users\user\Desktop\PrefetchParser.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PrefetchParser.exeCode function: 0_2_00007FF66A331CA4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF66A331CA4
Source: C:\Users\user\Desktop\PrefetchParser.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PrefetchParser.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyright0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLPrefetchParser.exefalse
      high
      http://www.google.com/fontshttp://www.hubertfischer.comThisPrefetchParser.exefalse
        high
        http://scripts.sil.org/OFLhttp://scripts.sil.org/OFLCopyrightPrefetchParser.exefalse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1587110
        Start date and time:2025-01-10 00:12:09 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 6s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:PrefetchParser.exe
        Detection:MAL
        Classification:mal52.evad.winEXE@1/0@0/0
        EGA Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target PrefetchParser.exe, PID 7708 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • VT rate limit hit for: PrefetchParser.exe
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0017.t-0009.t-msedge.nethttp://loginmicrosoftonline.Ssc.qnkproductions.com/cache/css/Ssc/mwoods@ssc.nsw.gov.auGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        https://199.188.109.181Get hashmaliciousUnknownBrowse
        • 13.107.246.45
        http://cesinc365.xemitronax.ru/9FAvn/Get hashmaliciousUnknownBrowse
        • 13.107.246.45
        https://p3rsa.appdocumentcenter.com/BpdLOGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        https://docsend.com/view/sutbz9ibkqcisjtvGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        RFQ-20241230.pif.exeGet hashmaliciousRemcosBrowse
        • 13.107.246.45
        24 UA10005 TCS-condaco-Lease_7_oct.xlam.xlsxGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        Nuevo-orden.xla.xlsxGet hashmaliciousUnknownBrowse
        • 13.107.246.45
        ReIayMSG__polarisrx.com_#7107380109.htmGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):6.763071126003764
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:PrefetchParser.exe
        File size:3'219'968 bytes
        MD5:620346b4e1b7a7b853ec4d94fa93c165
        SHA1:83d382e44669118fb91cf8c43e35ce73152f4aa0
        SHA256:100406a9da5c039f752afa40a136f6e03cd6fe9d8c2d9f1c47362e4dddc263cb
        SHA512:1dfc82d910724e4be980f6055e0b95c462caab79a0b932c166e83f4bbdb2b0caf0d4aa4e6ad71126a52eaca7906ddf0ba1d7b8a31478e6e2573facb2dc1e9676
        SSDEEP:49152:2OjPWtrTKuk2p0IU6iPorpL0lJCCEeFWyEvWaETXqJm2SlOh5PBcoaZiPKcbFTFC:ib+PNuYsJxaZlcj
        TLSH:8DE5AE42929D01E8D97BC178C9679253E7B1B0B123F45BDB46A44A740FA37E26F3EB01
        File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......{..&?.ou?.ou?.ou6..u).ou.m.u<.ou.mlt;.ou.mkt5.out.kt>.ou.mjt..ou.mnt9.ou..kt5.ou..lt#.ou..kt..ou.mkt..out.nt".ou?.nu..ou.mft4.o
        Icon Hash:00928e8e8686b000
        Entrypoint:0x1402216d4
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x6767F654 [Sun Dec 22 11:21:56 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:81a5aacc6b649ed728c1e1e060fb724e
        Instruction
        dec eax
        sub esp, 28h
        call 00007F3B50CEA09Ch
        dec eax
        add esp, 28h
        jmp 00007F3B50CE994Fh
        int3
        int3
        dec eax
        sub esp, 28h
        dec ebp
        mov eax, dword ptr [ecx+38h]
        dec eax
        mov ecx, edx
        dec ecx
        mov edx, ecx
        call 00007F3B50CE9AE2h
        mov eax, 00000001h
        dec eax
        add esp, 28h
        ret
        int3
        int3
        int3
        inc eax
        push ebx
        inc ebp
        mov ebx, dword ptr [eax]
        dec eax
        mov ebx, edx
        inc ecx
        and ebx, FFFFFFF8h
        dec esp
        mov ecx, ecx
        inc ecx
        test byte ptr [eax], 00000004h
        dec esp
        mov edx, ecx
        je 00007F3B50CE9AE5h
        inc ecx
        mov eax, dword ptr [eax+08h]
        dec ebp
        arpl word ptr [eax+04h], dx
        neg eax
        dec esp
        add edx, ecx
        dec eax
        arpl ax, cx
        dec esp
        and edx, ecx
        dec ecx
        arpl bx, ax
        dec edx
        mov edx, dword ptr [eax+edx]
        dec eax
        mov eax, dword ptr [ebx+10h]
        mov ecx, dword ptr [eax+08h]
        dec eax
        mov eax, dword ptr [ebx+08h]
        test byte ptr [ecx+eax+03h], 0000000Fh
        je 00007F3B50CE9ADDh
        movzx eax, byte ptr [ecx+eax+03h]
        and eax, FFFFFFF0h
        dec esp
        add ecx, eax
        dec esp
        xor ecx, edx
        dec ecx
        mov ecx, ecx
        pop ebx
        jmp 00007F3B50CE9012h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        nop word ptr [eax+eax+00000000h]
        dec eax
        sub esp, 10h
        dec esp
        mov dword ptr [esp], edx
        dec esp
        mov dword ptr [esp+08h], ebx
        dec ebp
        xor ebx, ebx
        dec esp
        lea edx, dword ptr [esp+18h]
        dec esp
        sub edx, eax
        dec ebp
        cmovb edx, ebx
        Programming Language:
        • [IMP] VS2008 SP1 build 30729
        • [ C ] VS2015 UPD3.1 build 24215
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x2e406c0x230.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3130000x1e8.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2ff0000x13f98.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3140000x4fc4.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x2cc0d00x38.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x2cc1800x28.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cbf900x140.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x2240000xc70.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x2222be0x2224004a0ecc732ff07eec9023d701a92a8661unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x2240000xc340c0xc3600157bbb91539b3b684d0f8a0b4341bf2fFalse0.42552508197376837DIY-Thermocam raw data (Lepton 3.x), scale 17492-24402, spot sensor temperature 14868769830600704.000000, unit celsius, color scheme 0, calibration: offset 512.000000, slope 3365.9580085.873791639076957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x2e80000x16e100x132006f80549ecc114a58547ad98b33e01028False0.12713184232026145data4.377375037308804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x2ff0000x13f980x1400057b4da2d170468c55809845b9b0e6cc6False0.4786865234375data6.243509627314327IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x3130000x1e80x200d20157c545ee3f0bc1b28ad8d7c59581False0.5390625data4.759361181008377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x3140000x4fc40x50007b97df473a1b331f1311668d1eeea5dbFalse0.285498046875data5.438568965180607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0x3130600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
        DLLImport
        KERNEL32.dllGetCurrentThreadId, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CreateFileA, GetFileSizeEx, MapViewOfFile, UnmapViewOfFile, CreateFileMappingA, GetCurrentProcess, GetStdHandle, GetEnvironmentVariableW, WriteFile, HeapReAlloc, GetModuleHandleW, SetLastError, GetCurrentProcessId, SwitchToThread, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, GetModuleHandleExW, CloseHandle, DeleteFiber, GetSystemTimeAsFileTime, GetFileType, HeapFree, ConvertFiberToThread, LoadLibraryW, HeapAlloc, HeapDestroy, HeapCreate, GetLastError, FindFirstFileW, FindNextFileW, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, LocalFree, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, FileTimeToSystemTime, CreateFileW, GetModuleFileNameA, QueryPerformanceCounter, VerifyVersionInfoW, FreeLibrary, VerSetConditionMask, QueryPerformanceFrequency, SleepConditionVariableSRW, LoadLibraryA, InitializeSListHead, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlLookupFunctionEntry, RtlCaptureContext, GlobalUnlock, WideCharToMultiByte, GlobalLock, GlobalFree, GlobalAlloc, MultiByteToWideChar, SystemTimeToFileTime, GetProcAddress, GetLocalTime, FileTimeToLocalFileTime, GetModuleHandleA, GetFileAttributesW, FindClose, FindNextFileA, FindFirstFileA, GetFileAttributesExA, RtlVirtualUnwind, CompareFileTime
        USER32.dllGetProcessWindowStation, MessageBoxW, DispatchMessageA, TranslateMessage, GetUserObjectInformationW, GetDesktopWindow, SystemParametersInfoA, GetWindowRect, SetClipboardData, GetClipboardData, EmptyClipboard, CloseClipboard, OpenClipboard, GetCursorPos, PeekMessageA, PostQuitMessage, UpdateWindow, GetWindowLongW, AdjustWindowRectEx, GetKeyState, LoadCursorA, DestroyWindow, GetDC, SetWindowPos, MonitorFromWindow, ReleaseDC, SetCursorPos, IsIconic, SetForegroundWindow, ReleaseCapture, RegisterClassExA, UnregisterClassA, GetClientRect, SetWindowLongW, SetCursor, GetCapture, SetCapture, BringWindowToTop, SetFocus, SetLayeredWindowAttributes, CreateWindowExA, DefWindowProcA, GetForegroundWindow, GetMonitorInfoA, IsChild, ClientToScreen, EnumDisplayMonitors, ScreenToClient, SetWindowTextW, WindowFromPoint, ShowWindow, SetWindowLongA
        GDI32.dllGetDeviceCaps
        ole32.dllCoUninitialize, CoInitializeSecurity, CoInitializeEx, CoSetProxyBlanket, CoCreateInstance
        OLEAUT32.dllVariantClear, SysFreeString, SysAllocString
        CRYPT32.dllCertOpenStore, CertCloseStore, CertEnumCertificatesInStore, CertFindCertificateInStore, CertFreeCertificateContext, CertGetCertificateContextProperty, CertNameToStrA, CertDuplicateCertificateContext
        ADVAPI32.dllCryptGetProvParam, DeregisterEventSource, RegisterEventSourceW, CryptEnumProvidersW, CryptSignHashW, CryptDestroyHash, CryptCreateHash, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptSetHashParam, CryptDestroyKey, CryptReleaseContext, CryptAcquireContextW, ReportEventW
        WS2_32.dllWSASetLastError, send, recv, WSACleanup, WSAGetLastError, closesocket
        MSVCP140.dll?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?put@?$time_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@QEBA?AV?$ostreambuf_iterator@DU?$char_traits@D@std@@@2@V32@AEAVios_base@2@DPEBUtm@@PEBD3@Z, ?_Getcat@?$time_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Xbad_alloc@std@@YAXXZ, ?_Xout_of_range@std@@YAXPEBD@Z, ?id@?$time_get@DV?$istreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@2V0locale@2@A, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?_Getcat@?$time_get@DV?$istreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?uncaught_exceptions@std@@YAHXZ, ?get@?$time_get@DV?$istreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@QEBA?AV?$istreambuf_iterator@DU?$char_traits@D@std@@@2@V32@0AEAVios_base@2@AEAHPEAUtm@@PEBD4@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?fail@ios_base@std@@QEBA_NXZ, ?good@ios_base@std@@QEBA_NXZ, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ??Bid@locale@std@@QEAA_KXZ, ?id@?$time_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@2V0locale@2@A
        Secur32.dllLsaEnumerateLogonSessions, LsaGetLogonSessionData, LsaFreeReturnBuffer
        d3d9.dllDirect3DCreate9
        WINTRUST.dllWTHelperGetProvSignerFromChain, WTHelperProvDataFromStateData, WTHelperGetProvCertFromChain, CryptCATAdminCalcHashFromFileHandle, CryptCATAdminEnumCatalogFromHash, CryptCATAdminAcquireContext, CryptCATCatalogInfoFromContext, CryptCATAdminReleaseContext, CryptCATAdminReleaseCatalogContext, WinVerifyTrust
        IMM32.dllImmSetCompositionWindow, ImmGetContext, ImmReleaseContext
        bcrypt.dllBCryptGenRandom
        VCRUNTIME140_1.dll__CxxFrameHandler4
        VCRUNTIME140.dllstrstr, __std_exception_destroy, __intrinsic_setjmp, __current_exception_context, __current_exception, _CxxThrowException, wcsstr, memchr, memmove, longjmp, strrchr, memcmp, memcpy, memset, strchr, __C_specific_handler, __std_terminate, __std_exception_copy
        api-ms-win-crt-stdio-l1-1-0.dll_read, __stdio_common_vsprintf_s, __stdio_common_vswprintf, __stdio_common_vfprintf, fopen, _close, _filelength, __stdio_common_vsscanf, __stdio_common_vsprintf, _wfopen, feof, fgets, _fileno, fseek, __acrt_iob_func, _setmode, ftell, _sopen_s, _get_stream_buffer_pointers, __p__commode, _fseeki64, fread, fsetpos, ungetc, _set_fmode, setvbuf, fgetpos, fwrite, fputs, getc, fgetc, fclose, fflush, ferror, fputc, clearerr
        api-ms-win-crt-heap-l1-1-0.dllrealloc, _callnewh, free, calloc, _set_new_mode, malloc
        api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _stat64i32, _unlock_file
        api-ms-win-crt-runtime-l1-1-0.dll_set_app_type, terminate, _get_narrow_winmain_command_line, _initterm, _initterm_e, exit, _errno, _c_exit, _register_thread_local_exe_atexit_callback, _cexit, abort, _exit, _crt_atexit, raise, strerror_s, signal, _register_onexit_function, _invalid_parameter_noinfo_noreturn, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _wassert, _configure_narrow_argv
        api-ms-win-crt-string-l1-1-0.dllstrcspn, isdigit, _stricmp, strnlen, strspn, isprint, _strnicmp, isspace, _strdup, toupper, towupper, strcmp, strncmp, isxdigit, strncpy, tolower
        api-ms-win-crt-utility-l1-1-0.dllsrand, qsort, rand
        api-ms-win-crt-convert-l1-1-0.dllstrtol, _strtoi64, atoi, strtoul, strtoll, atof, strtod
        api-ms-win-crt-time-l1-1-0.dll_mkgmtime64, _gmtime64_s, _time64, _localtime64_s
        api-ms-win-crt-math-l1-1-0.dll_isnan, cosf, sqrtf, acosf, sinf, log2, pow, _dclass, ceilf, __setusermatherr
        api-ms-win-crt-locale-l1-1-0.dlllocaleconv, _configthreadlocale
        api-ms-win-crt-environment-l1-1-0.dllgetenv
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Jan 10, 2025 00:13:02.254961967 CET1.1.1.1192.168.2.90x1d4No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Jan 10, 2025 00:13:02.254961967 CET1.1.1.1192.168.2.90x1d4No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:18:13:05
        Start date:09/01/2025
        Path:C:\Users\user\Desktop\PrefetchParser.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\PrefetchParser.exe"
        Imagebase:0x7ff66a110000
        File size:3'219'968 bytes
        MD5 hash:620346B4E1B7A7B853EC4D94FA93C165
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3811911682.00007FF66A111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66A110000, based on PE: true
          • Associated: 00000000.00000002.3811876615.00007FF66A110000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812073603.00007FF66A334000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812156163.00007FF66A3F8000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40E000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812265891.00007FF66A40F000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff66a110000_PrefetchParser.jbxd
          Similarity
          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
          • String ID:
          • API String ID: 2933794660-0
          • Opcode ID: fa9562ace388c24688da1f1e68302f22e25596443b3e2cfb442502394d8196c0
          • Instruction ID: 0a1482c353f466d9a926d951471e6e4679b3f4e3548e583de3e1dd855462cb49
          • Opcode Fuzzy Hash: fa9562ace388c24688da1f1e68302f22e25596443b3e2cfb442502394d8196c0
          • Instruction Fuzzy Hash: 64112A26B18F41CAEB00CF60E8552B833B4FB59759F440E31EA6DDABA4DF78D5948380
          Memory Dump Source
          • Source File: 00000000.00000002.3811911682.00007FF66A111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66A110000, based on PE: true
          • Associated: 00000000.00000002.3811876615.00007FF66A110000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812073603.00007FF66A334000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812156163.00007FF66A3F8000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40E000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812265891.00007FF66A40F000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff66a110000_PrefetchParser.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 688934008bca337f2cf046f1b5168744610303798b8f76f10f08aadd82a6f392
          • Instruction ID: 2c0b848ca3f3f90347150676771394586647501c77bad9ea2c8d3c83527c7f95
          • Opcode Fuzzy Hash: 688934008bca337f2cf046f1b5168744610303798b8f76f10f08aadd82a6f392
          • Instruction Fuzzy Hash: ED324D730746404BD31F8F2EE99168AB291F748AA2749B238FE57C7B54F67CEE158600
          Memory Dump Source
          • Source File: 00000000.00000002.3811911682.00007FF66A111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66A110000, based on PE: true
          • Associated: 00000000.00000002.3811876615.00007FF66A110000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812073603.00007FF66A334000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812156163.00007FF66A3F8000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40E000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812265891.00007FF66A40F000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff66a110000_PrefetchParser.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0c3a75e43f80f679e8059bb7b0426c55d23584ca9a9d279de69844e08f1ac5bf
          • Instruction ID: 55f4a1d5d5e3bbb54069e7e18ac0e8eb8a2d1678bda59f06ba04e06d26ce4d81
          • Opcode Fuzzy Hash: 0c3a75e43f80f679e8059bb7b0426c55d23584ca9a9d279de69844e08f1ac5bf
          • Instruction Fuzzy Hash: 03F0E2327283E045CB95CA36A408F6D6DE193A1BC8F12C034E90CC3F48E92ECA018B00
          Memory Dump Source
          • Source File: 00000000.00000002.3811911682.00007FF66A111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66A110000, based on PE: true
          • Associated: 00000000.00000002.3811876615.00007FF66A110000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812073603.00007FF66A334000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812156163.00007FF66A3F8000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40A000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812196778.00007FF66A40E000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3812265891.00007FF66A40F000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff66a110000_PrefetchParser.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0db6f90cef6a0a85c9f04a674f5e4a54d989c79153cbe41d3e7fc0773c03faee
          • Instruction ID: 4b5b189e2d9cb736cabc4005bf8286be14945c76127cba4504d33b602ba24b8d
          • Opcode Fuzzy Hash: 0db6f90cef6a0a85c9f04a674f5e4a54d989c79153cbe41d3e7fc0773c03faee
          • Instruction Fuzzy Hash: FBE04F727183A445C796CA372508E69AAA4A325BD5F43C070D90DC3E45ED2FCA018B40