Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WC2SD38tcf.exe

Overview

General Information

Sample name:WC2SD38tcf.exe
renamed because original name is a hash value
Original sample name:46DD34531761BBC552766131C1AC05CA.exe
Analysis ID:1582088
MD5:46dd34531761bbc552766131c1ac05ca
SHA1:77de42cebb838e1c33baf9e05dffcc72b193ec8e
SHA256:bf142408e335b4fe9f03495b4eaf5629b30f8d9c7433c44b7532d42c67b4ad3f
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Yara signature match

Classification

  • System is w10x64
  • WC2SD38tcf.exe (PID: 7680 cmdline: "C:\Users\user\Desktop\WC2SD38tcf.exe" MD5: 46DD34531761BBC552766131C1AC05CA)
    • BitLockerToGo.exe (PID: 7948 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
      • WerFault.exe (PID: 7216 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1236 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • WerFault.exe (PID: 7364 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1260 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://185.216.71.4/feed7c30357659ed.php", "Botnet": "meetvoov"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1872729807.0000000001C1A000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.2.WC2SD38tcf.exe.1a78000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.WC2SD38tcf.exe.1a78000.1.unpackinfostealer_win_stealc_str_oct24Finds Stealc standalone samples (or dumps) based on the stringsSekoia.io
            • 0x327d8:$str01: -nop -c "iex(New-Object Net.WebClient).DownloadString(
            • 0x32930:$str02: Azure\.IdentityService
            • 0x32954:$str03: steam_tokens.txt
            • 0x325e8:$str04: "encrypted_key":"
            • 0x32710:$str05: prefs.js
            • 0x32788:$str06: browser: FileZilla
            • 0x3279c:$str07: profile: null
            • 0x327ac:$str08: url:
            • 0x327b4:$str09: login:
            • 0x327bc:$str10: password:
            0.2.WC2SD38tcf.exe.1902000.4.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.WC2SD38tcf.exe.1902000.4.unpackinfostealer_win_stealc_str_oct24Finds Stealc standalone samples (or dumps) based on the stringsSekoia.io
              • 0x327d8:$str01: -nop -c "iex(New-Object Net.WebClient).DownloadString(
              • 0x32930:$str02: Azure\.IdentityService
              • 0x32954:$str03: steam_tokens.txt
              • 0x325e8:$str04: "encrypted_key":"
              • 0x32710:$str05: prefs.js
              • 0x32788:$str06: browser: FileZilla
              • 0x3279c:$str07: profile: null
              • 0x327ac:$str08: url:
              • 0x327b4:$str09: login:
              • 0x327bc:$str10: password:
              0.2.WC2SD38tcf.exe.1ab4000.3.unpackJoeSecurity_StealcYara detected StealcJoe Security
                Click to see the 13 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://185.216.71.4/feed7c30357659ed.php", "Botnet": "meetvoov"}
                Source: WC2SD38tcf.exeReversingLabs: Detection: 55%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: WC2SD38tcf.exeJoe Sandbox ML: detected
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: INSERT_KEY_HERE
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 15
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 01
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 20
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 25
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetProcAddress
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: LoadLibraryA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: lstrcatA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: OpenEventA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateEventA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CloseHandle
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Sleep
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetUserDefaultLangID
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: VirtualAllocExNuma
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: VirtualFree
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetSystemInfo
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: VirtualAlloc
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HeapAlloc
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetComputerNameA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: lstrcpyA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetProcessHeap
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetCurrentProcess
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: lstrlenA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ExitProcess
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GlobalMemoryStatusEx
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetSystemTime
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SystemTimeToFileTime
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: advapi32.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: gdi32.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: user32.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: crypt32.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetUserNameA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateDCA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetDeviceCaps
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ReleaseDC
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CryptStringToBinaryA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sscanf
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: VMwareVMware
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HAL9TH
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: JohnDoe
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DISPLAY
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %hu/%hu/%hu
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: http://185.216.71.4
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: /feed7c30357659ed.php
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: /01210a7d1761b27e/
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: meetvoov
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetEnvironmentVariableA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetFileAttributesA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HeapFree
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetFileSize
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GlobalSize
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateToolhelp32Snapshot
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: IsWow64Process
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Process32Next
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetLocalTime
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: FreeLibrary
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetTimeZoneInformation
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetSystemPowerStatus
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetVolumeInformationA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetWindowsDirectoryA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Process32First
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetLocaleInfoA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetUserDefaultLocaleName
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetModuleFileNameA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DeleteFileA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: FindNextFileA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: LocalFree
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: FindClose
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SetEnvironmentVariableA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: LocalAlloc
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetFileSizeEx
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ReadFile
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SetFilePointer
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: WriteFile
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateFileA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: FindFirstFileA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CopyFileA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: VirtualProtect
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetLogicalProcessorInformationEx
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetLastError
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: lstrcpynA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: MultiByteToWideChar
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GlobalFree
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: WideCharToMultiByte
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GlobalAlloc
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: OpenProcess
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: TerminateProcess
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetCurrentProcessId
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: gdiplus.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ole32.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: bcrypt.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: wininet.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: shlwapi.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: shell32.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: rstrtmgr.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateCompatibleBitmap
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SelectObject
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BitBlt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DeleteObject
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateCompatibleDC
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdipGetImageEncodersSize
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdipGetImageEncoders
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdiplusStartup
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdiplusShutdown
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdipSaveImageToStream
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdipDisposeImage
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GdipFree
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetHGlobalFromStream
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CreateStreamOnHGlobal
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CoUninitialize
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CoInitialize
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CoCreateInstance
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BCryptGenerateSymmetricKey
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BCryptDecrypt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BCryptSetProperty
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BCryptDestroyKey
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetWindowRect
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetDesktopWindow
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetDC
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CloseWindow
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: wsprintfA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: EnumDisplayDevicesA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetKeyboardLayoutList
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CharToOemW
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: wsprintfW
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RegQueryValueExA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RegEnumKeyExA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RegOpenKeyExA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RegCloseKey
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RegEnumValueA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CryptBinaryToStringA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CryptUnprotectData
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SHGetFolderPathA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ShellExecuteExA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: InternetOpenUrlA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: InternetConnectA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: InternetCloseHandle
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HttpSendRequestA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HttpOpenRequestA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: InternetReadFile
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: InternetCrackUrlA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: StrCmpCA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: StrStrA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: StrCmpCW
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: PathMatchSpecA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: GetModuleFileNameExA
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RmStartSession
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RmRegisterResources
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RmGetList
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: RmEndSession
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_open
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_prepare_v2
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_step
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_column_text
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_finalize
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_close
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_column_bytes
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3_column_blob
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: encrypted_key
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: PATH
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: C:\ProgramData\nss3.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: NSS_Init
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: NSS_Shutdown
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: PK11_GetInternalKeySlot
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: PK11_FreeSlot
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: PK11_Authenticate
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: PK11SDR_Decrypt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: C:\ProgramData\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: browser:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: profile:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: url:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: login:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: password:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Opera
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: OperaGX
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Network
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: cookies
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: .txt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT HOST_KEY, is_httponly, path, is_secure, (expires_utc/1000000)-11644480800, name, encrypted_value from cookies
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: TRUE
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: FALSE
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: autofill
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: history
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: cc
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: name:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: month:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: year:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: card:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Cookies
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Login Data
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Web Data
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: History
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: logins.json
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: formSubmitURL
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: usernameField
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: encryptedUsername
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: encryptedPassword
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: guid
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: cookies.sqlite
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: formhistory.sqlite
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: places.sqlite
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: plugins
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Local Extension Settings
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Sync Extension Settings
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: IndexedDB
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Opera Stable
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Opera GX Stable
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: CURRENT
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: chrome-extension_
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: _0.indexeddb.leveldb
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Local State
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: profiles.ini
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: chrome
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: opera
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: firefox
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: wallets
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %08lX%04lX%lu
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ProductName
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: x32
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: x64
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %d/%d/%d %d:%d:%d
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DisplayName
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DisplayVersion
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Network Info:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - IP: IP?
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Country: ISO?
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: System Summary:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - HWID:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - OS:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Architecture:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - UserName:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Computer Name:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Local Time:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - UTC:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Language:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Keyboards:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Laptop:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Running Path:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - CPU:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Threads:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Cores:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - RAM:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - Display Resolution:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: - GPU:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: User Agents:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Installed Apps:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: All Users:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Current User:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Process List:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: system_info.txt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: freebl3.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: mozglue.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: msvcp140.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: nss3.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: softokn3.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: vcruntime140.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Temp\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: .exe
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: runas
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: open
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: /c start
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %DESKTOP%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %APPDATA%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %LOCALAPPDATA%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %USERPROFILE%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %DOCUMENTS%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %PROGRAMFILES_86%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: %RECENT%
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: *.lnk
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: files
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \discord\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Local Storage\leveldb\CURRENT
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Local Storage\leveldb
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Telegram Desktop\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: key_datas
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: D877F783D5D3EF8C*
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: map*
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: A7FDF864FBC10B77*
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: A92DAA6EA6F891F2*
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: F8806DD0C461824F*
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Telegram
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Tox
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: *.tox
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: *.ini
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Password
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 00000001
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 00000002
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 00000003
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: 00000004
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Outlook\accounts.txt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Pidgin
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \.purple\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: accounts.xml
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: dQw4w9WgXcQ
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: token:
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Software\Valve\Steam
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: SteamPath
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \config\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ssfn*
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: config.vdf
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DialogConfig.vdf
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: DialogConfigOverlay*.vdf
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: libraryfolders.vdf
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: loginusers.vdf
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Steam\
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: sqlite3.dll
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: done
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: soft
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: \Discord\tokens.txt
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: /c timeout /t 5 & del /f /q "
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: C:\Windows\system32\cmd.exe
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: https
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: POST
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: HTTP/1.1
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: Content-Disposition: form-data; name="
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: hwid
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: build
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: token
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: file_name
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: file
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: message
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpackString decryptor: screenshot.jpg
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00434B80 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,2_2_00434B80
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00436000 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlenA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,2_2_00436000
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00437690 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,2_2_00437690
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00454090 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,2_2_00454090
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00439BE0 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,2_2_00439BE0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00439B80 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,2_2_00439B80
                Source: WC2SD38tcf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: WC2SD38tcf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: BitLockerToGo.pdb source: WC2SD38tcf.exe, 00000000.00000002.1872729807.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: BitLockerToGo.pdbGCTL source: WC2SD38tcf.exe, 00000000.00000002.1872729807.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp

                Networking

                barindex
                Source: Malware configuration extractorURLs: http://185.216.71.4/feed7c30357659ed.php
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 185.216.71.4Connection: Keep-AliveCache-Control: no-cache
                Source: Joe Sandbox ViewASN Name: CLOUDCOMPUTINGDE CLOUDCOMPUTINGDE
                Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.4
                Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.4
                Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.4
                Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.4
                Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.4
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004356C0 lstrcpy,lstrlenA,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrlenA,lstrcpy,lstrcatA,lstrcpy,lstrcatA,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,GetProcessHeap,HeapAlloc,lstrlenA,memcpy,memcpy,lstrlenA,memcpy,lstrlenA,lstrlenA,memcpy,lstrlenA,HttpSendRequestA,InternetReadFile,lstrlenA,lstrcpy,lstrcatA,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_004356C0
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 185.216.71.4Connection: Keep-AliveCache-Control: no-cache
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.71.4
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.71.4/
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.71.4/7
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.71.4/Bw
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.71.4/w8w
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.71.4W6
                Source: WC2SD38tcf.exeString found in binary or memory: http://www.the-sz.com/F
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00439876 CreateDesktopA,memset,lstrcatA,lstrcatA,lstrcatA,SHGetFolderPathA,lstrcpy,StrStrA,lstrcpyn,lstrlenA,wsprintfA,lstrcpy,memset,CreateProcessA,Sleep,CloseDesktop,2_2_00439876

                System Summary

                barindex
                Source: 0.2.WC2SD38tcf.exe.1a78000.1.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1902000.4.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1a3c000.2.raw.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1a78000.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1902000.4.raw.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 0.2.WC2SD38tcf.exe.1a3c000.2.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 2.2.BitLockerToGo.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 00000000.00000002.1872729807.0000000001C1A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                Source: 00000000.00000002.1872729807.0000000001A3C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 00000000.00000002.1872729807.0000000001AB4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 00000000.00000002.1872729807.0000000001B68000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                Source: 00000000.00000002.1872729807.0000000001902000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Finds Stealc standalone samples (or dumps) based on the strings Author: Sekoia.io
                Source: 00000000.00000002.1872729807.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeCode function: 0_2_00EABD40 DuplicateHandle,GetCurrentThreadId,CreateWaitableTimerExW,CreateWaitableTimerExW,NtCreateWaitCompletionPacket,VirtualQuery,0_2_00EABD40
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00434980 appears 317 times
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1236
                Source: WC2SD38tcf.exe, 00000000.00000002.1870391240.00000000012B7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBennett.exe vs WC2SD38tcf.exe
                Source: WC2SD38tcf.exe, 00000000.00000002.1872729807.0000000001BE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs WC2SD38tcf.exe
                Source: WC2SD38tcf.exeBinary or memory string: OriginalFilenameBennett.exe vs WC2SD38tcf.exe
                Source: WC2SD38tcf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.WC2SD38tcf.exe.1a78000.1.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1902000.4.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1a3c000.2.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1a78000.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1902000.4.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 0.2.WC2SD38tcf.exe.1a3c000.2.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 2.2.BitLockerToGo.exe.430000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 00000000.00000002.1872729807.0000000001C1A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                Source: 00000000.00000002.1872729807.0000000001A3C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 00000000.00000002.1872729807.0000000001AB4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 00000000.00000002.1872729807.0000000001B68000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                Source: 00000000.00000002.1872729807.0000000001902000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: infostealer_win_stealc_str_oct24 author = Sekoia.io, description = Finds Stealc standalone samples (or dumps) based on the strings, creation_date = 2024-10-20, classification = TLP:CLEAR, version = 1.0, id = 7448fafe-206c-4f9c-b5a3-cbabec12a45b
                Source: 00000000.00000002.1872729807.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                Source: classification engineClassification label: mal100.troj.evad.winEXE@5/0@0/1
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004546C0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,2_2_004546C0
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\29caf5cd-7b8b-486d-9128-5cb264b5cb0dJump to behavior
                Source: WC2SD38tcf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: WC2SD38tcf.exeReversingLabs: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\WC2SD38tcf.exe "C:\Users\user\Desktop\WC2SD38tcf.exe"
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1236
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1260
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: WC2SD38tcf.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: WC2SD38tcf.exeStatic file information: File size 4450304 > 1048576
                Source: WC2SD38tcf.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1cce00
                Source: WC2SD38tcf.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x1d1800
                Source: WC2SD38tcf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: BitLockerToGo.pdb source: WC2SD38tcf.exe, 00000000.00000002.1872729807.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: BitLockerToGo.pdbGCTL source: WC2SD38tcf.exe, 00000000.00000002.1872729807.0000000001BE0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00456710 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00456710
                Source: WC2SD38tcf.exeStatic PE information: real checksum: 0x448c81 should be: 0x4456b4
                Source: WC2SD38tcf.exeStatic PE information: section name: .symtab
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00456710 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00456710
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_2-5435
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007D4000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: WC2SD38tcf.exe, 00000000.00000002.1870690676.000000000137C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllH
                Source: BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW!
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00434980 VirtualProtect 00000000,00000004,00000100,?2_2_00434980
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00456710 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00456710
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004563C0 mov eax, dword ptr fs:[00000030h]2_2_004563C0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00452A70 GetProcessHeap,HeapAlloc,GetComputerNameA,2_2_00452A70
                Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeMemory protected: page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: WC2SD38tcf.exe PID: 7680, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7948, type: MEMORYSTR
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 430000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 430000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004546C0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,Process32Next,CloseHandle,2_2_004546C0
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 210008Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 430000Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 431000Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 45B000Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 467000Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 67A000Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\WC2SD38tcf.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00453E10 lstrcpy,lstrcpy,GetSystemTime,2_2_00453E10
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004529E0 GetProcessHeap,HeapAlloc,GetUserNameA,2_2_004529E0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a78000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1902000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1ab4000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a3c000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a78000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1902000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a3c000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.BitLockerToGo.exe.430000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001A3C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001AB4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001902000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.000000000193E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WC2SD38tcf.exe PID: 7680, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7948, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a78000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1902000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1ab4000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1ab4000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a3c000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a78000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1902000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.WC2SD38tcf.exe.1a3c000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.BitLockerToGo.exe.430000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001A3C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001AB4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.0000000001902000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1872729807.000000000193E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: WC2SD38tcf.exe PID: 7680, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7948, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Native API
                1
                Create Account
                411
                Process Injection
                1
                Virtualization/Sandbox Evasion
                OS Credential Dumping11
                System Time Discovery
                Remote ServicesData from Local System1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                LSASS Memory21
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)411
                Process Injection
                Security Account Manager1
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Deobfuscate/Decode Files or Information
                NTDS12
                Process Discovery
                Distributed Component Object ModelInput Capture11
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                Account Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                System Owner/User Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync22
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                WC2SD38tcf.exe55%ReversingLabsWin32.Spyware.Stealc
                WC2SD38tcf.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://185.216.71.4/Bw0%Avira URL Cloudsafe
                http://www.the-sz.com/F0%Avira URL Cloudsafe
                http://185.216.71.40%Avira URL Cloudsafe
                http://185.216.71.4W60%Avira URL Cloudsafe
                http://185.216.71.4/feed7c30357659ed.php0%Avira URL Cloudsafe
                http://185.216.71.4/0%Avira URL Cloudsafe
                http://185.216.71.4/w8w0%Avira URL Cloudsafe
                http://185.216.71.4/70%Avira URL Cloudsafe
                No contacted domains info
                NameMaliciousAntivirus DetectionReputation
                http://185.216.71.4/true
                • Avira URL Cloud: safe
                unknown
                http://185.216.71.4/feed7c30357659ed.phptrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://185.216.71.4/BwBitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://185.216.71.4W6BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://185.216.71.4/w8wBitLockerToGo.exe, 00000002.00000002.2213338623.00000000007C1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://185.216.71.4/7BitLockerToGo.exe, 00000002.00000002.2213338623.00000000007C1000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.the-sz.com/FWC2SD38tcf.exefalse
                • Avira URL Cloud: safe
                unknown
                http://185.216.71.4BitLockerToGo.exe, 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                185.216.71.4
                unknownGermany
                43659CLOUDCOMPUTINGDEtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1582088
                Start date and time:2024-12-29 23:56:05 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 18s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:WC2SD38tcf.exe
                renamed because original name is a hash value
                Original Sample Name:46DD34531761BBC552766131C1AC05CA.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@5/0@0/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 91%
                • Number of executed functions: 17
                • Number of non-executed functions: 45
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target WC2SD38tcf.exe, PID 7680 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: WC2SD38tcf.exe
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                185.216.71.41111110789_stripped.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  Scanned_V11230111111PDF-clean.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    CLOUDCOMPUTINGDEhidakibest.arm6.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.ppc.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.x86.elfGet hashmaliciousMirai, GafgytBrowse
                    • 185.216.71.152
                    hidakibest.arm5.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.arm4.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.mpsl.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.arm7.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    hidakibest.sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
                    • 185.216.71.152
                    https://www.google.gr/url?url=https://pniuvlpkjqhdwff&exox=rvhqtix&eaydny=ysf&gzfds=lqrwiz&nci=qtwmzch&iccvb=yhwtsp&vtqs=avtajyu&oagvzgp=irlq&mvdoc=embwrj&yylmwei=tmn&mntt=qqcvuhkd&lkydbjfiod=izjcgyubqc&q=amp/anre6g6.j%c2%adh%c2%adhn%c2%adt%c2%addd%c2%adsm%c2%ado%c2%admcw%c2%adw%c2%adgu%c2%adno.com%e2%80%8b/99twfh3p8&gcyx=ncgobia&yfevoul=wtloixvv&hukl=qfkmtky&nlhwnbr=bwkoiopy&eqfw=bmcpntp&vlvegw=zdbpajeyq&ghrv=kcdfwrl&kyddme=myxsnvtxf&asco=mgumegd&dvvibf=hzfexefeg&osme=bdyguyp&njtjvd=bkelfwmxg&bxrb=ltpyjsv&girpat=lswjchrwc&qapj=wwwowde&vahefc=ghseyzgyf&ahaj=zfqmkuo&pfsfeu=ttucmtamu&sffs=oxaajjo&hbwhgy=mgfzglmmo&bdwl=oifsufx&befsmv=jskhtmnps&sfjy=powmsnr&zixjqp=jyttdwbmu&fzkp=hztiqjm&jmzuvc=ufyoeqgfi&zujr=jxtbdtg&plvxoh=fxumxxddw&nkin=ykbzrdh&lghzli=agvbttfta&suag=ioudcjc&zpptpx=dxacgdnox&hmfz=yueoymp&fnshpz=wgayslegy&gjtg=qcjjozv&rymask=thcxzfpca&zcgn=ywtonnx&kqrpog=kgfvcqswk&imwa=wlvocxf&ggqznt=budaflbgp&zjhr=zscgach&esrhmq=qjdngljnl&ppoz=nhwzlik&zejsqg=vnvpaymyl&dnqb=kjswpyt&kunwbg=pzauoqliz&bqlz=qabnsnu&dlfnsr=dakxdfzen&uffg=uwnswdr&ywjevz=bnvkfavcb&rrob=celdmvn&czdusr=sjfjazfqw&ipgr=exylggn&fltcvh=sdfsricvf&byfs=apntxot&javhwh=nyphchiee&owbh=haflpez&mbyvqw=pdzpxeedx&ejov=taakkyw&oylsfz=qnzuplrnz&hxrq=ovegslq&duqjcc=pjwdpyvec&uoec=pjouxrb&eiezwk=okbkttiao&knji=kcmfaqe&qmathj=vymnqrvxa&gajs=riewukz&czxhiu=uysriqpma&avwe=gssbenk&jnwgpb=iqkroelwx&sjyt=zhxfzpx&liqoqs=bbajxgpxm&dqqu=ztzooam&haagcu=gkijlwgjy&mnsq=uervedi&yckhpb=ngqrbrqpc&pkne=nwisdfz&eqsiqu=mlrhvpuavGet hashmaliciousUnknownBrowse
                    • 85.31.47.165
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.15155936331238
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.53%
                    • InstallShield setup (43055/19) 0.43%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:WC2SD38tcf.exe
                    File size:4'450'304 bytes
                    MD5:46dd34531761bbc552766131c1ac05ca
                    SHA1:77de42cebb838e1c33baf9e05dffcc72b193ec8e
                    SHA256:bf142408e335b4fe9f03495b4eaf5629b30f8d9c7433c44b7532d42c67b4ad3f
                    SHA512:73f55f275b3d5220ccecb14fb2466a816ad14abfc863764b81be425b366f0681f693339fd15613761a997be1e6d78e2d72cea3282bb50dca54472ae5aac68f17
                    SSDEEP:49152:ImwTL1n769zo6wqdvplsq9oLc9sf/sygrCqEVjOCszxGsbcKPkQxnK:gLJ96BOc9B4KcK8cn
                    TLSH:02260501FE8788F5D80318306156623B9B315E058B35CBF7FAAC7A1AFB776954C3A609
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........<.........................0.........:...@...........................F.......D...@................................
                    Icon Hash:137165f1f1653317
                    Entrypoint:0x461830
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:1
                    File Version Major:6
                    File Version Minor:1
                    Subsystem Version Major:6
                    Subsystem Version Minor:1
                    Import Hash:1aae8bf580c846f39c71c05898e57e88
                    Instruction
                    jmp 00007F22810C0720h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    sub esp, 28h
                    mov dword ptr [esp+1Ch], ebx
                    mov dword ptr [esp+10h], ebp
                    mov dword ptr [esp+14h], esi
                    mov dword ptr [esp+18h], edi
                    mov dword ptr [esp], eax
                    mov dword ptr [esp+04h], ecx
                    call 00007F22810A1586h
                    mov eax, dword ptr [esp+08h]
                    mov edi, dword ptr [esp+18h]
                    mov esi, dword ptr [esp+14h]
                    mov ebp, dword ptr [esp+10h]
                    mov ebx, dword ptr [esp+1Ch]
                    add esp, 28h
                    retn 0004h
                    ret
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    sub esp, 08h
                    mov ecx, dword ptr [esp+0Ch]
                    mov edx, dword ptr [ecx]
                    mov eax, esp
                    mov dword ptr [edx+04h], eax
                    sub eax, 00010000h
                    mov dword ptr [edx], eax
                    add eax, 000013A0h
                    mov dword ptr [edx+08h], eax
                    mov dword ptr [edx+0Ch], eax
                    lea edi, dword ptr [ecx+34h]
                    mov dword ptr [edx+18h], ecx
                    mov dword ptr [edi], edx
                    mov dword ptr [esp+04h], edi
                    call 00007F22810C2B84h
                    cld
                    call 00007F22810C1C0Eh
                    call 00007F22810C0849h
                    add esp, 08h
                    ret
                    jmp 00007F22810C2A30h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    mov ebx, dword ptr [esp+04h]
                    mov ebp, esp
                    mov dword ptr fs:[00000034h], 00000000h
                    mov ecx, dword ptr [ebx+04h]
                    cmp ecx, 00000000h
                    je 00007F22810C2A31h
                    mov eax, ecx
                    shl eax, 02h
                    sub esp, eax
                    mov edi, esp
                    mov esi, dword ptr [ebx+08h]
                    cld
                    rep movsd
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3dc0000x44c.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f30000x757d9.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x3dd0000x14e80.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x3a02e00xb4.data
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x1ccd480x1cce0070d6e4f0f5b43f3f5783162fe9f3cb5dFalse0.41040416497152155data6.046111209055693IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x1ce0000x1d17b40x1d1800b533bb4a6a6e73cfd778472f950c3d8cFalse0.47142846653464016data5.889921259296244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x3a00000x3b9000x14e00008d7d90a67864bb69f788ad0dc86ae4False0.4681184505988024data5.00042104052368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata0x3dc0000x44c0x6003daed61b4b512802c93b62b45519e6edFalse0.3600260416666667OpenPGP Public Key3.874332394538109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .reloc0x3dd0000x14e800x150004f23ac86a6e033945d7e3d0a5e4e5c42False0.5859258742559523data6.592882314258954IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .symtab0x3f20000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    .rsrc0x3f30000x757d90x75800d02f54899ee6c64c28d357b12c6a75eeFalse0.2248005319148936data4.159665070364544IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x3f45a00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152GermanGermany0.2524390243902439
                    RT_ICON0x3f4c080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512GermanGermany0.3817204301075269
                    RT_ICON0x3f4ef00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288GermanGermany0.45081967213114754
                    RT_ICON0x3f50d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128GermanGermany0.543918918918919
                    RT_ICON0x3f52000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsGermanGermany0.34461620469083154
                    RT_ICON0x3f60a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.421028880866426
                    RT_ICON0x3f69500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.41013824884792627
                    RT_ICON0x3f70180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.3540462427745665
                    RT_ICON0x3f75800x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336GermanGermany0.05982409681332663
                    RT_ICON0x4395a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600GermanGermany0.21991701244813278
                    RT_ICON0x43bb500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.2903377110694184
                    RT_ICON0x43cbf80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.3717213114754098
                    RT_ICON0x43d5800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.5115248226950354
                    RT_ICON0x43d9e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.4515895953757225
                    RT_ICON0x43df500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.586405529953917
                    RT_ICON0x43e6180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.6353790613718412
                    RT_ICON0x43eec00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.5186170212765957
                    RT_ICON0x43f3280x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.43073770491803276
                    RT_ICON0x43fcb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.3731238273921201
                    RT_ICON0x440d580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.6976534296028881
                    RT_ICON0x4416000x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.5086405529953917
                    RT_ICON0x441cc80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.3157514450867052
                    RT_ICON0x4422300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.6822232645403377
                    RT_ICON0x4432d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.7413934426229508
                    RT_ICON0x443c600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.7960992907801419
                    RT_ICON0x4440c80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.7021660649819494
                    RT_ICON0x4449700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.511520737327189
                    RT_ICON0x4450380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.3179190751445087
                    RT_ICON0x4455a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.6812851782363978
                    RT_ICON0x4466480x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.7401639344262295
                    RT_ICON0x446fd00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.7943262411347518
                    RT_ICON0x4474380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.7098375451263538
                    RT_ICON0x447ce00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.7016129032258065
                    RT_ICON0x4483a80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.4848265895953757
                    RT_ICON0x4489100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.5180581613508443
                    RT_ICON0x4499b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.635655737704918
                    RT_ICON0x44a3400x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.6719858156028369
                    RT_ICON0x44a7a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.6570397111913358
                    RT_ICON0x44b0500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.7137096774193549
                    RT_ICON0x44b7180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.45447976878612717
                    RT_ICON0x44bc800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.4549718574108818
                    RT_ICON0x44cd280x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.5918032786885246
                    RT_ICON0x44d6b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.5390070921985816
                    RT_ICON0x44db180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192GermanGermany0.36824324324324326
                    RT_ICON0x44dc400x128Device independent bitmap graphic, 16 x 32 x 4, image size 192GermanGermany0.375
                    RT_ICON0x44dd680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.3722924187725632
                    RT_ICON0x44e6100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.3511560693641618
                    RT_ICON0x44eb780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.46669793621013134
                    RT_ICON0x44fc200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.6675531914893617
                    RT_ICON0x4500880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.2378158844765343
                    RT_ICON0x4509300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.2413594470046083
                    RT_ICON0x450ff80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.21242774566473988
                    RT_ICON0x4515600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.5098499061913696
                    RT_ICON0x4526080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.5774590163934427
                    RT_ICON0x452f900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.6781914893617021
                    RT_ICON0x4533f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.7739169675090253
                    RT_ICON0x453ca00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.815668202764977
                    RT_ICON0x4543680x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.6625722543352601
                    RT_ICON0x4548d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.6402439024390244
                    RT_ICON0x4559780x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.7487704918032787
                    RT_ICON0x4563000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.7872340425531915
                    RT_ICON0x4567680x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288GermanGermany0.45081967213114754
                    RT_ICON0x4569500x128Device independent bitmap graphic, 16 x 32 x 4, image size 128GermanGermany0.543918918918919
                    RT_ICON0x456a780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.3425090252707581
                    RT_ICON0x4573200x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.41013824884792627
                    RT_ICON0x4579e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.3540462427745665
                    RT_ICON0x457f500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.2903377110694184
                    RT_ICON0x458ff80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.3717213114754098
                    RT_ICON0x4599800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.5115248226950354
                    RT_ICON0x459de80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.5573104693140795
                    RT_ICON0x45a6900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.5455069124423964
                    RT_ICON0x45ad580x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.3699421965317919
                    RT_ICON0x45b2c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.40619136960600377
                    RT_ICON0x45c3680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.5790983606557377
                    RT_ICON0x45ccf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.5815602836879432
                    RT_ICON0x45d1580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mGermanGermany0.4166666666666667
                    RT_ICON0x45d5c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mGermanGermany0.3076923076923077
                    RT_ICON0x45e6680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mGermanGermany0.3528368794326241
                    RT_ICON0x45ead00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mGermanGermany0.225140712945591
                    RT_ICON0x45fb780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mGermanGermany0.37943262411347517
                    RT_ICON0x45ffe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mGermanGermany0.19840525328330205
                    RT_ICON0x4610880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.2527075812274368
                    RT_ICON0x4619300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.326036866359447
                    RT_ICON0x461ff80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.2514450867052023
                    RT_ICON0x4625600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.19817073170731708
                    RT_ICON0x4636080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.3889344262295082
                    RT_ICON0x463f900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.37145390070921985
                    RT_ICON0x4643f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsGermanGermany0.6209386281588448
                    RT_ICON0x464ca00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsGermanGermany0.6566820276497696
                    RT_ICON0x4653680x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsGermanGermany0.4429190751445087
                    RT_ICON0x4658d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224GermanGermany0.4821763602251407
                    RT_ICON0x4669780x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400GermanGermany0.5836065573770491
                    RT_ICON0x4673000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088GermanGermany0.6799645390070922
                    RT_GROUP_ICON0x4677680xbcdataGermanGermany0.5904255319148937
                    RT_GROUP_ICON0x4678240x5adataGermanGermany0.7444444444444445
                    RT_GROUP_ICON0x4678800x5adataGermanGermany0.7555555555555555
                    RT_GROUP_ICON0x4678dc0x5adataGermanGermany0.7444444444444445
                    RT_GROUP_ICON0x4679380x5adataGermanGermany0.7555555555555555
                    RT_GROUP_ICON0x4679940x5adataGermanGermany0.7666666666666667
                    RT_GROUP_ICON0x4679f00x14dataGermanGermany1.25
                    RT_GROUP_ICON0x467a040x14dataGermanGermany1.25
                    RT_GROUP_ICON0x467a180x3edataGermanGermany0.8387096774193549
                    RT_GROUP_ICON0x467a580x5adataGermanGermany0.7666666666666667
                    RT_GROUP_ICON0x467ab40x5adataGermanGermany0.7666666666666667
                    RT_GROUP_ICON0x467b100x76dataGermanGermany0.7203389830508474
                    RT_GROUP_ICON0x467b880x5adataGermanGermany0.7666666666666667
                    RT_GROUP_ICON0x467be40x22dataGermanGermany1.0294117647058822
                    RT_GROUP_ICON0x467c080x22dataGermanGermany1.0294117647058822
                    RT_GROUP_ICON0x467c2c0x22dataGermanGermany1.0294117647058822
                    RT_GROUP_ICON0x467c500x5adataGermanGermany0.7666666666666667
                    RT_GROUP_ICON0x467cac0x5adataGermanGermany0.7666666666666667
                    RT_VERSION0x467d080x3d0dataGermanGermany0.4456967213114754
                    RT_MANIFEST0x4680d80x701XML 1.0 document, ASCII text, with CRLF line terminatorsGermanGermany0.403792526491913
                    DLLImport
                    kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                    Language of compilation systemCountry where language is spokenMap
                    GermanGermany
                    TimestampSource PortDest PortSource IPDest IP
                    Dec 29, 2024 23:57:17.931885004 CET4973680192.168.2.4185.216.71.4
                    Dec 29, 2024 23:57:17.936727047 CET8049736185.216.71.4192.168.2.4
                    Dec 29, 2024 23:57:17.936805010 CET4973680192.168.2.4185.216.71.4
                    Dec 29, 2024 23:57:17.937006950 CET4973680192.168.2.4185.216.71.4
                    Dec 29, 2024 23:57:17.941797018 CET8049736185.216.71.4192.168.2.4
                    Dec 29, 2024 23:57:39.303431034 CET8049736185.216.71.4192.168.2.4
                    Dec 29, 2024 23:57:39.303508043 CET4973680192.168.2.4185.216.71.4
                    Dec 29, 2024 23:57:39.303812027 CET4973680192.168.2.4185.216.71.4
                    Dec 29, 2024 23:57:39.308614016 CET8049736185.216.71.4192.168.2.4
                    • 185.216.71.4
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449736185.216.71.4807948C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    TimestampBytes transferredDirectionData
                    Dec 29, 2024 23:57:17.937006950 CET87OUTGET / HTTP/1.1
                    Host: 185.216.71.4
                    Connection: Keep-Alive
                    Cache-Control: no-cache


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:17:56:55
                    Start date:29/12/2024
                    Path:C:\Users\user\Desktop\WC2SD38tcf.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\WC2SD38tcf.exe"
                    Imagebase:0xe80000
                    File size:4'450'304 bytes
                    MD5 hash:46DD34531761BBC552766131C1AC05CA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1872729807.0000000001C1A000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1872729807.0000000001A3C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: infostealer_win_stealc_str_oct24, Description: Finds Stealc standalone samples (or dumps) based on the strings, Source: 00000000.00000002.1872729807.0000000001A3C000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: infostealer_win_stealc_str_oct24, Description: Finds Stealc standalone samples (or dumps) based on the strings, Source: 00000000.00000002.1872729807.0000000001A78000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1872729807.0000000001AB4000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: infostealer_win_stealc_str_oct24, Description: Finds Stealc standalone samples (or dumps) based on the strings, Source: 00000000.00000002.1872729807.0000000001AB4000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                    • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1872729807.0000000001B68000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1872729807.0000000001902000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: infostealer_win_stealc_str_oct24, Description: Finds Stealc standalone samples (or dumps) based on the strings, Source: 00000000.00000002.1872729807.0000000001902000.00000004.00001000.00020000.00000000.sdmp, Author: Sekoia.io
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1872729807.000000000193E000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1872729807.0000000001AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:17:57:15
                    Start date:29/12/2024
                    Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                    Imagebase:0x9a0000
                    File size:231'736 bytes
                    MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.2213338623.0000000000777000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:moderate
                    Has exited:true

                    Target ID:7
                    Start time:17:57:50
                    Start date:29/12/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1236
                    Imagebase:0x580000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:9
                    Start time:17:57:50
                    Start date:29/12/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7948 -s 1260
                    Imagebase:0x580000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.1869627660.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                      • Associated: 00000000.00000002.1869606143.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1869808984.000000000104E000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1869808984.0000000001132000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1869808984.0000000001136000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1869808984.000000000114F000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1869808984.0000000001154000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1869808984.0000000001158000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870111989.0000000001220000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870136214.0000000001221000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870156729.0000000001222000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870179048.0000000001223000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870237151.000000000122C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870237151.000000000123C000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870237151.0000000001240000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870237151.0000000001254000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870351978.000000000125C000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870391240.000000000125D000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870391240.0000000001273000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870391240.0000000001279000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1870391240.00000000012B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e80000_WC2SD38tcf.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 42ffa1f1293cc410ea7c120c3c1e42eaca32f1f1c7c3ba42b2e5291a6983ea09
                      • Instruction ID: 3d4b7fad7a1745a0afb6211e0fd48a1099b605ea415bd25fb1ac440ae5b03344
                      • Opcode Fuzzy Hash: 42ffa1f1293cc410ea7c120c3c1e42eaca32f1f1c7c3ba42b2e5291a6983ea09
                      • Instruction Fuzzy Hash: EE51F4B45083418FC314DF24E09875ABBF0BB89718F10996CE4989B3A2D776E945CF42

                      Execution Graph

                      Execution Coverage:19.1%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:26.4%
                      Total number of Nodes:1349
                      Total number of Limit Nodes:40
                      execution_graph 5273 434b80 5274 434ba0 5273->5274 5275 434bb5 5274->5275 5276 434bad lstrcpy 5274->5276 5427 434ae0 5275->5427 5276->5275 5278 434bc0 5279 434bfc lstrcpy 5278->5279 5280 434c08 5278->5280 5279->5280 5281 434c2f lstrcpy 5280->5281 5282 434c3b 5280->5282 5281->5282 5283 434c5f lstrcpy 5282->5283 5284 434c6b 5282->5284 5283->5284 5285 434c9d lstrcpy 5284->5285 5286 434ca9 5284->5286 5285->5286 5287 434cd0 lstrcpy 5286->5287 5288 434cdc InternetOpenA StrCmpCA 5286->5288 5287->5288 5289 434d10 5288->5289 5290 4353e8 InternetCloseHandle CryptStringToBinaryA 5289->5290 5291 434d1f 5289->5291 5292 435418 LocalAlloc 5290->5292 5308 435508 5290->5308 5431 453e10 5291->5431 5294 43542f CryptStringToBinaryA 5292->5294 5292->5308 5295 435447 LocalFree 5294->5295 5296 435459 lstrlenA 5294->5296 5295->5308 5297 43546d 5296->5297 5299 435493 lstrlenA 5297->5299 5300 435487 lstrcpy 5297->5300 5298 434d2a 5301 434d53 lstrcpy lstrcatA 5298->5301 5303 434d68 5298->5303 5302 4354ad 5299->5302 5300->5299 5301->5303 5306 4354bf lstrcpy lstrcatA 5302->5306 5310 4354d2 5302->5310 5304 434d8a lstrcpy 5303->5304 5305 434d92 5303->5305 5304->5305 5307 434da1 lstrlenA 5305->5307 5306->5310 5311 434db9 5307->5311 5309 435501 5309->5308 5310->5309 5312 4354f9 lstrcpy 5310->5312 5313 434dc5 lstrcpy lstrcatA 5311->5313 5314 434ddc 5311->5314 5312->5309 5313->5314 5315 434e05 5314->5315 5316 434dfd lstrcpy 5314->5316 5317 434e0c lstrlenA 5315->5317 5316->5315 5318 434e22 5317->5318 5319 434e2e lstrcpy lstrcatA 5318->5319 5320 434e45 5318->5320 5319->5320 5321 434e66 lstrcpy 5320->5321 5322 434e6e 5320->5322 5321->5322 5323 434e95 lstrcpy lstrcatA 5322->5323 5324 434eab 5322->5324 5323->5324 5325 434ed4 5324->5325 5326 434ecc lstrcpy 5324->5326 5327 434edb lstrlenA 5325->5327 5326->5325 5328 434ef1 5327->5328 5329 434efd lstrcpy lstrcatA 5328->5329 5330 434f14 5328->5330 5329->5330 5331 434f3d 5330->5331 5332 434f35 lstrcpy 5330->5332 5333 434f44 lstrlenA 5331->5333 5332->5331 5334 434f5a 5333->5334 5335 434f66 lstrcpy lstrcatA 5334->5335 5336 434f7d 5334->5336 5335->5336 5337 434fa9 5336->5337 5338 434fa1 lstrcpy 5336->5338 5339 434fb0 lstrlenA 5337->5339 5338->5337 5340 434fcb 5339->5340 5341 434fdc lstrcpy lstrcatA 5340->5341 5342 434fec 5340->5342 5341->5342 5343 43500a lstrcpy lstrcatA 5342->5343 5344 43501d 5342->5344 5343->5344 5345 43503b lstrcpy 5344->5345 5346 435043 5344->5346 5345->5346 5347 435051 InternetConnectA 5346->5347 5347->5290 5348 435080 HttpOpenRequestA 5347->5348 5349 4353e1 InternetCloseHandle 5348->5349 5350 4350bb 5348->5350 5349->5290 5438 457340 lstrlenA 5350->5438 5354 4350d4 5446 4572f0 5354->5446 5357 4572b0 lstrcpy 5358 4350f0 5357->5358 5359 457340 3 API calls 5358->5359 5360 435105 5359->5360 5361 4572b0 lstrcpy 5360->5361 5362 43510e 5361->5362 5363 457340 3 API calls 5362->5363 5364 435124 5363->5364 5365 4572b0 lstrcpy 5364->5365 5366 43512d 5365->5366 5367 457340 3 API calls 5366->5367 5368 435143 5367->5368 5369 4572b0 lstrcpy 5368->5369 5370 43514c 5369->5370 5371 457340 3 API calls 5370->5371 5372 435161 5371->5372 5373 4572b0 lstrcpy 5372->5373 5374 43516a 5373->5374 5375 4572f0 2 API calls 5374->5375 5376 43517d 5375->5376 5377 4572b0 lstrcpy 5376->5377 5378 435186 5377->5378 5379 457340 3 API calls 5378->5379 5380 43519b 5379->5380 5381 4572b0 lstrcpy 5380->5381 5382 4351a4 5381->5382 5383 457340 3 API calls 5382->5383 5384 4351b9 5383->5384 5385 4572b0 lstrcpy 5384->5385 5386 4351c2 5385->5386 5387 4572f0 2 API calls 5386->5387 5388 4351d5 5387->5388 5389 4572b0 lstrcpy 5388->5389 5390 4351de 5389->5390 5391 457340 3 API calls 5390->5391 5392 4351f3 5391->5392 5393 4572b0 lstrcpy 5392->5393 5394 4351fc 5393->5394 5395 457340 3 API calls 5394->5395 5396 435212 5395->5396 5397 4572b0 lstrcpy 5396->5397 5398 43521b 5397->5398 5399 457340 3 API calls 5398->5399 5400 435231 5399->5400 5401 4572b0 lstrcpy 5400->5401 5402 43523a 5401->5402 5403 457340 3 API calls 5402->5403 5404 43524f 5403->5404 5405 4572b0 lstrcpy 5404->5405 5406 435258 5405->5406 5407 4572f0 2 API calls 5406->5407 5408 43526b 5407->5408 5409 4572b0 lstrcpy 5408->5409 5410 435274 5409->5410 5411 4352a0 lstrcpy 5410->5411 5412 4352ac 5410->5412 5411->5412 5413 4572f0 2 API calls 5412->5413 5414 4352ba 5413->5414 5415 4572f0 2 API calls 5414->5415 5416 4352c7 5415->5416 5417 4572b0 lstrcpy 5416->5417 5418 4352d1 5417->5418 5419 4352e1 lstrlenA lstrlenA HttpSendRequestA InternetReadFile 5418->5419 5420 4353cc InternetCloseHandle 5419->5420 5424 435322 5419->5424 5421 4353de 5420->5421 5421->5349 5422 43532d lstrlenA 5422->5424 5423 43535e lstrcpy lstrcatA 5423->5424 5424->5420 5424->5422 5424->5423 5425 43539b lstrcpy 5424->5425 5426 4353aa InternetReadFile 5424->5426 5425->5424 5426->5420 5426->5424 5428 434af0 5427->5428 5428->5428 5429 434af7 ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI lstrlenA InternetCrackUrlA 5428->5429 5430 434b61 5429->5430 5430->5278 5432 453e23 5431->5432 5433 453e3f lstrcpy 5432->5433 5434 453e4b 5432->5434 5433->5434 5435 453e75 GetSystemTime 5434->5435 5436 453e6d lstrcpy 5434->5436 5437 453e93 5435->5437 5436->5435 5437->5298 5439 45735d 5438->5439 5440 4350cb 5439->5440 5441 45736d lstrcpy lstrcatA 5439->5441 5442 4572b0 5440->5442 5441->5440 5444 4572bc 5442->5444 5443 4572e4 5443->5354 5444->5443 5445 4572dc lstrcpy 5444->5445 5445->5443 5447 45730c 5446->5447 5448 4350e7 5447->5448 5449 45731d lstrcpy lstrcatA 5447->5449 5448->5357 5449->5448 6087 44f300 lstrlenA 6088 44f33e 6087->6088 6089 44f346 lstrcpy 6088->6089 6090 44f352 lstrlenA 6088->6090 6089->6090 6091 44f363 6090->6091 6092 44f377 lstrlenA 6091->6092 6093 44f36b lstrcpy 6091->6093 6094 44f388 6092->6094 6093->6092 6095 44f390 lstrcpy 6094->6095 6096 44f39c 6094->6096 6095->6096 6097 44f3b8 lstrcpy 6096->6097 6098 44f3c4 6096->6098 6097->6098 6099 44f3e6 lstrcpy 6098->6099 6100 44f3f2 6098->6100 6099->6100 6101 44f41c lstrcpy 6100->6101 6102 44f428 6100->6102 6101->6102 6103 44f44e lstrcpy 6102->6103 6163 44f460 6102->6163 6103->6163 6104 44f46c lstrlenA 6104->6163 6105 44f626 lstrcpy 6105->6163 6106 44f504 lstrcpy 6106->6163 6107 44f529 lstrcpy 6107->6163 6108 431410 8 API calls 6108->6163 6109 44f656 lstrcpy 6169 44f65e 6109->6169 6110 44f5e0 lstrcpy 6110->6163 6111 44f70d lstrcpy 6111->6169 6112 44f788 StrCmpCA 6113 44f88a StrCmpCA 6112->6113 6112->6169 6117 450061 6113->6117 6113->6163 6114 44fbcb StrCmpCA 6123 44fff8 6114->6123 6114->6163 6115 44f8ba lstrlenA 6115->6163 6116 44ff0b StrCmpCA 6121 44ff1f Sleep 6116->6121 6129 44ff35 6116->6129 6118 450083 lstrlenA 6117->6118 6122 45007b lstrcpy 6117->6122 6131 45009f 6118->6131 6119 44f7be lstrcpy 6119->6169 6120 44fbfb lstrlenA 6120->6163 6121->6163 6122->6118 6124 45001a lstrlenA 6123->6124 6125 450012 lstrcpy 6123->6125 6130 450036 6124->6130 6125->6124 6126 44fa26 lstrcpy 6126->6163 6127 44f8ed lstrcpy 6127->6163 6128 44ff57 lstrlenA 6138 44ff73 6128->6138 6129->6128 6134 44ff4f lstrcpy 6129->6134 6137 44ff94 lstrlenA 6130->6137 6140 45004f lstrcpy 6130->6140 6132 4500c0 lstrlenA 6131->6132 6133 4500b8 lstrcpy 6131->6133 6143 4500dc 6132->6143 6133->6132 6134->6128 6135 44fd66 lstrcpy 6135->6163 6136 44fc2e lstrcpy 6136->6163 6153 44ffb0 6137->6153 6138->6137 6150 44ff8c lstrcpy 6138->6150 6139 44f910 lstrcpy 6139->6163 6140->6137 6142 44fa56 lstrcpy 6142->6169 6144 4500fd 6143->6144 6145 4500f5 lstrcpy 6143->6145 6146 431510 4 API calls 6144->6146 6145->6144 6171 44ffdd 6146->6171 6147 44f812 lstrcpy 6147->6169 6148 44efe0 28 API calls 6148->6163 6149 44fc51 lstrcpy 6149->6163 6150->6137 6151 44fd96 lstrcpy 6151->6169 6152 44f100 36 API calls 6152->6169 6154 44ffd1 6153->6154 6156 44ffc9 lstrcpy 6153->6156 6172 431510 6154->6172 6156->6154 6157 44f964 lstrcpy 6157->6163 6158 44fab5 lstrcpy 6158->6169 6159 44fb30 StrCmpCA 6159->6114 6159->6169 6160 44fca5 lstrcpy 6160->6163 6161 44fdf5 lstrcpy 6161->6169 6162 44fe70 StrCmpCA 6162->6116 6162->6169 6163->6104 6163->6105 6163->6106 6163->6107 6163->6108 6163->6109 6163->6110 6163->6113 6163->6114 6163->6115 6163->6116 6163->6120 6163->6126 6163->6127 6163->6135 6163->6136 6163->6139 6163->6142 6163->6148 6163->6149 6163->6151 6163->6157 6163->6160 6163->6169 6164 44fb63 lstrcpy 6164->6169 6165 44fea3 lstrcpy 6165->6169 6166 431410 8 API calls 6166->6169 6167 44efe0 28 API calls 6167->6169 6168 44fbb7 lstrcpy 6168->6169 6169->6111 6169->6112 6169->6114 6169->6116 6169->6119 6169->6147 6169->6152 6169->6158 6169->6159 6169->6161 6169->6162 6169->6163 6169->6164 6169->6165 6169->6166 6169->6167 6169->6168 6170 44fef7 lstrcpy 6169->6170 6170->6169 6173 43151f 6172->6173 6174 43152b lstrcpy 6173->6174 6175 431533 6173->6175 6174->6175 6176 43154d lstrcpy 6175->6176 6177 431555 6175->6177 6176->6177 6178 43156f lstrcpy 6177->6178 6179 431577 6177->6179 6178->6179 6180 431599 6179->6180 6181 431591 lstrcpy 6179->6181 6180->6171 6181->6180 5450 432d90 6083 434980 17 API calls 5450->6083 5452 432da2 5453 434980 34 API calls 5452->5453 5454 432dc0 5453->5454 5455 434980 34 API calls 5454->5455 5456 432dd6 5455->5456 5457 434980 34 API calls 5456->5457 5458 432deb 5457->5458 5459 434980 34 API calls 5458->5459 5460 432e0c 5459->5460 5461 434980 34 API calls 5460->5461 5462 432e21 5461->5462 5463 434980 34 API calls 5462->5463 5464 432e39 5463->5464 5465 434980 34 API calls 5464->5465 5466 432e5a 5465->5466 5467 434980 34 API calls 5466->5467 5468 432e6f 5467->5468 5469 434980 34 API calls 5468->5469 5470 432e85 5469->5470 5471 434980 34 API calls 5470->5471 5472 432e9b 5471->5472 5473 434980 34 API calls 5472->5473 5474 432eb1 5473->5474 5475 434980 34 API calls 5474->5475 5476 432eca 5475->5476 5477 434980 34 API calls 5476->5477 5478 432ee0 5477->5478 5479 434980 34 API calls 5478->5479 5480 432ef6 5479->5480 5481 434980 34 API calls 5480->5481 5482 432f0c 5481->5482 5483 434980 34 API calls 5482->5483 5484 432f22 5483->5484 5485 434980 34 API calls 5484->5485 5486 432f38 5485->5486 5487 434980 34 API calls 5486->5487 5488 432f51 5487->5488 5489 434980 34 API calls 5488->5489 5490 432f67 5489->5490 5491 434980 34 API calls 5490->5491 5492 432f7d 5491->5492 5493 434980 34 API calls 5492->5493 5494 432f93 5493->5494 5495 434980 34 API calls 5494->5495 5496 432fa9 5495->5496 5497 434980 34 API calls 5496->5497 5498 432fbf 5497->5498 5499 434980 34 API calls 5498->5499 5500 432fd8 5499->5500 5501 434980 34 API calls 5500->5501 5502 432fee 5501->5502 5503 434980 34 API calls 5502->5503 5504 433004 5503->5504 5505 434980 34 API calls 5504->5505 5506 43301a 5505->5506 5507 434980 34 API calls 5506->5507 5508 433030 5507->5508 5509 434980 34 API calls 5508->5509 5510 433046 5509->5510 5511 434980 34 API calls 5510->5511 5512 43305f 5511->5512 5513 434980 34 API calls 5512->5513 5514 433075 5513->5514 5515 434980 34 API calls 5514->5515 5516 43308b 5515->5516 5517 434980 34 API calls 5516->5517 5518 4330a1 5517->5518 5519 434980 34 API calls 5518->5519 5520 4330b7 5519->5520 5521 434980 34 API calls 5520->5521 5522 4330cd 5521->5522 5523 434980 34 API calls 5522->5523 5524 4330e6 5523->5524 5525 434980 34 API calls 5524->5525 5526 4330fc 5525->5526 5527 434980 34 API calls 5526->5527 5528 433112 5527->5528 5529 434980 34 API calls 5528->5529 5530 433128 5529->5530 5531 434980 34 API calls 5530->5531 5532 43313e 5531->5532 5533 434980 34 API calls 5532->5533 5534 433154 5533->5534 5535 434980 34 API calls 5534->5535 5536 43316d 5535->5536 5537 434980 34 API calls 5536->5537 5538 433183 5537->5538 5539 434980 34 API calls 5538->5539 5540 433199 5539->5540 5541 434980 34 API calls 5540->5541 5542 4331af 5541->5542 5543 434980 34 API calls 5542->5543 5544 4331c5 5543->5544 5545 434980 34 API calls 5544->5545 5546 4331db 5545->5546 5547 434980 34 API calls 5546->5547 5548 4331f4 5547->5548 5549 434980 34 API calls 5548->5549 5550 43320a 5549->5550 5551 434980 34 API calls 5550->5551 5552 433220 5551->5552 5553 434980 34 API calls 5552->5553 5554 433236 5553->5554 5555 434980 34 API calls 5554->5555 5556 43324c 5555->5556 5557 434980 34 API calls 5556->5557 5558 433262 5557->5558 5559 434980 34 API calls 5558->5559 5560 43327b 5559->5560 5561 434980 34 API calls 5560->5561 5562 433291 5561->5562 5563 434980 34 API calls 5562->5563 5564 4332a7 5563->5564 5565 434980 34 API calls 5564->5565 5566 4332bd 5565->5566 5567 434980 34 API calls 5566->5567 5568 4332d3 5567->5568 5569 434980 34 API calls 5568->5569 5570 4332e9 5569->5570 5571 434980 34 API calls 5570->5571 5572 433302 5571->5572 5573 434980 34 API calls 5572->5573 5574 433318 5573->5574 5575 434980 34 API calls 5574->5575 5576 43332e 5575->5576 5577 434980 34 API calls 5576->5577 5578 433344 5577->5578 5579 434980 34 API calls 5578->5579 5580 43335a 5579->5580 5581 434980 34 API calls 5580->5581 5582 433370 5581->5582 5583 434980 34 API calls 5582->5583 5584 433389 5583->5584 5585 434980 34 API calls 5584->5585 5586 43339f 5585->5586 5587 434980 34 API calls 5586->5587 5588 4333b5 5587->5588 5589 434980 34 API calls 5588->5589 5590 4333cb 5589->5590 5591 434980 34 API calls 5590->5591 5592 4333e1 5591->5592 5593 434980 34 API calls 5592->5593 5594 4333f7 5593->5594 5595 434980 34 API calls 5594->5595 5596 433410 5595->5596 5597 434980 34 API calls 5596->5597 5598 433426 5597->5598 5599 434980 34 API calls 5598->5599 5600 43343c 5599->5600 5601 434980 34 API calls 5600->5601 5602 433452 5601->5602 5603 434980 34 API calls 5602->5603 5604 433468 5603->5604 5605 434980 34 API calls 5604->5605 5606 43347e 5605->5606 5607 434980 34 API calls 5606->5607 5608 433497 5607->5608 5609 434980 34 API calls 5608->5609 5610 4334ad 5609->5610 5611 434980 34 API calls 5610->5611 5612 4334c3 5611->5612 5613 434980 34 API calls 5612->5613 5614 4334d9 5613->5614 5615 434980 34 API calls 5614->5615 5616 4334ef 5615->5616 5617 434980 34 API calls 5616->5617 5618 433505 5617->5618 5619 434980 34 API calls 5618->5619 5620 43351e 5619->5620 5621 434980 34 API calls 5620->5621 5622 433534 5621->5622 5623 434980 34 API calls 5622->5623 5624 43354a 5623->5624 5625 434980 34 API calls 5624->5625 5626 433560 5625->5626 5627 434980 34 API calls 5626->5627 5628 433576 5627->5628 5629 434980 34 API calls 5628->5629 5630 43358c 5629->5630 5631 434980 34 API calls 5630->5631 5632 4335a5 5631->5632 5633 434980 34 API calls 5632->5633 5634 4335bb 5633->5634 5635 434980 34 API calls 5634->5635 5636 4335d1 5635->5636 5637 434980 34 API calls 5636->5637 5638 4335e7 5637->5638 5639 434980 34 API calls 5638->5639 5640 4335fd 5639->5640 5641 434980 34 API calls 5640->5641 5642 433613 5641->5642 5643 434980 34 API calls 5642->5643 5644 43362c 5643->5644 5645 434980 34 API calls 5644->5645 5646 433642 5645->5646 5647 434980 34 API calls 5646->5647 5648 433658 5647->5648 5649 434980 34 API calls 5648->5649 5650 43366e 5649->5650 5651 434980 34 API calls 5650->5651 5652 433684 5651->5652 5653 434980 34 API calls 5652->5653 5654 43369a 5653->5654 5655 434980 34 API calls 5654->5655 5656 4336b3 5655->5656 5657 434980 34 API calls 5656->5657 5658 4336c9 5657->5658 5659 434980 34 API calls 5658->5659 5660 4336df 5659->5660 5661 434980 34 API calls 5660->5661 5662 4336f5 5661->5662 5663 434980 34 API calls 5662->5663 5664 43370b 5663->5664 5665 434980 34 API calls 5664->5665 5666 433721 5665->5666 5667 434980 34 API calls 5666->5667 5668 43373a 5667->5668 5669 434980 34 API calls 5668->5669 5670 433750 5669->5670 5671 434980 34 API calls 5670->5671 5672 433766 5671->5672 5673 434980 34 API calls 5672->5673 5674 43377c 5673->5674 5675 434980 34 API calls 5674->5675 5676 433792 5675->5676 5677 434980 34 API calls 5676->5677 5678 4337a8 5677->5678 5679 434980 34 API calls 5678->5679 5680 4337c1 5679->5680 5681 434980 34 API calls 5680->5681 5682 4337d7 5681->5682 5683 434980 34 API calls 5682->5683 5684 4337ed 5683->5684 5685 434980 34 API calls 5684->5685 5686 433803 5685->5686 5687 434980 34 API calls 5686->5687 5688 433819 5687->5688 5689 434980 34 API calls 5688->5689 5690 43382f 5689->5690 5691 434980 34 API calls 5690->5691 5692 433848 5691->5692 5693 434980 34 API calls 5692->5693 5694 43385e 5693->5694 5695 434980 34 API calls 5694->5695 5696 433874 5695->5696 5697 434980 34 API calls 5696->5697 5698 43388a 5697->5698 5699 434980 34 API calls 5698->5699 5700 4338a0 5699->5700 5701 434980 34 API calls 5700->5701 5702 4338b6 5701->5702 5703 434980 34 API calls 5702->5703 5704 4338cf 5703->5704 5705 434980 34 API calls 5704->5705 5706 4338e5 5705->5706 5707 434980 34 API calls 5706->5707 5708 4338fb 5707->5708 5709 434980 34 API calls 5708->5709 5710 433911 5709->5710 5711 434980 34 API calls 5710->5711 5712 433927 5711->5712 5713 434980 34 API calls 5712->5713 5714 43393d 5713->5714 5715 434980 34 API calls 5714->5715 5716 433956 5715->5716 5717 434980 34 API calls 5716->5717 5718 43396c 5717->5718 5719 434980 34 API calls 5718->5719 5720 433982 5719->5720 5721 434980 34 API calls 5720->5721 5722 433998 5721->5722 5723 434980 34 API calls 5722->5723 5724 4339ae 5723->5724 5725 434980 34 API calls 5724->5725 5726 4339c4 5725->5726 5727 434980 34 API calls 5726->5727 5728 4339dd 5727->5728 5729 434980 34 API calls 5728->5729 5730 4339f3 5729->5730 5731 434980 34 API calls 5730->5731 5732 433a09 5731->5732 5733 434980 34 API calls 5732->5733 5734 433a1f 5733->5734 5735 434980 34 API calls 5734->5735 5736 433a35 5735->5736 5737 434980 34 API calls 5736->5737 5738 433a4b 5737->5738 5739 434980 34 API calls 5738->5739 5740 433a64 5739->5740 5741 434980 34 API calls 5740->5741 5742 433a7a 5741->5742 5743 434980 34 API calls 5742->5743 5744 433a90 5743->5744 5745 434980 34 API calls 5744->5745 5746 433aa6 5745->5746 5747 434980 34 API calls 5746->5747 5748 433abc 5747->5748 5749 434980 34 API calls 5748->5749 5750 433ad2 5749->5750 5751 434980 34 API calls 5750->5751 5752 433aeb 5751->5752 5753 434980 34 API calls 5752->5753 5754 433b01 5753->5754 5755 434980 34 API calls 5754->5755 5756 433b17 5755->5756 5757 434980 34 API calls 5756->5757 5758 433b2d 5757->5758 5759 434980 34 API calls 5758->5759 5760 433b43 5759->5760 5761 434980 34 API calls 5760->5761 5762 433b59 5761->5762 5763 434980 34 API calls 5762->5763 5764 433b72 5763->5764 5765 434980 34 API calls 5764->5765 5766 433b88 5765->5766 5767 434980 34 API calls 5766->5767 5768 433b9e 5767->5768 5769 434980 34 API calls 5768->5769 5770 433bb4 5769->5770 5771 434980 34 API calls 5770->5771 5772 433bca 5771->5772 5773 434980 34 API calls 5772->5773 5774 433be0 5773->5774 5775 434980 34 API calls 5774->5775 5776 433bf9 5775->5776 5777 434980 34 API calls 5776->5777 5778 433c0f 5777->5778 5779 434980 34 API calls 5778->5779 5780 433c25 5779->5780 5781 434980 34 API calls 5780->5781 5782 433c3b 5781->5782 5783 434980 34 API calls 5782->5783 5784 433c51 5783->5784 5785 434980 34 API calls 5784->5785 5786 433c67 5785->5786 5787 434980 34 API calls 5786->5787 5788 433c80 5787->5788 5789 434980 34 API calls 5788->5789 5790 433c96 5789->5790 5791 434980 34 API calls 5790->5791 5792 433cac 5791->5792 5793 434980 34 API calls 5792->5793 5794 433cc2 5793->5794 5795 434980 34 API calls 5794->5795 5796 433cd8 5795->5796 5797 434980 34 API calls 5796->5797 5798 433cee 5797->5798 5799 434980 34 API calls 5798->5799 5800 433d07 5799->5800 5801 434980 34 API calls 5800->5801 5802 433d1d 5801->5802 5803 434980 34 API calls 5802->5803 5804 433d33 5803->5804 5805 434980 34 API calls 5804->5805 5806 433d49 5805->5806 5807 434980 34 API calls 5806->5807 5808 433d5f 5807->5808 5809 434980 34 API calls 5808->5809 5810 433d75 5809->5810 5811 434980 34 API calls 5810->5811 5812 433d8e 5811->5812 5813 434980 34 API calls 5812->5813 5814 433da4 5813->5814 5815 434980 34 API calls 5814->5815 5816 433dba 5815->5816 5817 434980 34 API calls 5816->5817 5818 433dd0 5817->5818 5819 434980 34 API calls 5818->5819 5820 433de6 5819->5820 5821 434980 34 API calls 5820->5821 5822 433dfc 5821->5822 5823 434980 34 API calls 5822->5823 5824 433e15 5823->5824 5825 434980 34 API calls 5824->5825 5826 433e2b 5825->5826 5827 434980 34 API calls 5826->5827 5828 433e41 5827->5828 5829 434980 34 API calls 5828->5829 5830 433e57 5829->5830 5831 434980 34 API calls 5830->5831 5832 433e6d 5831->5832 5833 434980 34 API calls 5832->5833 5834 433e83 5833->5834 5835 434980 34 API calls 5834->5835 5836 433e9c 5835->5836 5837 434980 34 API calls 5836->5837 5838 433eb2 5837->5838 5839 434980 34 API calls 5838->5839 5840 433ec8 5839->5840 5841 434980 34 API calls 5840->5841 5842 433ede 5841->5842 5843 434980 34 API calls 5842->5843 5844 433ef4 5843->5844 5845 434980 34 API calls 5844->5845 5846 433f0a 5845->5846 5847 434980 34 API calls 5846->5847 5848 433f23 5847->5848 5849 434980 34 API calls 5848->5849 5850 433f39 5849->5850 5851 434980 34 API calls 5850->5851 5852 433f4f 5851->5852 5853 434980 34 API calls 5852->5853 5854 433f65 5853->5854 5855 434980 34 API calls 5854->5855 5856 433f7b 5855->5856 5857 434980 34 API calls 5856->5857 5858 433f91 5857->5858 5859 434980 34 API calls 5858->5859 5860 433faa 5859->5860 5861 434980 34 API calls 5860->5861 5862 433fc0 5861->5862 5863 434980 34 API calls 5862->5863 5864 433fd6 5863->5864 5865 434980 34 API calls 5864->5865 5866 433fec 5865->5866 5867 434980 34 API calls 5866->5867 5868 434002 5867->5868 5869 434980 34 API calls 5868->5869 5870 434018 5869->5870 5871 434980 34 API calls 5870->5871 5872 434031 5871->5872 5873 434980 34 API calls 5872->5873 5874 434047 5873->5874 5875 434980 34 API calls 5874->5875 5876 43405d 5875->5876 5877 434980 34 API calls 5876->5877 5878 434073 5877->5878 5879 434980 34 API calls 5878->5879 5880 434089 5879->5880 5881 434980 34 API calls 5880->5881 5882 43409f 5881->5882 5883 434980 34 API calls 5882->5883 5884 4340b8 5883->5884 5885 434980 34 API calls 5884->5885 5886 4340ce 5885->5886 5887 434980 34 API calls 5886->5887 5888 4340e4 5887->5888 5889 434980 34 API calls 5888->5889 5890 4340fa 5889->5890 5891 434980 34 API calls 5890->5891 5892 434110 5891->5892 5893 434980 34 API calls 5892->5893 5894 434126 5893->5894 5895 434980 34 API calls 5894->5895 5896 43413f 5895->5896 5897 434980 34 API calls 5896->5897 5898 434155 5897->5898 5899 434980 34 API calls 5898->5899 5900 43416b 5899->5900 5901 434980 34 API calls 5900->5901 5902 434181 5901->5902 5903 434980 34 API calls 5902->5903 5904 434197 5903->5904 5905 434980 34 API calls 5904->5905 5906 4341ad 5905->5906 5907 434980 34 API calls 5906->5907 5908 4341c6 5907->5908 5909 434980 34 API calls 5908->5909 5910 4341dc 5909->5910 5911 434980 34 API calls 5910->5911 5912 4341f2 5911->5912 5913 434980 34 API calls 5912->5913 5914 434208 5913->5914 5915 434980 34 API calls 5914->5915 5916 43421e 5915->5916 5917 434980 34 API calls 5916->5917 5918 434234 5917->5918 5919 434980 34 API calls 5918->5919 5920 43424d 5919->5920 5921 434980 34 API calls 5920->5921 5922 434263 5921->5922 5923 434980 34 API calls 5922->5923 5924 434279 5923->5924 5925 434980 34 API calls 5924->5925 5926 43428f 5925->5926 5927 434980 34 API calls 5926->5927 5928 4342a5 5927->5928 5929 434980 34 API calls 5928->5929 5930 4342bb 5929->5930 5931 434980 34 API calls 5930->5931 5932 4342d4 5931->5932 5933 434980 34 API calls 5932->5933 5934 4342ea 5933->5934 5935 434980 34 API calls 5934->5935 5936 434300 5935->5936 5937 434980 34 API calls 5936->5937 5938 434316 5937->5938 5939 434980 34 API calls 5938->5939 5940 43432c 5939->5940 5941 434980 34 API calls 5940->5941 5942 434342 5941->5942 5943 434980 34 API calls 5942->5943 5944 43435b 5943->5944 5945 434980 34 API calls 5944->5945 5946 434371 5945->5946 5947 434980 34 API calls 5946->5947 5948 434387 5947->5948 5949 434980 34 API calls 5948->5949 5950 43439d 5949->5950 5951 434980 34 API calls 5950->5951 5952 4343b3 5951->5952 5953 434980 34 API calls 5952->5953 5954 4343c9 5953->5954 5955 434980 34 API calls 5954->5955 5956 4343e2 5955->5956 5957 434980 34 API calls 5956->5957 5958 4343f8 5957->5958 5959 434980 34 API calls 5958->5959 5960 43440e 5959->5960 5961 434980 34 API calls 5960->5961 5962 434424 5961->5962 5963 434980 34 API calls 5962->5963 5964 43443a 5963->5964 5965 434980 34 API calls 5964->5965 5966 434450 5965->5966 5967 434980 34 API calls 5966->5967 5968 434469 5967->5968 5969 434980 34 API calls 5968->5969 5970 43447f 5969->5970 5971 434980 34 API calls 5970->5971 5972 434495 5971->5972 5973 434980 34 API calls 5972->5973 5974 4344ab 5973->5974 5975 434980 34 API calls 5974->5975 5976 4344c1 5975->5976 5977 434980 34 API calls 5976->5977 5978 4344d7 5977->5978 5979 434980 34 API calls 5978->5979 5980 4344f0 5979->5980 5981 434980 34 API calls 5980->5981 5982 434506 5981->5982 5983 434980 34 API calls 5982->5983 5984 43451c 5983->5984 5985 434980 34 API calls 5984->5985 5986 434532 5985->5986 5987 434980 34 API calls 5986->5987 5988 434548 5987->5988 5989 434980 34 API calls 5988->5989 5990 43455e 5989->5990 5991 434980 34 API calls 5990->5991 5992 434577 5991->5992 5993 434980 34 API calls 5992->5993 5994 43458d 5993->5994 5995 434980 34 API calls 5994->5995 5996 4345a3 5995->5996 5997 434980 34 API calls 5996->5997 5998 4345b9 5997->5998 5999 434980 34 API calls 5998->5999 6000 4345cf 5999->6000 6001 434980 34 API calls 6000->6001 6002 4345e5 6001->6002 6003 434980 34 API calls 6002->6003 6004 4345fe 6003->6004 6005 434980 34 API calls 6004->6005 6006 434614 6005->6006 6007 434980 34 API calls 6006->6007 6008 43462a 6007->6008 6009 434980 34 API calls 6008->6009 6010 434640 6009->6010 6011 434980 34 API calls 6010->6011 6012 434656 6011->6012 6013 434980 34 API calls 6012->6013 6014 43466c 6013->6014 6015 434980 34 API calls 6014->6015 6016 434685 6015->6016 6017 434980 34 API calls 6016->6017 6018 43469b 6017->6018 6019 434980 34 API calls 6018->6019 6020 4346b1 6019->6020 6021 434980 34 API calls 6020->6021 6022 4346c7 6021->6022 6023 434980 34 API calls 6022->6023 6024 4346dd 6023->6024 6025 434980 34 API calls 6024->6025 6026 4346f3 6025->6026 6027 434980 34 API calls 6026->6027 6028 43470c 6027->6028 6029 434980 34 API calls 6028->6029 6030 434722 6029->6030 6031 434980 34 API calls 6030->6031 6032 434738 6031->6032 6033 434980 34 API calls 6032->6033 6034 43474e 6033->6034 6035 434980 34 API calls 6034->6035 6036 434764 6035->6036 6037 434980 34 API calls 6036->6037 6038 43477a 6037->6038 6039 434980 34 API calls 6038->6039 6040 434793 6039->6040 6041 434980 34 API calls 6040->6041 6042 4347a9 6041->6042 6043 434980 34 API calls 6042->6043 6044 4347bf 6043->6044 6045 434980 34 API calls 6044->6045 6046 4347d5 6045->6046 6047 434980 34 API calls 6046->6047 6048 4347eb 6047->6048 6049 434980 34 API calls 6048->6049 6050 434801 6049->6050 6051 434980 34 API calls 6050->6051 6052 43481a 6051->6052 6053 434980 34 API calls 6052->6053 6054 434830 6053->6054 6055 434980 34 API calls 6054->6055 6056 434846 6055->6056 6057 434980 34 API calls 6056->6057 6058 43485c 6057->6058 6059 434980 34 API calls 6058->6059 6060 434872 6059->6060 6061 434980 34 API calls 6060->6061 6062 434888 6061->6062 6063 434980 34 API calls 6062->6063 6064 4348a1 6063->6064 6065 434980 34 API calls 6064->6065 6066 4348b7 6065->6066 6067 434980 34 API calls 6066->6067 6068 4348cd 6067->6068 6069 434980 34 API calls 6068->6069 6070 4348e3 6069->6070 6071 434980 34 API calls 6070->6071 6072 4348f9 6071->6072 6073 434980 34 API calls 6072->6073 6074 43490f 6073->6074 6075 434980 34 API calls 6074->6075 6076 434928 6075->6076 6077 434980 34 API calls 6076->6077 6078 43493e 6077->6078 6079 434980 34 API calls 6078->6079 6080 434954 6079->6080 6081 434980 34 API calls 6080->6081 6082 43496a 6081->6082 6084 434a9a 6 API calls 6083->6084 6085 434a1e 6083->6085 6084->5452 6086 434a26 11 API calls 6085->6086 6086->6084 6086->6086 6354 451bd0 6379 4329a0 6354->6379 6358 451be3 6359 451c15 GetUserDefaultLangID 6358->6359 6360 451c3e 6359->6360 6480 452a70 GetProcessHeap HeapAlloc GetComputerNameA 6360->6480 6362 451c43 6363 451c6d lstrlenA 6362->6363 6364 451c85 6363->6364 6365 451ca9 lstrlenA 6364->6365 6366 451cbf 6365->6366 6367 452a70 3 API calls 6366->6367 6368 451ce5 lstrlenA 6367->6368 6369 451cfa 6368->6369 6370 451d20 lstrlenA 6369->6370 6371 451d36 6370->6371 6482 4529e0 GetProcessHeap HeapAlloc GetUserNameA 6371->6482 6373 451d59 lstrlenA 6374 451d6d 6373->6374 6375 451ddc OpenEventA 6374->6375 6376 451e14 CreateEventA 6375->6376 6483 451b00 GetSystemTime 6376->6483 6378 451e28 6380 434980 34 API calls 6379->6380 6381 4329b1 6380->6381 6382 434980 34 API calls 6381->6382 6383 4329c7 6382->6383 6384 434980 34 API calls 6383->6384 6385 4329dd 6384->6385 6386 434980 34 API calls 6385->6386 6387 4329f3 6386->6387 6388 434980 34 API calls 6387->6388 6389 432a09 6388->6389 6390 434980 34 API calls 6389->6390 6391 432a1f 6390->6391 6392 434980 34 API calls 6391->6392 6393 432a38 6392->6393 6394 434980 34 API calls 6393->6394 6395 432a4e 6394->6395 6396 434980 34 API calls 6395->6396 6397 432a64 6396->6397 6398 434980 34 API calls 6397->6398 6399 432a7a 6398->6399 6400 434980 34 API calls 6399->6400 6401 432a90 6400->6401 6402 434980 34 API calls 6401->6402 6403 432aa6 6402->6403 6404 434980 34 API calls 6403->6404 6405 432abf 6404->6405 6406 434980 34 API calls 6405->6406 6407 432ad5 6406->6407 6408 434980 34 API calls 6407->6408 6409 432aeb 6408->6409 6410 434980 34 API calls 6409->6410 6411 432b01 6410->6411 6412 434980 34 API calls 6411->6412 6413 432b17 6412->6413 6414 434980 34 API calls 6413->6414 6415 432b2d 6414->6415 6416 434980 34 API calls 6415->6416 6417 432b46 6416->6417 6418 434980 34 API calls 6417->6418 6419 432b5c 6418->6419 6420 434980 34 API calls 6419->6420 6421 432b72 6420->6421 6422 434980 34 API calls 6421->6422 6423 432b88 6422->6423 6424 434980 34 API calls 6423->6424 6425 432b9e 6424->6425 6426 434980 34 API calls 6425->6426 6427 432bb4 6426->6427 6428 434980 34 API calls 6427->6428 6429 432bcd 6428->6429 6430 434980 34 API calls 6429->6430 6431 432be3 6430->6431 6432 434980 34 API calls 6431->6432 6433 432bf9 6432->6433 6434 434980 34 API calls 6433->6434 6435 432c0f 6434->6435 6436 434980 34 API calls 6435->6436 6437 432c25 6436->6437 6438 434980 34 API calls 6437->6438 6439 432c3b 6438->6439 6440 434980 34 API calls 6439->6440 6441 432c54 6440->6441 6442 434980 34 API calls 6441->6442 6443 432c6a 6442->6443 6444 434980 34 API calls 6443->6444 6445 432c80 6444->6445 6446 434980 34 API calls 6445->6446 6447 432c96 6446->6447 6448 434980 34 API calls 6447->6448 6449 432cac 6448->6449 6450 434980 34 API calls 6449->6450 6451 432cc2 6450->6451 6452 434980 34 API calls 6451->6452 6453 432cdb 6452->6453 6454 434980 34 API calls 6453->6454 6455 432cf1 6454->6455 6456 434980 34 API calls 6455->6456 6457 432d07 6456->6457 6458 434980 34 API calls 6457->6458 6459 432d1d 6458->6459 6460 434980 34 API calls 6459->6460 6461 432d33 6460->6461 6462 434980 34 API calls 6461->6462 6463 432d49 6462->6463 6464 434980 34 API calls 6463->6464 6465 432d62 6464->6465 6466 4563c0 GetPEB 6465->6466 6467 4565f3 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 6466->6467 6468 4563f3 6466->6468 6469 456655 GetProcAddress 6467->6469 6470 456668 6467->6470 6475 456407 20 API calls 6468->6475 6469->6470 6471 456671 GetProcAddress GetProcAddress 6470->6471 6472 45669c 6470->6472 6471->6472 6473 4566a5 GetProcAddress 6472->6473 6474 4566b8 6472->6474 6473->6474 6476 4566d4 6474->6476 6477 4566c1 GetProcAddress 6474->6477 6475->6467 6478 456707 6476->6478 6479 4566dd GetProcAddress GetProcAddress 6476->6479 6477->6476 6478->6358 6479->6478 6481 452ac4 6480->6481 6481->6362 6482->6373 6491 451800 6483->6491 6485 451b61 sscanf 6530 432930 6485->6530 6488 451bc9 6488->6378 6489 451bc2 ExitProcess 6490 451bb6 6490->6488 6490->6489 6492 45180e 6491->6492 6493 451835 lstrlenA 6492->6493 6494 451829 lstrcpy 6492->6494 6495 451853 6493->6495 6494->6493 6496 451865 lstrcpy lstrcatA 6495->6496 6497 451878 6495->6497 6496->6497 6498 4518a7 6497->6498 6499 45189f lstrcpy 6497->6499 6500 4518ae lstrlenA 6498->6500 6499->6498 6501 4518c6 6500->6501 6502 4518d2 lstrcpy lstrcatA 6501->6502 6503 4518e6 6501->6503 6502->6503 6504 451915 6503->6504 6505 45190d lstrcpy 6503->6505 6506 45191c lstrlenA 6504->6506 6505->6504 6507 451938 6506->6507 6508 45194a lstrcpy lstrcatA 6507->6508 6509 45195d 6507->6509 6508->6509 6510 45198c 6509->6510 6511 451984 lstrcpy 6509->6511 6512 451993 lstrlenA 6510->6512 6511->6510 6513 4519ab 6512->6513 6514 4519b7 lstrcpy lstrcatA 6513->6514 6515 4519cb 6513->6515 6514->6515 6516 4519fa 6515->6516 6517 4519f2 lstrcpy 6515->6517 6518 451a01 lstrlenA 6516->6518 6517->6516 6519 451a1d 6518->6519 6520 451a2f lstrcpy lstrcatA 6519->6520 6521 451a42 6519->6521 6520->6521 6522 451a71 6521->6522 6523 451a69 lstrcpy 6521->6523 6524 451a78 lstrlenA 6522->6524 6523->6522 6525 451a94 6524->6525 6526 451aa6 lstrcpy lstrcatA 6525->6526 6527 451ab9 6525->6527 6526->6527 6528 451ae8 6527->6528 6529 451ae0 lstrcpy 6527->6529 6528->6485 6529->6528 6531 432934 SystemTimeToFileTime SystemTimeToFileTime 6530->6531 6531->6488 6531->6490 6545 456710 6546 45671d 43 API calls 6545->6546 6547 456b2e 8 API calls 6545->6547 6546->6547 6548 456bc4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6547->6548 6549 456c38 6547->6549 6548->6549 6550 456c45 8 API calls 6549->6550 6551 456d02 6549->6551 6550->6551 6552 456d7f 6551->6552 6553 456d0b GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6551->6553 6554 456d8c 6 API calls 6552->6554 6555 456e19 6552->6555 6553->6552 6554->6555 6556 456e26 12 API calls 6555->6556 6557 456f40 6555->6557 6556->6557 6558 456fbd 6557->6558 6559 456f49 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6557->6559 6560 456fc6 GetProcAddress GetProcAddress 6558->6560 6561 456ff1 6558->6561 6559->6558 6560->6561 6562 457025 6561->6562 6563 456ffa GetProcAddress GetProcAddress 6561->6563 6564 457032 10 API calls 6562->6564 6565 45711d 6562->6565 6563->6562 6564->6565 6566 457126 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6565->6566 6567 457182 6565->6567 6566->6567 6568 45719e 6567->6568 6569 45718b GetProcAddress 6567->6569 6570 4571a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 6568->6570 6571 457203 6568->6571 6569->6568 6570->6571 6767 43b960 6768 43b974 6767->6768 6769 43b999 6768->6769 6770 43b98d lstrcpy 6768->6770 6771 43b9b2 lstrlenA 6769->6771 6772 43baec lstrlenA 6769->6772 6770->6769 6776 43b9c3 6771->6776 6778 43bafd 6772->6778 6773 43b9ed lstrlenA 6777 43ba03 6773->6777 6774 43bb27 lstrlenA 6775 43bb3d 6774->6775 6781 43bb4a lstrcpy lstrcatA 6775->6781 6786 43bb5e 6775->6786 6776->6773 6780 43b9dd lstrcpy lstrcatA 6776->6780 6782 43ba0e lstrcpy lstrcatA 6777->6782 6784 43ba24 6777->6784 6778->6774 6779 43bb17 lstrcpy lstrcatA 6778->6779 6779->6774 6780->6773 6781->6786 6782->6784 6783 43ba5a lstrlenA 6791 43ba79 6783->6791 6784->6783 6788 43ba47 lstrcpy lstrcatA 6784->6788 6785 43bb92 lstrlenA 6787 43bbaa 6785->6787 6786->6785 6789 43bb7f lstrcpy lstrcatA 6786->6789 6790 43bbb7 lstrcpy lstrcatA 6787->6790 6795 43bbcb 6787->6795 6788->6783 6789->6785 6790->6795 6792 43ba89 lstrcpy lstrcatA 6791->6792 6793 43ba9c 6791->6793 6792->6793 6796 43bac5 lstrcpy 6793->6796 6802 43bacd 6793->6802 6794 43bbfe lstrlenA 6798 43bc1e 6794->6798 6795->6794 6797 43bbeb lstrcpy lstrcatA 6795->6797 6796->6802 6797->6794 6799 43bc31 lstrcpy lstrcatA 6798->6799 6800 43bc47 6798->6800 6799->6800 6801 43bc6d lstrcpy 6800->6801 6800->6802 6801->6802 6803 43bd09 lstrcpy 6802->6803 6816 43bf4e 6802->6816 6818 43bd15 6802->6818 6803->6818 6804 43bef4 lstrlenA 6805 43bf03 lstrlenA 6804->6805 6804->6816 6806 43bf1d 6805->6806 6808 43bf32 6806->6808 6809 43bf2a lstrcpy 6806->6809 6807 43bd3c lstrlenA 6807->6818 6810 431410 8 API calls 6808->6810 6809->6808 6811 43bf42 6810->6811 6820 44ef30 6811->6820 6813 43bd67 lstrcpy lstrcatA 6813->6818 6814 43bd9a lstrcpy 6814->6818 6815 43be0e lstrlenA 6815->6818 6817 43be32 lstrcpy lstrcatA 6817->6818 6818->6804 6818->6807 6818->6813 6818->6814 6818->6815 6818->6817 6819 43be6a lstrcpy 6818->6819 6819->6818 6821 44ef50 6820->6821 6822 44ef68 6821->6822 6824 44ef60 lstrcpy 6821->6824 6823 431410 8 API calls 6822->6823 6825 44ef78 6823->6825 6824->6822 6826 4356c0 69 API calls 6825->6826 6827 44ef7e 6826->6827 6827->6816 6532 4526e0 GetWindowsDirectoryA 6533 452725 6532->6533 6534 45272c GetVolumeInformationA 6532->6534 6533->6534 6535 45278c GetProcessHeap HeapAlloc 6534->6535 6537 4527c6 wsprintfA 6535->6537 6538 4527c2 6535->6538 6537->6538 6541 457210 6538->6541 6542 457216 6541->6542 6543 452800 6542->6543 6544 45722c lstrcpy 6542->6544 6544->6543 6572 452820 GetProcessHeap HeapAlloc 6579 4528b0 GetProcessHeap HeapAlloc RegOpenKeyExA 6572->6579 6575 452850 6576 45285a RegOpenKeyExA 6577 452892 RegCloseKey 6576->6577 6578 45287b RegQueryValueExA 6576->6578 6578->6577 6580 4528f5 RegQueryValueExA 6579->6580 6581 45290b RegCloseKey 6579->6581 6580->6581 6582 452849 6581->6582 6582->6575 6582->6576 5266 435570 GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 5267 4355d1 5266->5267 5268 435627 InternetCloseHandle InternetCloseHandle 5266->5268 5269 4355d8 InternetReadFile 5267->5269 5270 435623 5267->5270 5271 435600 KiUserExceptionDispatcher 5267->5271 5272 43563f 5268->5272 5269->5267 5269->5270 5270->5268 5271->5267 5271->5271 6182 44ef30 6183 44ef50 6182->6183 6184 44ef68 6183->6184 6186 44ef60 lstrcpy 6183->6186 6190 431410 6184->6190 6186->6184 6189 44ef7e 6191 431510 4 API calls 6190->6191 6192 43141b 6191->6192 6193 431435 lstrcpy 6192->6193 6194 43143d 6192->6194 6193->6194 6195 431457 lstrcpy 6194->6195 6196 43145f 6194->6196 6195->6196 6197 431479 lstrcpy 6196->6197 6198 431481 6196->6198 6197->6198 6199 4314e5 6198->6199 6200 4314dd lstrcpy 6198->6200 6201 4356c0 6199->6201 6200->6199 6202 4356e0 6201->6202 6203 4356f5 6202->6203 6204 4356ed lstrcpy 6202->6204 6205 434ae0 5 API calls 6203->6205 6204->6203 6206 435700 6205->6206 6349 454090 6206->6349 6208 435736 lstrlenA 6209 454090 4 API calls 6208->6209 6210 435755 6209->6210 6211 43577e lstrcpy 6210->6211 6212 43578a 6210->6212 6211->6212 6213 4357bd lstrcpy 6212->6213 6214 4357c9 6212->6214 6213->6214 6215 4357ed lstrcpy 6214->6215 6216 4357f9 6214->6216 6215->6216 6217 435822 lstrcpy 6216->6217 6218 43582e 6216->6218 6217->6218 6219 435868 InternetOpenA StrCmpCA 6218->6219 6220 43585c lstrcpy 6218->6220 6221 43589c 6219->6221 6220->6219 6222 435f34 InternetCloseHandle 6221->6222 6223 453e10 3 API calls 6221->6223 6241 435f6a 6222->6241 6224 4358b6 6223->6224 6225 4358de lstrcpy lstrcatA 6224->6225 6226 4358f3 6224->6226 6225->6226 6227 435912 lstrcpy 6226->6227 6228 43591a 6226->6228 6227->6228 6229 435929 lstrlenA 6228->6229 6230 435941 6229->6230 6231 43594e lstrcpy lstrcatA 6230->6231 6232 435962 6230->6232 6231->6232 6233 43598f lstrlenA 6232->6233 6235 43597c lstrcpy lstrcatA 6232->6235 6234 4359a5 6233->6234 6236 4359af lstrcpy lstrcatA 6234->6236 6237 4359c3 6234->6237 6235->6233 6236->6237 6238 4359e2 lstrcpy 6237->6238 6239 4359ea 6237->6239 6238->6239 6240 4359ff lstrlenA 6239->6240 6242 435a1a 6240->6242 6241->6189 6243 435a2b lstrcpy lstrcatA 6242->6243 6244 435a3b 6242->6244 6243->6244 6245 435a59 lstrcpy lstrcatA 6244->6245 6246 435a6c 6244->6246 6245->6246 6247 435a8a lstrcpy 6246->6247 6248 435a92 6246->6248 6247->6248 6249 435aa0 InternetConnectA 6248->6249 6250 435acf HttpOpenRequestA 6249->6250 6251 435f2e 6249->6251 6252 435f27 InternetCloseHandle 6250->6252 6253 435b0b 6250->6253 6251->6222 6252->6251 6254 457340 3 API calls 6253->6254 6255 435b1b 6254->6255 6256 4572b0 lstrcpy 6255->6256 6257 435b24 6256->6257 6258 4572f0 2 API calls 6257->6258 6259 435b37 6258->6259 6260 4572b0 lstrcpy 6259->6260 6261 435b40 6260->6261 6262 457340 3 API calls 6261->6262 6263 435b55 6262->6263 6264 4572b0 lstrcpy 6263->6264 6265 435b5e 6264->6265 6266 457340 3 API calls 6265->6266 6267 435b74 6266->6267 6268 4572b0 lstrcpy 6267->6268 6269 435b7d 6268->6269 6270 457340 3 API calls 6269->6270 6271 435b93 6270->6271 6272 4572b0 lstrcpy 6271->6272 6273 435b9c 6272->6273 6274 457340 3 API calls 6273->6274 6275 435bb1 6274->6275 6276 4572b0 lstrcpy 6275->6276 6277 435bba 6276->6277 6278 4572f0 2 API calls 6277->6278 6279 435bcd 6278->6279 6280 4572b0 lstrcpy 6279->6280 6281 435bd6 6280->6281 6282 457340 3 API calls 6281->6282 6283 435beb 6282->6283 6284 4572b0 lstrcpy 6283->6284 6285 435bf4 6284->6285 6286 457340 3 API calls 6285->6286 6287 435c09 6286->6287 6288 4572b0 lstrcpy 6287->6288 6289 435c12 6288->6289 6290 4572f0 2 API calls 6289->6290 6291 435c25 6290->6291 6292 4572b0 lstrcpy 6291->6292 6293 435c2e 6292->6293 6294 457340 3 API calls 6293->6294 6295 435c43 6294->6295 6296 4572b0 lstrcpy 6295->6296 6297 435c4c 6296->6297 6298 457340 3 API calls 6297->6298 6299 435c62 6298->6299 6300 4572b0 lstrcpy 6299->6300 6301 435c6b 6300->6301 6302 457340 3 API calls 6301->6302 6303 435c81 6302->6303 6304 4572b0 lstrcpy 6303->6304 6305 435c8a 6304->6305 6306 457340 3 API calls 6305->6306 6307 435c9f 6306->6307 6308 4572b0 lstrcpy 6307->6308 6309 435ca8 6308->6309 6310 457340 3 API calls 6309->6310 6311 435cbb 6310->6311 6312 4572b0 lstrcpy 6311->6312 6313 435cc4 6312->6313 6314 457340 3 API calls 6313->6314 6315 435cd9 6314->6315 6316 4572b0 lstrcpy 6315->6316 6317 435ce2 6316->6317 6318 457340 3 API calls 6317->6318 6319 435cf7 6318->6319 6320 4572b0 lstrcpy 6319->6320 6321 435d00 6320->6321 6322 4572f0 2 API calls 6321->6322 6323 435d13 6322->6323 6324 4572b0 lstrcpy 6323->6324 6325 435d1c 6324->6325 6326 457340 3 API calls 6325->6326 6327 435d31 6326->6327 6328 4572b0 lstrcpy 6327->6328 6329 435d3a 6328->6329 6330 457340 3 API calls 6329->6330 6331 435d50 6330->6331 6332 4572b0 lstrcpy 6331->6332 6333 435d59 6332->6333 6334 457340 3 API calls 6333->6334 6335 435d6f 6334->6335 6336 4572b0 lstrcpy 6335->6336 6337 435d78 6336->6337 6338 457340 3 API calls 6337->6338 6339 435d8d 6338->6339 6340 4572b0 lstrcpy 6339->6340 6341 435d96 6340->6341 6342 435d9e 14 API calls 6341->6342 6343 435f1a InternetCloseHandle 6342->6343 6346 435e6a 6342->6346 6343->6252 6344 435e7b lstrlenA 6344->6346 6345 435eac lstrcpy lstrcatA 6345->6346 6346->6343 6346->6344 6346->6345 6347 435ee9 lstrcpy 6346->6347 6348 435ef8 InternetReadFile 6346->6348 6347->6346 6348->6343 6348->6346 6350 4540a0 CryptBinaryToStringA 6349->6350 6351 45409a 6349->6351 6350->6351 6352 4540b7 GetProcessHeap HeapAlloc 6350->6352 6351->6208 6352->6351 6353 4540d2 CryptBinaryToStringA 6352->6353 6353->6208

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 633 456710-456717 634 45671d-456b29 GetProcAddress * 43 633->634 635 456b2e-456bc2 LoadLibraryA * 8 633->635 634->635 636 456bc4-456c33 GetProcAddress * 5 635->636 637 456c38-456c3f 635->637 636->637 638 456c45-456cfd GetProcAddress * 8 637->638 639 456d02-456d09 637->639 638->639 640 456d7f-456d86 639->640 641 456d0b-456d7a GetProcAddress * 5 639->641 642 456d8c-456e14 GetProcAddress * 6 640->642 643 456e19-456e20 640->643 641->640 642->643 644 456e26-456f3b GetProcAddress * 12 643->644 645 456f40-456f47 643->645 644->645 646 456fbd-456fc4 645->646 647 456f49-456fb8 GetProcAddress * 5 645->647 648 456fc6-456fec GetProcAddress * 2 646->648 649 456ff1-456ff8 646->649 647->646 648->649 650 457025-45702c 649->650 651 456ffa-457020 GetProcAddress * 2 649->651 652 457032-457118 GetProcAddress * 10 650->652 653 45711d-457124 650->653 651->650 652->653 654 457126-45717d GetProcAddress * 4 653->654 655 457182-457189 653->655 654->655 656 45719e-4571a5 655->656 657 45718b-457199 GetProcAddress 655->657 658 4571a7-4571fe GetProcAddress * 4 656->658 659 457203 656->659 657->656 658->659
                      APIs
                      • GetProcAddress.KERNEL32(74DD0000,0077D618), ref: 00456725
                      • GetProcAddress.KERNEL32(74DD0000,0077D6D8), ref: 0045673D
                      • GetProcAddress.KERNEL32(74DD0000,0077B078), ref: 00456756
                      • GetProcAddress.KERNEL32(74DD0000,0077B090), ref: 0045676E
                      • GetProcAddress.KERNEL32(74DD0000,0077B1C8), ref: 00456786
                      • GetProcAddress.KERNEL32(74DD0000,0077B288), ref: 0045679F
                      • GetProcAddress.KERNEL32(74DD0000,00780580), ref: 004567B7
                      • GetProcAddress.KERNEL32(74DD0000,0077B270), ref: 004567CF
                      • GetProcAddress.KERNEL32(74DD0000,0077B2D0), ref: 004567E8
                      • GetProcAddress.KERNEL32(74DD0000,0077B1B0), ref: 00456800
                      • GetProcAddress.KERNEL32(74DD0000,0077B300), ref: 00456818
                      • GetProcAddress.KERNEL32(74DD0000,0077D798), ref: 00456831
                      • GetProcAddress.KERNEL32(74DD0000,0077D7B8), ref: 00456849
                      • GetProcAddress.KERNEL32(74DD0000,0077D578), ref: 00456861
                      • GetProcAddress.KERNEL32(74DD0000,0077D6B8), ref: 0045687A
                      • GetProcAddress.KERNEL32(74DD0000,0077B0D8), ref: 00456892
                      • GetProcAddress.KERNEL32(74DD0000,0077B0F0), ref: 004568AA
                      • GetProcAddress.KERNEL32(74DD0000,007805D0), ref: 004568C3
                      • GetProcAddress.KERNEL32(74DD0000,0077D638), ref: 004568DB
                      • GetProcAddress.KERNEL32(74DD0000,0077B108), ref: 004568F3
                      • GetProcAddress.KERNEL32(74DD0000,0077B3D8), ref: 0045690C
                      • GetProcAddress.KERNEL32(74DD0000,0077B390), ref: 00456924
                      • GetProcAddress.KERNEL32(74DD0000,0077B378), ref: 0045693C
                      • GetProcAddress.KERNEL32(74DD0000,0077D6F8), ref: 00456955
                      • GetProcAddress.KERNEL32(74DD0000,0077B3C0), ref: 0045696D
                      • GetProcAddress.KERNEL32(74DD0000,0077B3A8), ref: 00456985
                      • GetProcAddress.KERNEL32(74DD0000,0077B318), ref: 0045699E
                      • GetProcAddress.KERNEL32(74DD0000,0077B330), ref: 004569B6
                      • GetProcAddress.KERNEL32(74DD0000,0077B360), ref: 004569CE
                      • GetProcAddress.KERNEL32(74DD0000,0077B348), ref: 004569E7
                      • GetProcAddress.KERNEL32(74DD0000,007852B0), ref: 004569FF
                      • GetProcAddress.KERNEL32(74DD0000,00785118), ref: 00456A17
                      • GetProcAddress.KERNEL32(74DD0000,00785238), ref: 00456A30
                      • GetProcAddress.KERNEL32(74DD0000,00779838), ref: 00456A48
                      • GetProcAddress.KERNEL32(74DD0000,00785268), ref: 00456A60
                      • GetProcAddress.KERNEL32(74DD0000,00785160), ref: 00456A79
                      • GetProcAddress.KERNEL32(74DD0000,0077D7D8), ref: 00456A91
                      • GetProcAddress.KERNEL32(74DD0000,00785310), ref: 00456AA9
                      • GetProcAddress.KERNEL32(74DD0000,0077D7F8), ref: 00456AC2
                      • GetProcAddress.KERNEL32(74DD0000,00785178), ref: 00456ADA
                      • GetProcAddress.KERNEL32(74DD0000,007851A8), ref: 00456AF2
                      • GetProcAddress.KERNEL32(74DD0000,0077D518), ref: 00456B0B
                      • GetProcAddress.KERNEL32(74DD0000,0077D838), ref: 00456B23
                      • LoadLibraryA.KERNELBASE(007851C0,0045067A), ref: 00456B35
                      • LoadLibraryA.KERNELBASE(007852C8), ref: 00456B46
                      • LoadLibraryA.KERNELBASE(007852E0), ref: 00456B58
                      • LoadLibraryA.KERNELBASE(00785088), ref: 00456B6A
                      • LoadLibraryA.KERNELBASE(00785058), ref: 00456B7B
                      • LoadLibraryA.KERNELBASE(00785190), ref: 00456B8D
                      • LoadLibraryA.KERNELBASE(00785250), ref: 00456B9F
                      • LoadLibraryA.KERNELBASE(00785328), ref: 00456BB0
                      • GetProcAddress.KERNEL32(75290000,0077D598), ref: 00456BCC
                      • GetProcAddress.KERNEL32(75290000,00785280), ref: 00456BE4
                      • GetProcAddress.KERNEL32(75290000,00784DC0), ref: 00456BFD
                      • GetProcAddress.KERNEL32(75290000,007850B8), ref: 00456C15
                      • GetProcAddress.KERNEL32(75290000,0077D858), ref: 00456C2D
                      • GetProcAddress.KERNEL32(73440000,007802D8), ref: 00456C4D
                      • GetProcAddress.KERNEL32(73440000,0077D4B8), ref: 00456C65
                      • GetProcAddress.KERNEL32(73440000,00780300), ref: 00456C7E
                      • GetProcAddress.KERNEL32(73440000,00785298), ref: 00456C96
                      • GetProcAddress.KERNEL32(73440000,007852F8), ref: 00456CAE
                      • GetProcAddress.KERNEL32(73440000,0077D4D8), ref: 00456CC7
                      • GetProcAddress.KERNEL32(73440000,0077D4F8), ref: 00456CDF
                      • GetProcAddress.KERNEL32(73440000,00785340), ref: 00456CF7
                      • GetProcAddress.KERNEL32(752C0000,0077D538), ref: 00456D13
                      • GetProcAddress.KERNEL32(752C0000,0077D5B8), ref: 00456D2B
                      • GetProcAddress.KERNEL32(752C0000,007851D8), ref: 00456D44
                      • GetProcAddress.KERNEL32(752C0000,007851F0), ref: 00456D5C
                      • GetProcAddress.KERNEL32(752C0000,0077D5D8), ref: 00456D74
                      • GetProcAddress.KERNEL32(74EC0000,00780418), ref: 00456D94
                      • GetProcAddress.KERNEL32(74EC0000,00780490), ref: 00456DAC
                      • GetProcAddress.KERNEL32(74EC0000,00785208), ref: 00456DC5
                      • GetProcAddress.KERNEL32(74EC0000,00785700), ref: 00456DDD
                      • GetProcAddress.KERNEL32(74EC0000,00785480), ref: 00456DF5
                      • GetProcAddress.KERNEL32(74EC0000,00780350), ref: 00456E0E
                      • GetProcAddress.KERNEL32(75BD0000,00785070), ref: 00456E2E
                      • GetProcAddress.KERNEL32(75BD0000,00785540), ref: 00456E46
                      • GetProcAddress.KERNEL32(75BD0000,00784CC0), ref: 00456E5F
                      • GetProcAddress.KERNEL32(75BD0000,007850A0), ref: 00456E77
                      • GetProcAddress.KERNEL32(75BD0000,007850D0), ref: 00456E8F
                      • GetProcAddress.KERNEL32(75BD0000,00785720), ref: 00456EA8
                      • GetProcAddress.KERNEL32(75BD0000,00785740), ref: 00456EC0
                      • GetProcAddress.KERNEL32(75BD0000,00785220), ref: 00456ED8
                      • GetProcAddress.KERNEL32(75BD0000,007850E8), ref: 00456EF1
                      • GetProcAddress.KERNEL32(75BD0000,CreateDesktopA), ref: 00456F07
                      • GetProcAddress.KERNEL32(75BD0000,OpenDesktopA), ref: 00456F1E
                      • GetProcAddress.KERNEL32(75BD0000,CloseDesktop), ref: 00456F35
                      • GetProcAddress.KERNEL32(75A70000,007857C0), ref: 00456F51
                      • GetProcAddress.KERNEL32(75A70000,00785100), ref: 00456F69
                      • GetProcAddress.KERNEL32(75A70000,00785130), ref: 00456F82
                      • GetProcAddress.KERNEL32(75A70000,00785148), ref: 00456F9A
                      • GetProcAddress.KERNEL32(75A70000,007853D0), ref: 00456FB2
                      • GetProcAddress.KERNEL32(75450000,007857E0), ref: 00456FCE
                      • GetProcAddress.KERNEL32(75450000,007854C0), ref: 00456FE6
                      • GetProcAddress.KERNEL32(75DA0000,007857A0), ref: 00457002
                      • GetProcAddress.KERNEL32(75DA0000,007853B8), ref: 0045701A
                      • GetProcAddress.KERNEL32(6F070000,00785460), ref: 0045703A
                      • GetProcAddress.KERNEL32(6F070000,00785520), ref: 00457052
                      • GetProcAddress.KERNEL32(6F070000,007855C0), ref: 0045706B
                      • GetProcAddress.KERNEL32(6F070000,00785418), ref: 00457083
                      • GetProcAddress.KERNEL32(6F070000,00785760), ref: 0045709B
                      • GetProcAddress.KERNEL32(6F070000,00785780), ref: 004570B4
                      • GetProcAddress.KERNEL32(6F070000,00785800), ref: 004570CC
                      • GetProcAddress.KERNEL32(6F070000,00785820), ref: 004570E4
                      • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 004570FB
                      • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 00457112
                      • GetProcAddress.KERNEL32(75AF0000,007853E8), ref: 0045712E
                      • GetProcAddress.KERNEL32(75AF0000,00784E10), ref: 00457146
                      • GetProcAddress.KERNEL32(75AF0000,00785358), ref: 0045715F
                      • GetProcAddress.KERNEL32(75AF0000,00785370), ref: 00457177
                      • GetProcAddress.KERNEL32(75D90000,007855E0), ref: 00457193
                      • GetProcAddress.KERNEL32(6C890000,00785388), ref: 004571AF
                      • GetProcAddress.KERNEL32(6C890000,007854A0), ref: 004571C7
                      • GetProcAddress.KERNEL32(6C890000,007853A0), ref: 004571E0
                      • GetProcAddress.KERNEL32(6C890000,00785400), ref: 004571F8
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: Rx$ Ux$ Wx$ Xx$(Sx$0Qx$8Rx$@Sx$@Ux$@Wx$CloseDesktop$CreateDesktopA$HQx$HttpQueryInfoA$InternetSetOptionA$OpenDesktopA$PRx$XPx$XSx$`Qx$`Tx$`Wx$hRx$pPx$pSx$xQx$Px$Rx$Sx$Ux$Wx
                      • API String ID: 2238633743-1523381997
                      • Opcode ID: 7c3abb51a897597eac61b5ae117640cef264648494ea287a1ba750edb9b9c8c6
                      • Instruction ID: 85a7507217240d6660cd2570c1b65a3777e12b47c0dd92a8e950fb54f2b9a64f
                      • Opcode Fuzzy Hash: 7c3abb51a897597eac61b5ae117640cef264648494ea287a1ba750edb9b9c8c6
                      • Instruction Fuzzy Hash: 1D623AB5618200AFD754DFB4EC88A263BBFF789345310AA1DED5683364DBB4A850DB70
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 00434BAF
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00434C02
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00434C35
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00434C65
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00434CA3
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00434CD6
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00434CE6
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$InternetOpen
                      • String ID: "$------$TPF$TPF$TPF$pNx$cx
                      • API String ID: 2041821634-2282460670
                      • Opcode ID: b99fca825cf93b7c30e5b2a4452b77c3ec5710449e983229eae0378075dcf3a6
                      • Instruction ID: c2f41ebc033eab9966af4b1c8e85823a3958134ed20adff9708d6ce48345b939
                      • Opcode Fuzzy Hash: b99fca825cf93b7c30e5b2a4452b77c3ec5710449e983229eae0378075dcf3a6
                      • Instruction Fuzzy Hash: 24529271A006169FCB20EFB5CD45B9F77B9AF48304F15202AF904A7251DB78ED46CBA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 999 4356c0-4356e4 call 432840 1002 4356e6-4356eb 999->1002 1003 4356f5-4356fb call 434ae0 999->1003 1002->1003 1004 4356ed-4356ef lstrcpy 1002->1004 1006 435700-435760 call 454090 lstrlenA call 454090 1003->1006 1004->1003 1011 435762-43576a 1006->1011 1012 43576c-43577c call 432840 1006->1012 1011->1011 1011->1012 1015 43578a-435795 1012->1015 1016 43577e-435784 lstrcpy 1012->1016 1017 435797 1015->1017 1018 4357ad-4357bb call 432840 1015->1018 1016->1015 1019 4357a0-4357a8 1017->1019 1023 4357c9-4357d1 1018->1023 1024 4357bd-4357c3 lstrcpy 1018->1024 1019->1019 1021 4357aa 1019->1021 1021->1018 1025 4357d3-4357db 1023->1025 1026 4357dd-4357eb call 432840 1023->1026 1024->1023 1025->1025 1025->1026 1029 4357f9-435804 1026->1029 1030 4357ed-4357f3 lstrcpy 1026->1030 1031 435813-435820 call 432840 1029->1031 1032 435806-43580e 1029->1032 1030->1029 1036 435822-435828 lstrcpy 1031->1036 1037 43582e-435839 1031->1037 1032->1032 1033 435810 1032->1033 1033->1031 1036->1037 1038 43583b 1037->1038 1039 43584d-43585a call 432840 1037->1039 1040 435840-435848 1038->1040 1044 435868-43589a InternetOpenA StrCmpCA 1039->1044 1045 43585c-435862 lstrcpy 1039->1045 1040->1040 1043 43584a 1040->1043 1043->1039 1046 4358a3-4358a5 1044->1046 1047 43589c 1044->1047 1045->1044 1048 435f34-435ff3 InternetCloseHandle call 432930 * 17 1046->1048 1049 4358ab-4358d3 call 453e10 call 432840 1046->1049 1047->1046 1059 4358f3-4358f8 1049->1059 1060 4358d5-4358d7 1049->1060 1063 4358fa call 432930 1059->1063 1064 4358ff-43590c call 432840 1059->1064 1060->1059 1062 4358d9-4358dc 1060->1062 1062->1059 1067 4358de-4358f0 lstrcpy lstrcatA 1062->1067 1063->1064 1071 43591a-435945 call 432930 * 2 lstrlenA call 432840 1064->1071 1072 43590e-435910 1064->1072 1067->1059 1087 435962-435970 call 432840 1071->1087 1088 435947-43594c 1071->1088 1072->1071 1074 435912-435914 lstrcpy 1072->1074 1074->1071 1095 435972-435974 1087->1095 1096 43598f-4359a9 lstrlenA call 432840 1087->1096 1088->1087 1090 43594e-43595c lstrcpy lstrcatA 1088->1090 1090->1087 1095->1096 1099 435976-43597a 1095->1099 1105 4359c3-4359c8 1096->1105 1106 4359ab-4359ad 1096->1106 1099->1096 1102 43597c-435989 lstrcpy lstrcatA 1099->1102 1102->1096 1109 4359ca call 432930 1105->1109 1110 4359cf-4359dc call 432840 1105->1110 1106->1105 1108 4359af-4359bd lstrcpy lstrcatA 1106->1108 1108->1105 1109->1110 1117 4359ea-435a1e call 432930 * 3 lstrlenA call 432840 1110->1117 1118 4359de-4359e0 1110->1118 1136 435a20-435a25 1117->1136 1137 435a3b-435a4d call 432840 1117->1137 1118->1117 1119 4359e2-4359e4 lstrcpy 1118->1119 1119->1117 1136->1137 1138 435a27-435a29 1136->1138 1142 435a4f-435a51 1137->1142 1143 435a6c-435a71 1137->1143 1138->1137 1140 435a2b-435a35 lstrcpy lstrcatA 1138->1140 1140->1137 1142->1143 1144 435a53-435a57 1142->1144 1145 435a73 call 432930 1143->1145 1146 435a78-435a84 call 432840 1143->1146 1144->1143 1147 435a59-435a66 lstrcpy lstrcatA 1144->1147 1145->1146 1151 435a92-435ac9 call 432930 * 2 InternetConnectA 1146->1151 1152 435a86-435a88 1146->1152 1147->1143 1158 435acf-435b05 HttpOpenRequestA 1151->1158 1159 435f2e-435f31 1151->1159 1152->1151 1153 435a8a-435a8c lstrcpy 1152->1153 1153->1151 1160 435f27-435f28 InternetCloseHandle 1158->1160 1161 435b0b-435e64 call 457340 call 4572b0 call 432930 call 4572f0 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 4572f0 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 4572f0 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 4572f0 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 call 457340 call 4572b0 call 432930 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA memcpy lstrlenA memcpy lstrlenA * 2 memcpy lstrlenA HttpSendRequestA InternetReadFile 1158->1161 1159->1048 1160->1159 1294 435f1a-435f24 InternetCloseHandle 1161->1294 1295 435e6a 1161->1295 1294->1160 1296 435e70-435e75 1295->1296 1296->1294 1297 435e7b-435ea4 lstrlenA call 432840 1296->1297 1300 435ec2-435ec9 1297->1300 1301 435ea6-435eaa 1297->1301 1303 435ed6-435ee3 call 432840 1300->1303 1304 435ecb-435ed0 call 432930 1300->1304 1301->1300 1302 435eac-435ebc lstrcpy lstrcatA 1301->1302 1302->1300 1309 435ef1-435f14 call 432930 InternetReadFile 1303->1309 1310 435ee5-435ee7 1303->1310 1304->1303 1309->1294 1309->1296 1310->1309 1311 435ee9-435eeb lstrcpy 1310->1311 1311->1309
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 004356EF
                      • lstrlenA.KERNEL32(?), ref: 00435742
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00435784
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 004357C3
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 004357F3
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00435828
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen
                      • String ID: ------$"$--$------$TPF$TPF$TPF$TPF$TPF$pNx$~D$cx
                      • API String ID: 367037083-3301421569
                      • Opcode ID: 55126ba8be6903a80ec11d1788a90b9e5860c90537b06f7b98b7a456d5e32209
                      • Instruction ID: b7dc98dc2810379058bf150a13b991ef2f20bfc6ec922f4ffd4676e387dbce09
                      • Opcode Fuzzy Hash: 55126ba8be6903a80ec11d1788a90b9e5860c90537b06f7b98b7a456d5e32209
                      • Instruction Fuzzy Hash: 78429D71E006059FCB10EBB5CD45A9F77B9AF08314F15202AFA45A7252DB78ED068BE8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1782 4563c0-4563ed GetPEB 1783 4565f3-456653 LoadLibraryA * 5 1782->1783 1784 4563f3-4565ee call 456320 GetProcAddress * 20 1782->1784 1785 456655-456663 GetProcAddress 1783->1785 1786 456668-45666f 1783->1786 1784->1783 1785->1786 1788 456671-456697 GetProcAddress * 2 1786->1788 1789 45669c-4566a3 1786->1789 1788->1789 1791 4566a5-4566b3 GetProcAddress 1789->1791 1792 4566b8-4566bf 1789->1792 1791->1792 1794 4566d4-4566db 1792->1794 1795 4566c1-4566cf GetProcAddress 1792->1795 1796 456707-45670a 1794->1796 1797 4566dd-456702 GetProcAddress * 2 1794->1797 1795->1794 1797->1796
                      APIs
                      • GetProcAddress.KERNEL32(74DD0000,007732C8), ref: 00456419
                      • GetProcAddress.KERNEL32(74DD0000,007732E0), ref: 00456432
                      • GetProcAddress.KERNEL32(74DD0000,007732F8), ref: 0045644A
                      • GetProcAddress.KERNEL32(74DD0000,00773310), ref: 00456462
                      • GetProcAddress.KERNEL32(74DD0000,00773328), ref: 0045647B
                      • GetProcAddress.KERNEL32(74DD0000,00774568), ref: 00456493
                      • GetProcAddress.KERNEL32(74DD0000,00774588), ref: 004564AB
                      • GetProcAddress.KERNEL32(74DD0000,00773338), ref: 004564C4
                      • GetProcAddress.KERNEL32(74DD0000,007745A8), ref: 004564DC
                      • GetProcAddress.KERNEL32(74DD0000,007745C0), ref: 004564F4
                      • GetProcAddress.KERNEL32(74DD0000,007704B0), ref: 0045650D
                      • GetProcAddress.KERNEL32(74DD0000,007704C8), ref: 00456525
                      • GetProcAddress.KERNEL32(74DD0000,007776C8), ref: 0045653D
                      • GetProcAddress.KERNEL32(74DD0000,00777620), ref: 00456556
                      • GetProcAddress.KERNEL32(74DD0000,007704E8), ref: 0045656E
                      • GetProcAddress.KERNEL32(74DD0000,00777638), ref: 00456586
                      • GetProcAddress.KERNEL32(74DD0000,00777650), ref: 0045659F
                      • GetProcAddress.KERNEL32(74DD0000,00770508), ref: 004565B7
                      • GetProcAddress.KERNEL32(74DD0000,007776E0), ref: 004565CF
                      • GetProcAddress.KERNEL32(74DD0000,00770528), ref: 004565E8
                      • LoadLibraryA.KERNELBASE(007776F8,?,?,?,00451BE3), ref: 004565F9
                      • LoadLibraryA.KERNELBASE(00777530,?,?,?,00451BE3), ref: 0045660B
                      • LoadLibraryA.KERNEL32(00777668,?,?,?,00451BE3), ref: 0045661D
                      • LoadLibraryA.KERNELBASE(00777680,?,?,?,00451BE3), ref: 0045662E
                      • LoadLibraryA.KERNEL32(007775C0,?,?,?,00451BE3), ref: 00456640
                      • GetProcAddress.KERNEL32(75A70000,00777590), ref: 0045665D
                      • GetProcAddress.KERNEL32(75290000,00777698), ref: 00456679
                      • GetProcAddress.KERNEL32(75290000,00777578), ref: 00456691
                      • GetProcAddress.KERNEL32(75BD0000,007776B0), ref: 004566AD
                      • GetProcAddress.KERNEL32(75450000,00770548), ref: 004566C9
                      • GetProcAddress.KERNEL32(76E90000,00770568), ref: 004566E5
                      • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 004566FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: vw$(3w$0uw$83w$8vw$NtQueryInformationProcess$Pvw$hEw$hvw$xuw$2w$vw
                      • API String ID: 2238633743-2399189216
                      • Opcode ID: d6d6cfc6c7a8a2cafdca0d36494484f8bca28a695a87dd9b105d8f857129bbb7
                      • Instruction ID: e3c5269ce4f30b2ce9d6b71afbe18a01ed283ff0b3433f005d92056a124e32ac
                      • Opcode Fuzzy Hash: d6d6cfc6c7a8a2cafdca0d36494484f8bca28a695a87dd9b105d8f857129bbb7
                      • Instruction Fuzzy Hash: B4A15CB5A19240AFD754DFB4ED98A2637BFF789745300A61EED1683360DBB4A800DB70

                      Control-flow Graph

                      APIs
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434994
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0043499B
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349A2
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349A9
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349B0
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004349BB
                      • RtlAllocateHeap.NTDLL(00000000), ref: 004349C2
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349D2
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349D9
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349E0
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349E7
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349EE
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004349F9
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A00
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A07
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A0E
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A15
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A2B
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A32
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A39
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A40
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A47
                      • strlen.MSVCRT ref: 00434A4F
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A73
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A7A
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A81
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A88
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A8F
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434A9F
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434AA6
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434AAD
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434AB4
                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00434ABB
                      • VirtualProtect.KERNELBASE(00000000,00000004,00000100,?), ref: 00434AD0
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                      • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                      • API String ID: 2127927946-3329630956
                      • Opcode ID: 054f5e69b9fd1f078e8c67a3229e5285ebed34b3e23583ebb82847d6c949b112
                      • Instruction ID: af8e8f6cd727043c6d124cc710d0dac4a9c45e7a142e4f14080ad7f0cfd45952
                      • Opcode Fuzzy Hash: 054f5e69b9fd1f078e8c67a3229e5285ebed34b3e23583ebb82847d6c949b112
                      • Instruction Fuzzy Hash: 8631F820F8033C7E8A246BA56D4AB5FBED4DFC7B61B308053F51856189E9E85404CEEB

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2097 452a70-452ac2 GetProcessHeap HeapAlloc GetComputerNameA 2098 452ae4-452af9 2097->2098 2099 452ac4-452ad6 2097->2099
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00452A9F
                      • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00452AA6
                      • GetComputerNameA.KERNEL32(00000000,00000104), ref: 00452ABA
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocComputerNameProcess
                      • String ID:
                      • API String ID: 4203777966-0
                      • Opcode ID: 9bafd61cea8468b276adf9f28df88ee5b60fa7a0079d31094e8de99d1c81db5e
                      • Instruction ID: 365d20b11ef11a4bdd8d2bc9c94a76392ac2ff3ef3643601b4dfebfde436e900
                      • Opcode Fuzzy Hash: 9bafd61cea8468b276adf9f28df88ee5b60fa7a0079d31094e8de99d1c81db5e
                      • Instruction Fuzzy Hash: B601D672A44618ABDB10CF99ED45BAAF7BCF744B21F00026BFD15D3780D7B8190486A1
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,00000000,00000000), ref: 00452A0F
                      • HeapAlloc.KERNEL32(00000000), ref: 00452A16
                      • GetUserNameA.ADVAPI32(00000000,00000104), ref: 00452A2A
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocNameProcessUser
                      • String ID:
                      • API String ID: 1206570057-0
                      • Opcode ID: 510f72aadfba94aaf7a0f5761374721df1938f88e7e309923b22dad388ef9166
                      • Instruction ID: b090b85d65431104e6ee3b8f4fd5a573d5052d71f078464c7f70d75807e125b6
                      • Opcode Fuzzy Hash: 510f72aadfba94aaf7a0f5761374721df1938f88e7e309923b22dad388ef9166
                      • Instruction Fuzzy Hash: 59F0B4B1A40204BFC700DF98DD49B9EBBBCFB44B25F10021AFD15E3280D7B4190487A1
                      APIs
                      • lstrlenA.KERNEL32(0045D014,00000001,00000000,00000000), ref: 0044F32E
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0044F34C
                      • lstrlenA.KERNEL32(0045D014), ref: 0044F357
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0044F371
                      • lstrlenA.KERNEL32(0045D014), ref: 0044F37C
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0044F396
                      • lstrcpy.KERNEL32(00000000,00465568), ref: 0044F3BE
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0044F3EC
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0044F422
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0044F454
                      • lstrlenA.KERNEL32(0077D5F8), ref: 0044F476
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044F506
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0044F52B
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0044F5E2
                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 0044F894
                      • lstrlenA.KERNEL32(00784CF0), ref: 0044F8C2
                      • lstrcpy.KERNEL32(00000000,00784CF0), ref: 0044F8EF
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0044F912
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044F966
                      • lstrcpy.KERNEL32(00000000,00784CF0), ref: 0044FA28
                      • lstrcpy.KERNEL32(00000000,00784CD0), ref: 0044FA58
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044FAB7
                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 0044FBD5
                      • lstrlenA.KERNEL32(00784D20), ref: 0044FC03
                      • lstrcpy.KERNEL32(00000000,00784D20), ref: 0044FC30
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0044FC53
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044FCA7
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen
                      • String ID: Mx$0Mx$ERROR$Hw$hw
                      • API String ID: 367037083-4192720129
                      • Opcode ID: 788f6d6130be4af97330da3e39f10c5e292c2e1141f5830ad90edc0e569626e5
                      • Instruction ID: 7a029405106a910edb895be738f2421a5c8aa1a0bfbbf53c850caedadf27e801
                      • Opcode Fuzzy Hash: 788f6d6130be4af97330da3e39f10c5e292c2e1141f5830ad90edc0e569626e5
                      • Instruction Fuzzy Hash: 4AA26D70A017028FE724DF25C948A1BB7E5AF45304F28957EE849CB362DB79DC0ACB59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1889 436b80-436ba4 call 432840 1892 436ba6-436bab 1889->1892 1893 436bb5-436bd7 call 434ae0 1889->1893 1892->1893 1894 436bad-436baf lstrcpy 1892->1894 1897 436bea-436bfa call 432840 1893->1897 1898 436bd9 1893->1898 1894->1893 1902 436c08-436c35 InternetOpenA StrCmpCA 1897->1902 1903 436bfc-436c02 lstrcpy 1897->1903 1899 436be0-436be8 1898->1899 1899->1897 1899->1899 1904 436c37 1902->1904 1905 436c3a-436c3c 1902->1905 1903->1902 1904->1905 1906 436c42-436c62 InternetConnectA 1905->1906 1907 436de8-436dfb call 432840 1905->1907 1908 436de1-436de2 InternetCloseHandle 1906->1908 1909 436c68-436c9d HttpOpenRequestA 1906->1909 1916 436e09-436e20 call 432930 * 2 1907->1916 1917 436dfd-436dff 1907->1917 1908->1907 1911 436ca3-436ca5 1909->1911 1912 436dd4-436dde InternetCloseHandle 1909->1912 1914 436ca7-436cb7 InternetSetOptionA 1911->1914 1915 436cbd-436ced HttpSendRequestA HttpQueryInfoA 1911->1915 1912->1908 1914->1915 1918 436d14-436d24 call 453d30 1915->1918 1919 436cef-436d13 call 457210 call 432930 * 2 1915->1919 1917->1916 1920 436e01-436e03 lstrcpy 1917->1920 1918->1919 1930 436d26-436d28 1918->1930 1920->1916 1931 436d2e-436d47 InternetReadFile 1930->1931 1932 436dcd-436dce InternetCloseHandle 1930->1932 1931->1932 1934 436d4d 1931->1934 1932->1912 1936 436d50-436d55 1934->1936 1936->1932 1938 436d57-436d7d call 457340 1936->1938 1941 436d84-436d91 call 432840 1938->1941 1942 436d7f call 432930 1938->1942 1946 436d93-436d97 1941->1946 1947 436da1-436dcb call 432930 InternetReadFile 1941->1947 1942->1941 1946->1947 1948 436d99-436d9b lstrcpy 1946->1948 1947->1932 1947->1936 1948->1947
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 00436BAF
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00436C02
                      • InternetOpenA.WININET(0045D014,00000001,00000000,00000000,00000000), ref: 00436C15
                      • StrCmpCA.SHLWAPI(?,00784E70), ref: 00436C2D
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00436C55
                      • HttpOpenRequestA.WININET(00000000,GET,?,007863E8,00000000,00000000,-00400100,00000000), ref: 00436C90
                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00436CB7
                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00436CC6
                      • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00436CE5
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00436D3F
                      • lstrcpy.KERNEL32(00000000,?), ref: 00436D9B
                      • InternetReadFile.WININET(?,00000000,000007CF,?), ref: 00436DBD
                      • InternetCloseHandle.WININET(00000000), ref: 00436DCE
                      • InternetCloseHandle.WININET(?), ref: 00436DD8
                      • InternetCloseHandle.WININET(00000000), ref: 00436DE2
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00436E03
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$lstrcpy$CloseHandleHttp$FileOpenReadRequest$ConnectInfoOptionQuerySend
                      • String ID: ERROR$GET$pNx$cx
                      • API String ID: 3687753495-2950988410
                      • Opcode ID: 730c73fa37efddb8551791e9da4cbf075fc0f4dc1450efb8c61ffae4fe5d6656
                      • Instruction ID: bafb257537027f8c77b59fe4ae1f36180c3c9472e798d3197de3e2c40aa66feb
                      • Opcode Fuzzy Hash: 730c73fa37efddb8551791e9da4cbf075fc0f4dc1450efb8c61ffae4fe5d6656
                      • Instruction Fuzzy Hash: 7F81A571A01216AFDB20DFA4DC45FAFB7B9AF48704F115159FD04E7290DBB4AD048BA8

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1951 4526e0-452723 GetWindowsDirectoryA 1952 452725 1951->1952 1953 45272c-45278a GetVolumeInformationA 1951->1953 1952->1953 1954 45278c-452792 1953->1954 1955 452794-4527a7 1954->1955 1956 4527a9-4527c0 GetProcessHeap HeapAlloc 1954->1956 1955->1954 1957 4527c6-4527e4 wsprintfA 1956->1957 1958 4527c2-4527c4 1956->1958 1959 4527fb-452812 call 457210 1957->1959 1958->1959
                      APIs
                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,0077B2A0), ref: 0045271B
                      • GetVolumeInformationA.KERNELBASE(00000000,00000000,00000000,0045A470,00000000,00000000,00000000,00000000,?,0077B2A0), ref: 0045274C
                      • GetProcessHeap.KERNEL32(00000000,00000104,?,0077B2A0), ref: 004527AF
                      • HeapAlloc.KERNEL32(00000000,?,0077B2A0), ref: 004527B6
                      • wsprintfA.USER32 ref: 004527DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowswsprintf
                      • String ID: :\$@]x$C
                      • API String ID: 1325379522-741086061
                      • Opcode ID: decf7cce3ee897aeaf8b3d0ff9ea8bfa8d2b1ccf728213c500f576e9afcb829e
                      • Instruction ID: 72c49e7ea9852e2e29fd79261d973124259335fc5aff76a7d7196bf5144c8d0c
                      • Opcode Fuzzy Hash: decf7cce3ee897aeaf8b3d0ff9ea8bfa8d2b1ccf728213c500f576e9afcb829e
                      • Instruction Fuzzy Hash: FE3183B19082099FCB14CFB89A859EFBFBCFF5D741F00016EE905E7251E2748A048BA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1962 452820-45284e GetProcessHeap HeapAlloc call 4528b0 1965 452850-452859 1962->1965 1966 45285a-452879 RegOpenKeyExA 1962->1966 1967 452892-4528a2 RegCloseKey 1966->1967 1968 45287b-45288c RegQueryValueExA 1966->1968 1968->1967
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 00452835
                      • HeapAlloc.KERNEL32(00000000), ref: 0045283C
                        • Part of subcall function 004528B0: GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 004528C5
                        • Part of subcall function 004528B0: HeapAlloc.KERNEL32(00000000), ref: 004528CC
                        • Part of subcall function 004528B0: RegOpenKeyExA.KERNELBASE(80000002,007811A8,00000000,00020119,00452849), ref: 004528EB
                        • Part of subcall function 004528B0: RegQueryValueExA.KERNELBASE(00452849,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00452905
                        • Part of subcall function 004528B0: RegCloseKey.ADVAPI32(00452849), ref: 0045290F
                      • RegOpenKeyExA.KERNELBASE(80000002,007811A8,00000000,00020119,?), ref: 00452871
                      • RegQueryValueExA.KERNELBASE(?,00785C68,00000000,00000000,00000000,000000FF), ref: 0045288C
                      • RegCloseKey.ADVAPI32(?), ref: 00452896
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID: Windows 11$h\x
                      • API String ID: 3466090806-270188567
                      • Opcode ID: 96921e1bd0f325db4e34b28a8322b9aad01006147b029291ed800bf0ff642f82
                      • Instruction ID: 6a061fdd5d25150d8484750cf700cb016cb73cd340b87837edc2d31723cdad42
                      • Opcode Fuzzy Hash: 96921e1bd0f325db4e34b28a8322b9aad01006147b029291ed800bf0ff642f82
                      • Instruction Fuzzy Hash: 5C01A271640208BFDB10ABB4ED49EAA776EEB44316F00425AFE08D3251EAF49D4487A4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1969 435570-4355cf GetProcessHeap RtlAllocateHeap InternetOpenA InternetOpenUrlA 1970 4355d1-4355d2 1969->1970 1971 435627-43563d InternetCloseHandle * 2 1969->1971 1972 4355d8-4355f7 InternetReadFile 1970->1972 1973 4356a7-4356b1 1971->1973 1974 43563f-43564d 1971->1974 1975 435623-435626 1972->1975 1976 4355f9 1972->1976 1977 435677-43567c 1974->1977 1978 43564f-435652 1974->1978 1975->1971 1979 435600-43561d KiUserExceptionDispatcher 1976->1979 1977->1973 1981 43567e-435681 1977->1981 1978->1977 1980 435654-43565a 1978->1980 1979->1979 1982 43561f-435621 1979->1982 1983 435661-435672 1980->1983 1984 43565c 1980->1984 1981->1973 1985 435683-435689 1981->1985 1982->1972 1982->1975 1983->1977 1988 435674 1983->1988 1984->1983 1986 435691-4356a2 1985->1986 1987 43568b 1985->1987 1986->1973 1989 4356a4 1986->1989 1987->1986 1988->1977 1989->1973
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00435589
                      • RtlAllocateHeap.NTDLL(00000000), ref: 00435590
                      • InternetOpenA.WININET(0045D014,00000000,00000000,00000000,00000000), ref: 004355A6
                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,04000100,00000000), ref: 004355C1
                      • InternetReadFile.WININET(?,?,00000400,00000001), ref: 004355EC
                      • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 00435611
                      • InternetCloseHandle.WININET(?), ref: 0043562B
                      • InternetCloseHandle.WININET(00000000), ref: 00435632
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandleHeapOpen$AllocateDispatcherExceptionFileProcessReadUser
                      • String ID:
                      • API String ID: 1337183907-0
                      • Opcode ID: 7b24abdf749a2e6681fd79277e067d8b53e3e900d48125aa6b1211a03b6468e5
                      • Instruction ID: 1429e57c53cbe0188c242031960b897ed5fdc72c72a5f9de2f604f2c0303a84a
                      • Opcode Fuzzy Hash: 7b24abdf749a2e6681fd79277e067d8b53e3e900d48125aa6b1211a03b6468e5
                      • Instruction Fuzzy Hash: 9641AF70A00204EFDB24CF54CC49F9AB7B9FF48314F2481AAE9089B390D7B59941CF98

                      Control-flow Graph

                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc
                      • String ID:
                      • API String ID: 190572456-0
                      • Opcode ID: e1c0ce45e7d68ba44ae2ba985a9c4f4bb25a597e00a718af582eef83e82a8ad1
                      • Instruction ID: d323fce483589d93f3d5e94df3a6c71e700f23d2a55b1daa824cdb83d57f5f72
                      • Opcode Fuzzy Hash: e1c0ce45e7d68ba44ae2ba985a9c4f4bb25a597e00a718af582eef83e82a8ad1
                      • Instruction Fuzzy Hash: 6A316031A006069BCB21BFB5CD8579F77AAAF04745F15112BE90197262EBB8EC098798

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2042 434ae0-434aee 2043 434af0-434af5 2042->2043 2043->2043 2044 434af7-434b68 ??2@YAPAXI@Z * 3 lstrlenA InternetCrackUrlA call 432930 2043->2044
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(00000800,0077E168), ref: 00434B17
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00434B21
                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00434B2B
                      • lstrlenA.KERNEL32(?,00000000,?), ref: 00434B3F
                      • InternetCrackUrlA.WININET(?,00000000), ref: 00434B47
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ??2@$CrackInternetlstrlen
                      • String ID: <
                      • API String ID: 1683549937-4251816714
                      • Opcode ID: 7d79dfcc94c23489c9ec4f2840e86d45d95760407cd38a8bfbebd8d522d79c2d
                      • Instruction ID: 13537e3506206941062e2532582cbbb34a7d2de0ba687efa30889962415c9a44
                      • Opcode Fuzzy Hash: 7d79dfcc94c23489c9ec4f2840e86d45d95760407cd38a8bfbebd8d522d79c2d
                      • Instruction Fuzzy Hash: 8E01E971D00218AFDB14DFA9EC45B9EBBB9EB48364F00812AF954E7390EBB459058FD4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2047 4528b0-4528f3 GetProcessHeap HeapAlloc RegOpenKeyExA 2048 4528f5-452905 RegQueryValueExA 2047->2048 2049 45290b-45291e RegCloseKey 2047->2049 2048->2049 2050 452931-452934 2049->2050 2051 452920-45292f 2049->2051 2051->2050 2051->2051
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000), ref: 004528C5
                      • HeapAlloc.KERNEL32(00000000), ref: 004528CC
                      • RegOpenKeyExA.KERNELBASE(80000002,007811A8,00000000,00020119,00452849), ref: 004528EB
                      • RegQueryValueExA.KERNELBASE(00452849,CurrentBuildNumber,00000000,00000000,00000000,000000FF), ref: 00452905
                      • RegCloseKey.ADVAPI32(00452849), ref: 0045290F
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID: CurrentBuildNumber
                      • API String ID: 3466090806-1022791448
                      • Opcode ID: 882e6b74894ca53474d0d5415b659c264666480bd255975276e72c5e66035363
                      • Instruction ID: e867ecfba307e539f478f58fab58629351a4aa64012b767e212b694f9aea2ba6
                      • Opcode Fuzzy Hash: 882e6b74894ca53474d0d5415b659c264666480bd255975276e72c5e66035363
                      • Instruction Fuzzy Hash: 2401BCB5600218BFE710CBA0DD59EAB7BADEB49742F20019AFE45D7341EAB0590887A0

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2052 44efe0-44f005 call 432840 2055 44f007-44f00f 2052->2055 2056 44f019-44f01d call 436b80 2052->2056 2055->2056 2057 44f011-44f013 lstrcpy 2055->2057 2059 44f022-44f038 StrCmpCA 2056->2059 2057->2056 2060 44f061-44f068 call 432930 2059->2060 2061 44f03a-44f052 call 432930 call 432840 2059->2061 2066 44f070-44f078 2060->2066 2071 44f054-44f05c 2061->2071 2072 44f095-44f0f0 call 432930 * 10 2061->2072 2066->2066 2068 44f07a-44f087 call 432840 2066->2068 2068->2072 2076 44f089 2068->2076 2071->2072 2075 44f05e-44f05f 2071->2075 2078 44f08e-44f08f lstrcpy 2075->2078 2076->2078 2078->2072
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044F013
                      • StrCmpCA.SHLWAPI(?,ERROR,?,?,?,?,?,?,?,?,?,0044F54D), ref: 0044F02E
                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 0044F08F
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID: ERROR
                      • API String ID: 3722407311-2861137601
                      • Opcode ID: 0723278c425aa61c7e7c84b1bdb9fb180503e95b4d4e8332d1dade02dff3c89d
                      • Instruction ID: 54e09f1803d018b2445a021da9fe3f0c5fdf371a514046cf36c41aaf8d67e512
                      • Opcode Fuzzy Hash: 0723278c425aa61c7e7c84b1bdb9fb180503e95b4d4e8332d1dade02dff3c89d
                      • Instruction Fuzzy Hash: 762186707102069FDB24FF7ACD46B9F37A4AF08308F11552AB9C9DB222DA78DC058798
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044EF62
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID:
                      • API String ID: 3722407311-0
                      • Opcode ID: ba9e2da1e6d0988f9b43608525736485085145dc2e0230de9c15da476799bb26
                      • Instruction ID: b76bb9f94d291b7d5447c82afba9110297da2cc3df97b956f03fcfe1f58f06b5
                      • Opcode Fuzzy Hash: ba9e2da1e6d0988f9b43608525736485085145dc2e0230de9c15da476799bb26
                      • Instruction Fuzzy Hash: BC1148703101049BDB24FF3ADD42B9F37A4AF08304F81502DB9C88B262DA78EC058795
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 0043602F
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00436082
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 004360B5
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 004360E5
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00436120
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00436153
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00436163
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$InternetOpen
                      • String ID: "$------$TPF$TPF$TPF$pNx$cx
                      • API String ID: 2041821634-2282460670
                      • Opcode ID: 26148170fbe89427b287d00f3270076af9c3522677aad0035c92ee4b2e46168f
                      • Instruction ID: 229b6fc3273b03ba581fa5aecc35c7e3139d31656ebf13b10f80bb1d39702ef2
                      • Opcode Fuzzy Hash: 26148170fbe89427b287d00f3270076af9c3522677aad0035c92ee4b2e46168f
                      • Instruction Fuzzy Hash: 13528271E00616AFCB10AFB5DD49B9F77B9AF08304F15A12AF904A7251DB78DC05CBA8
                      APIs
                      • CreateDesktopA.USER32(?), ref: 00439888
                      • memset.MSVCRT ref: 004398A6
                      • lstrcatA.KERNEL32(?,?), ref: 004398BB
                      • lstrcatA.KERNEL32(?,?), ref: 004398CD
                      • lstrcatA.KERNEL32(?,00465128), ref: 004398DD
                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 0043991A
                      • lstrcpy.KERNEL32(00000000,?), ref: 00439950
                      • StrStrA.SHLWAPI(?,00786280), ref: 00439965
                      • lstrcpyn.KERNEL32(006693D0,?,00000000), ref: 00439982
                      • lstrlenA.KERNEL32(?), ref: 00439996
                      • wsprintfA.USER32 ref: 004399A6
                      • lstrcpy.KERNEL32(?,?), ref: 004399BD
                      • memset.MSVCRT ref: 004399D3
                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,00000000), ref: 00439A32
                      • Sleep.KERNEL32(00001388), ref: 00439A41
                      • CloseDesktop.USER32(?), ref: 00439A81
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$CreateDesktoplstrcpymemset$CloseFolderPathProcessSleeplstrcpynlstrlenwsprintf
                      • String ID: %s%s$D
                      • API String ID: 3850938096-433275411
                      • Opcode ID: a6c7a96c7a42c3849ad73aeb812acd6b6987676e1b090123542276fcf4777f30
                      • Instruction ID: fd705f182cbd1bab056a11891010fb8b2fa6fe35f8ce33700d66ba06c0d2b798
                      • Opcode Fuzzy Hash: a6c7a96c7a42c3849ad73aeb812acd6b6987676e1b090123542276fcf4777f30
                      • Instruction Fuzzy Hash: 8D6160B1604340AFD720EF74DC45F9F77E9AF88704F10591EFA898B291DBB499048BA6
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 004546D9
                      • Process32First.KERNEL32(00000000,00000128), ref: 004546E9
                      • Process32Next.KERNEL32(00000000,00000128), ref: 004546FB
                      • StrCmpCA.SHLWAPI(?,?), ref: 0045470D
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00454722
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00454731
                      • CloseHandle.KERNEL32(00000000), ref: 00454738
                      • Process32Next.KERNEL32(00000000,00000128), ref: 00454746
                      • CloseHandle.KERNEL32(00000000), ref: 00454751
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                      • String ID:
                      • API String ID: 3836391474-0
                      • Opcode ID: d9ecc4ac324f6e7f609c4db14a9eba4406e947378a3a61c341560ed928980982
                      • Instruction ID: 1164943a64ce745c089c44a94c369ef23f9a7e1944cc41014f84a35f4dd72b14
                      • Opcode Fuzzy Hash: d9ecc4ac324f6e7f609c4db14a9eba4406e947378a3a61c341560ed928980982
                      • Instruction Fuzzy Hash: 3401AD31601114ABE7205B70EC88FFB377DAB89B42F001199FD05DA281EFB899888B74
                      APIs
                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 0043769E
                      • HeapAlloc.KERNEL32(00000000), ref: 004376A5
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004376CD
                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004376ED
                      • LocalFree.KERNEL32(?), ref: 004376F7
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                      • String ID:
                      • API String ID: 3657800372-0
                      • Opcode ID: 2d2d288d40c6510c71c143a58fb9bdab208a6e53a29a82d84f0a3aaff3da296a
                      • Instruction ID: 771aa138cd378c3788b2b1cd14c5ed79ac9a0aa261bc039ac5d71f7741158649
                      • Opcode Fuzzy Hash: 2d2d288d40c6510c71c143a58fb9bdab208a6e53a29a82d84f0a3aaff3da296a
                      • Instruction Fuzzy Hash: 2B01C075B40218BBEB10DBA49C4AFAA777DEB44B15F104155FE05AB2C0D6B1A9008BA4
                      APIs
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 00453E45
                      • lstrcpy.KERNEL32(00000000,00779E38), ref: 00453E6F
                      • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,00434D2A,?,00000014), ref: 00453E79
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$SystemTime
                      • String ID: *MC
                      • API String ID: 684065273-1620654918
                      • Opcode ID: abad9ee80405078259a691631ae5a65e02d9698c88f4663ef63a29a9a48775e9
                      • Instruction ID: 91cda76363eff293731b34c0e4f5a71725fea1271b8d8ac1c2b0ca60fcb5b2e2
                      • Opcode Fuzzy Hash: abad9ee80405078259a691631ae5a65e02d9698c88f4663ef63a29a9a48775e9
                      • Instruction Fuzzy Hash: 9041AE71A012058FDB24CF29C884666BBE5FF09356F1880AEEC45DB3A2C77ADD46CB54
                      APIs
                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,?,?,?,?,?), ref: 004540AD
                      • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 004540BC
                      • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 004540C3
                      • CryptBinaryToStringA.CRYPT32(?,?,40000001,?,?,?,?,?,?), ref: 004540F3
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: BinaryCryptHeapString$AllocProcess
                      • String ID:
                      • API String ID: 3939037734-0
                      • Opcode ID: 359bed91a60ab89599370cb552ef05a7f68d65992286bca3d297e82372d112a4
                      • Instruction ID: daefd2cf4335f7a2741c03f0c1161d754ed67625ba45aac96ac58d7e0dc0786a
                      • Opcode Fuzzy Hash: 359bed91a60ab89599370cb552ef05a7f68d65992286bca3d297e82372d112a4
                      • Instruction Fuzzy Hash: 6F011E70600205BBDB109FB5EC45B6B7BADEF85715F108159FE0987340DA7199408B64
                      APIs
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00439BFF
                      • LocalAlloc.KERNEL32(00000040,?), ref: 00439C13
                      • memcpy.MSVCRT(00000000,?), ref: 00439C2A
                      • LocalFree.KERNEL32(?), ref: 00439C37
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                      • String ID:
                      • API String ID: 3243516280-0
                      • Opcode ID: f7ea62f7ef54d6651e8bbae49f2630da07bb58f40e46da107ff9a65f4f7de5ea
                      • Instruction ID: 33449628f0688817ddb1cb8341c05a192ba19618e7ee0ecc459495480836427e
                      • Opcode Fuzzy Hash: f7ea62f7ef54d6651e8bbae49f2630da07bb58f40e46da107ff9a65f4f7de5ea
                      • Instruction Fuzzy Hash: 2401FB75A41309ABD7109BA4DC45BAEB779EB48B01F104155EE04AB380D7B49E00CBE4
                      APIs
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00439B9B
                      • LocalAlloc.KERNEL32(00000040,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00439BAA
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00439BC1
                      • LocalFree.KERNEL32(?,?,00000000,00000001,00000000,?,00000000,00000000,?,00000000,00000001,00000000,?,00000000,00000000), ref: 00439BD0
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: BinaryCryptLocalString$AllocFree
                      • String ID:
                      • API String ID: 4291131564-0
                      • Opcode ID: e78c0b603b84c466e8be6472cfcf917b98e48be133f153c459ecfa9772685a37
                      • Instruction ID: 6761a3420a575937b26a9f7cd3fc9012e29ee91d20ce107effb3ba592d9b8d30
                      • Opcode Fuzzy Hash: e78c0b603b84c466e8be6472cfcf917b98e48be133f153c459ecfa9772685a37
                      • Instruction Fuzzy Hash: BEF0BD703443126BE7305F65AC49F57BBADEB05B51F241415FE49EA2C0D7F49C40CAA4
                      APIs
                      • memset.MSVCRT ref: 0043108A
                        • Part of subcall function 00431000: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00431015
                        • Part of subcall function 00431000: HeapAlloc.KERNEL32(00000000), ref: 0043101C
                        • Part of subcall function 00431000: RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00431039
                        • Part of subcall function 00431000: RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00431053
                        • Part of subcall function 00431000: RegCloseKey.ADVAPI32(?), ref: 0043105D
                      • lstrcatA.KERNEL32(?,00000000), ref: 004310A0
                      • lstrlenA.KERNEL32(?), ref: 004310AD
                      • lstrcatA.KERNEL32(?,.keys), ref: 004310C8
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 004310FF
                      • lstrlenA.KERNEL32(00784F90), ref: 0043110D
                      • lstrcpy.KERNEL32(00000000,?), ref: 00431131
                      • lstrcatA.KERNEL32(00000000,00784F90), ref: 00431139
                      • lstrlenA.KERNEL32(\Monero\wallet.keys), ref: 00431144
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00431168
                      • lstrcatA.KERNEL32(00000000,\Monero\wallet.keys), ref: 00431174
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043119A
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 004311DF
                      • lstrlenA.KERNEL32(00785EF0), ref: 004311EE
                      • lstrcpy.KERNEL32(00000000,?), ref: 00431215
                      • lstrcatA.KERNEL32(00000000,?), ref: 0043121D
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00431258
                      • lstrcatA.KERNEL32(00000000), ref: 00431265
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043128C
                      • CopyFileA.KERNEL32(?,?,00000001), ref: 004312B5
                      • lstrcpy.KERNEL32(00000000,?), ref: 004312E1
                      • lstrcpy.KERNEL32(00000000,?), ref: 0043131D
                        • Part of subcall function 0044EF30: lstrcpy.KERNEL32(00000000,?), ref: 0044EF62
                      • DeleteFileA.KERNEL32(?), ref: 00431351
                      • memset.MSVCRT ref: 0043136E
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrcat$lstrlen$FileHeapmemset$AllocCloseCopyDeleteOpenProcessQueryValue
                      • String ID: .keys$\Monero\wallet.keys
                      • API String ID: 2734118222-3586502688
                      • Opcode ID: b2b1c5d6ed47a91fcce780565bdb8be51b2cbb8eea535cda52f43a2ab8b9cbc4
                      • Instruction ID: 23dd367e18bd348507d94b39b63ee61720198f1f1ffa95cdef23ef8dce1d32cb
                      • Opcode Fuzzy Hash: b2b1c5d6ed47a91fcce780565bdb8be51b2cbb8eea535cda52f43a2ab8b9cbc4
                      • Instruction Fuzzy Hash: 71A19271A016059BCB20EFB5DD49B9FB7B9AF0C304F14212AF945E7261DB78DD018BA8
                      APIs
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0045182F
                      • lstrlenA.KERNEL32(00773048,00000000,00000000,?,?,00451B61), ref: 00451840
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00451867
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00451872
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004518A1
                      • lstrlenA.KERNEL32(00465568,?,?,00451B61), ref: 004518B3
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004518D4
                      • lstrcatA.KERNEL32(00000000,00465568,?,?,00451B61), ref: 004518E0
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0045190F
                      • lstrlenA.KERNEL32(00774080,?,?,00451B61), ref: 00451925
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0045194C
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00451957
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00451986
                      • lstrlenA.KERNEL32(00465568,?,?,00451B61), ref: 00451998
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004519B9
                      • lstrcatA.KERNEL32(00000000,00465568,?,?,00451B61), ref: 004519C5
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004519F4
                      • lstrlenA.KERNEL32(00774090,?,?,00451B61), ref: 00451A0A
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00451A31
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00451A3C
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00451A6B
                      • lstrlenA.KERNEL32(007740A0,?,?,00451B61), ref: 00451A81
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00451AA8
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00451AB3
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00451AE2
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrcatlstrlen
                      • String ID: H0w
                      • API String ID: 1049500425-2431637254
                      • Opcode ID: 2066cab9ceb1ce207fb9974d5a907097f1294adc25b991d1ebb9f557dda693c8
                      • Instruction ID: 5a93badc744979909f2ff1dbd76c4107b980b1cd2857351a58c1bf5bb1e2f0d6
                      • Opcode Fuzzy Hash: 2066cab9ceb1ce207fb9974d5a907097f1294adc25b991d1ebb9f557dda693c8
                      • Instruction Fuzzy Hash: 0A911FB06017029BD720AFB5CD88B17B7E9AF04345F14552AED85C3362DBB8DC45CB64
                      APIs
                        • Part of subcall function 004390F0: InternetOpenA.WININET(0045D014,00000001,00000000,00000000,00000000), ref: 0043910F
                        • Part of subcall function 004390F0: InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 0043912C
                        • Part of subcall function 004390F0: InternetCloseHandle.WININET(00000000), ref: 00439139
                        • Part of subcall function 004390F0: strlen.MSVCRT ref: 00439155
                      • strlen.MSVCRT ref: 00439311
                      • strlen.MSVCRT ref: 0043932A
                        • Part of subcall function 00447EB0: memchr.MSVCRT ref: 00447EEF
                        • Part of subcall function 00447EB0: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00447F09
                        • Part of subcall function 00447EB0: memchr.MSVCRT ref: 00447F28
                        • Part of subcall function 004389B0: std::_Xinvalid_argument.LIBCPMT ref: 004389C6
                      • memset.MSVCRT ref: 00439371
                      • lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 0043938C
                      • lstrcatA.KERNEL32(?,00000000), ref: 004393A2
                      • strlen.MSVCRT ref: 004393C9
                      • strlen.MSVCRT ref: 00439416
                      • memcmp.MSVCRT(?,0045D014,?), ref: 0043943B
                      • memset.MSVCRT ref: 00439562
                      • lstrcatA.KERNEL32(?,cookies), ref: 00439577
                      • lstrcatA.KERNEL32(?,00461D5C), ref: 00439589
                      • lstrcatA.KERNEL32(?,?), ref: 0043959A
                      • lstrcatA.KERNEL32(?,00465160), ref: 004395AC
                      • lstrcatA.KERNEL32(?,?), ref: 004395BD
                      • lstrcatA.KERNEL32(?,.txt), ref: 004395CF
                      • lstrlenA.KERNEL32(?), ref: 004395E6
                      • lstrlenA.KERNEL32(?), ref: 0043960B
                      • lstrcpy.KERNEL32(00000000,?), ref: 00439644
                      • memset.MSVCRT ref: 0043968C
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$strlen$Internetmemset$Openlstrlenmemchrmemcmp$CloseHandleXinvalid_argumentlstrcpystd::_
                      • String ID: .txt$/devtools$cookies$localhost$ws://localhost:9229
                      • API String ID: 2819545660-3542011879
                      • Opcode ID: 91445381a8f1f58ec32cca356a048261c257e3150fc2dc2a2ff5f0e741456594
                      • Instruction ID: cd29f3e00a1667f6d7fa468775c73929be31ad2be4605e62e66ffd4da4bbd84d
                      • Opcode Fuzzy Hash: 91445381a8f1f58ec32cca356a048261c257e3150fc2dc2a2ff5f0e741456594
                      • Instruction Fuzzy Hash: 94E12771E00218EFDF10DFA8C981ADEBBB5BF48304F10446AE949A7251DB789E45CF95
                      APIs
                      • StrCmpCA.SHLWAPI(?,block,?,?,?,?,0045081F), ref: 00448D1A
                      • ExitProcess.KERNEL32 ref: 00448D27
                      • strtok_s.MSVCRT ref: 00448D39
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcessstrtok_s
                      • String ID: block
                      • API String ID: 3407564107-2199623458
                      • Opcode ID: 0213264bc5350d64c011fa190c0cf845a868186931738da3ac497f0be997e741
                      • Instruction ID: 1f278704d8d5292e79067d79e306eb82efa3f3a05585b26dd299252a879e01dc
                      • Opcode Fuzzy Hash: 0213264bc5350d64c011fa190c0cf845a868186931738da3ac497f0be997e741
                      • Instruction Fuzzy Hash: 1B517FB0604701DFDB209F79DC84A2FB7FAAB08704B10582FE492C2660DBBDD4458B6A
                      APIs
                      • GetEnvironmentVariableA.KERNEL32(00784D10,00669BD8,0000FFFF), ref: 0043A086
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0043A0B3
                      • lstrlenA.KERNEL32(00669BD8), ref: 0043A0C0
                      • lstrcpy.KERNEL32(00000000,00669BD8), ref: 0043A0EA
                      • lstrlenA.KERNEL32(00465214), ref: 0043A0F5
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043A112
                      • lstrcatA.KERNEL32(00000000,00465214), ref: 0043A11E
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043A144
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 0043A14F
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043A174
                      • SetEnvironmentVariableA.KERNEL32(00784D10,00000000), ref: 0043A18F
                      • LoadLibraryA.KERNEL32(007854E0), ref: 0043A1A3
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                      • String ID: H^x$p]x$Tx
                      • API String ID: 2929475105-3771163451
                      • Opcode ID: b09bbb5f6f25fdbb1480005879111a8cfdfd5c03900297e6acfd9bcfc552c666
                      • Instruction ID: d4f7573c64c627005194a4abd03733b9b7b815d8d9d3e41c3137bc5e1dbf59dd
                      • Opcode Fuzzy Hash: b09bbb5f6f25fdbb1480005879111a8cfdfd5c03900297e6acfd9bcfc552c666
                      • Instruction Fuzzy Hash: 2191F671640A009FCB309FB4DC44A6737B6EB4D708F51225AE985873A1EFFACC418B96
                      APIs
                      • InternetOpenA.WININET(0045D014,00000001,00000000,00000000,00000000), ref: 0043910F
                      • InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 0043912C
                      • InternetCloseHandle.WININET(00000000), ref: 00439139
                      • strlen.MSVCRT ref: 00439155
                      • InternetReadFile.WININET(?,?,?,00000000), ref: 00439196
                      • InternetReadFile.WININET(00000000,?,00001000,?), ref: 004391C7
                      • InternetCloseHandle.WININET(00000000), ref: 004391D2
                      • InternetCloseHandle.WININET(00000000), ref: 004391D9
                      • strlen.MSVCRT ref: 004391EA
                      • strlen.MSVCRT ref: 0043921D
                      • strlen.MSVCRT ref: 0043925E
                        • Part of subcall function 00447EB0: memchr.MSVCRT ref: 00447EEF
                        • Part of subcall function 00447EB0: memcmp.MSVCRT(00000000,?,?,?,"webSocketDebuggerUrl":,00000000), ref: 00447F09
                        • Part of subcall function 00447EB0: memchr.MSVCRT ref: 00447F28
                      • strlen.MSVCRT ref: 0043927C
                        • Part of subcall function 004389B0: std::_Xinvalid_argument.LIBCPMT ref: 004389C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$strlen$CloseHandle$FileOpenReadmemchr$Xinvalid_argumentmemcmpstd::_
                      • String ID: "webSocketDebuggerUrl":$"ws://$http://localhost:9229/json
                      • API String ID: 4166274400-2144369209
                      • Opcode ID: f0fce8998327063da73c3e88e72d274338ea02cd7ea570343b4a0b17c0e0387d
                      • Instruction ID: 4ae5dab478e326fb003737944477cc2453b5c24490135caa353a153725085bf7
                      • Opcode Fuzzy Hash: f0fce8998327063da73c3e88e72d274338ea02cd7ea570343b4a0b17c0e0387d
                      • Instruction Fuzzy Hash: AC51E671A00205ABEB20DFA4DC45BDEFBB9DF48711F14016AF904A32C1DBF8A94587A9
                      APIs
                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00437745
                      • RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0043778A
                      • strlen.MSVCRT ref: 004377BE
                      • StrStrA.SHLWAPI(?,Password), ref: 004377F8
                      • strlen.MSVCRT ref: 0043788D
                        • Part of subcall function 00437690: GetProcessHeap.KERNEL32(00000008,00000400), ref: 0043769E
                        • Part of subcall function 00437690: HeapAlloc.KERNEL32(00000000), ref: 004376A5
                        • Part of subcall function 00437690: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004376CD
                        • Part of subcall function 00437690: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000400,00000000,00000000), ref: 004376ED
                        • Part of subcall function 00437690: LocalFree.KERNEL32(?), ref: 004376F7
                      • strcpy_s.MSVCRT ref: 00437821
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0043782C
                      • HeapFree.KERNEL32(00000000), ref: 00437833
                      • strlen.MSVCRT ref: 00437840
                      • strcpy_s.MSVCRT ref: 0043786A
                      • strlen.MSVCRT ref: 004378B4
                      • RegEnumValueA.ADVAPI32(80000001,00000000,?,000000FF,00000000,00000003,?,?,80000001), ref: 00437975
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heapstrlen$EnumFreeProcessValuestrcpy_s$AllocByteCharCryptDataLocalMultiOpenUnprotectWide
                      • String ID: Password
                      • API String ID: 3893107980-3434357891
                      • Opcode ID: a26908241d33aca0e7bb3187e8534fa95a280b8316cd761affb289e61442244b
                      • Instruction ID: 1ed5a83821034beac9227d6d2f9972f300f4b3ce7fd59cf627c8f8018299a4cc
                      • Opcode Fuzzy Hash: a26908241d33aca0e7bb3187e8534fa95a280b8316cd761affb289e61442244b
                      • Instruction Fuzzy Hash: 60813DB1D0021DEFDB10DF95DC84ADEBBB9FF48300F10816AE509A7250EB359A85CBA5
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044F134
                      • lstrcpy.KERNEL32(00000000,?), ref: 0044F162
                      • StrCmpCA.SHLWAPI(00000000,ERROR,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F176
                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F185
                      • LocalAlloc.KERNEL32(00000040,00000001,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F1A3
                      • StrStrA.SHLWAPI(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F1D1
                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F1E4
                      • strtok.MSVCRT(00000001,?,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F1F6
                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0044F67A), ref: 0044F202
                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 0044F24F
                      • lstrcpy.KERNEL32(00000000,ERROR), ref: 0044F28F
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$AllocLocalstrtok
                      • String ID: ERROR
                      • API String ID: 2137491262-2861137601
                      • Opcode ID: eac128b9b8a01481538022ec69f778a4913285833d66112277eedddc5334c7f6
                      • Instruction ID: b43f4839b37d82c7327179aad7c2fdedaf11d818ee18bf6bb83534cd4ceed954
                      • Opcode Fuzzy Hash: eac128b9b8a01481538022ec69f778a4913285833d66112277eedddc5334c7f6
                      • Instruction Fuzzy Hash: C5510134A002019FEB20AF75CD49B6F77A9AF44308F05516AFD85DB321DBB8DC068B99
                      APIs
                      • lstrcpy.KERNEL32(00000000,?), ref: 00436A3F
                      • InternetOpenA.WININET(0045D014,00000001,00000000,00000000,00000000), ref: 00436A6C
                      • StrCmpCA.SHLWAPI(?,00784E70), ref: 00436A8A
                      • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,-00800100,00000000), ref: 00436AAA
                      • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00436AC8
                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00436AE1
                      • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00436B06
                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 00436B30
                      • CloseHandle.KERNEL32(00000000), ref: 00436B50
                      • InternetCloseHandle.WININET(00000000), ref: 00436B57
                      • InternetCloseHandle.WININET(?), ref: 00436B61
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$File$CloseHandle$OpenRead$CreateWritelstrcpy
                      • String ID: pNx
                      • API String ID: 2500263513-2610178759
                      • Opcode ID: db581b9f24211849c04f34418adf2d98f8a477646817917ddbcc90614b7e4cd3
                      • Instruction ID: 1a9bf177418976980685443b43498fb24ac09874b51affe771fdaf8027f990e2
                      • Opcode Fuzzy Hash: db581b9f24211849c04f34418adf2d98f8a477646817917ddbcc90614b7e4cd3
                      • Instruction Fuzzy Hash: 6D419171A00215BFDB20DF64DC49FAF7769AB48704F109559FA05E7280DFB4AD408BA8
                      APIs
                      • lstrcpy.KERNEL32(00000000,0045D014), ref: 0043BD0F
                      • lstrlenA.KERNEL32(00000000), ref: 0043BD42
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043BD6C
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 0043BD74
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0043BD9C
                      • lstrlenA.KERNEL32(0046509C), ref: 0043BE13
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy$lstrlen$lstrcat
                      • String ID:
                      • API String ID: 2500673778-0
                      • Opcode ID: d475e483f5bf2b73b7c51e9cd4cfc44a0482b604432b9fba547ef17cd7a5f943
                      • Instruction ID: ccecfaefad8f813ae5268edaadfccf779ce33b282ed2107eef1b536312744b9d
                      • Opcode Fuzzy Hash: d475e483f5bf2b73b7c51e9cd4cfc44a0482b604432b9fba547ef17cd7a5f943
                      • Instruction Fuzzy Hash: 46A17070A012058FCB24DF29C949B9FB7B5EF48304F25A06EEA4997361DB79DC42CB94
                      APIs
                      • strtok_s.MSVCRT ref: 00448263
                      • lstrlenA.KERNEL32(00000000), ref: 0044829C
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004482D3
                      • lstrlenA.KERNEL32(00000000), ref: 004482F0
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00448327
                      • lstrlenA.KERNEL32(00000000), ref: 00448344
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0044837B
                      • lstrlenA.KERNEL32(00000000), ref: 00448398
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004483C7
                      • lstrlenA.KERNEL32(00000000), ref: 004483E1
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00448410
                      • strtok_s.MSVCRT ref: 0044842A
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpylstrlen$strtok_s
                      • String ID:
                      • API String ID: 2211830134-0
                      • Opcode ID: cdb1834d3755ca3192bd02b04d35dde04af3b8f1ac7027e6b5c970d074174d26
                      • Instruction ID: b2a71dd744877abe991652a1fe097a0657f713a24a791b8b4cfbb3eef40d5c04
                      • Opcode Fuzzy Hash: cdb1834d3755ca3192bd02b04d35dde04af3b8f1ac7027e6b5c970d074174d26
                      • Instruction Fuzzy Hash: 6D515B716006129BEB14AF39D948A6FFBA8EF04340F11412AEC06DB345EB78ED51CBE4
                      APIs
                      • strtok_s.MSVCRT ref: 00448105
                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,0045093B), ref: 0044814B
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 0044817A
                      • StrCmpCA.SHLWAPI(00000000,00465204,?,?,?,?,?,0045093B), ref: 00448192
                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,0045093B), ref: 004481D0
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 004481FF
                      • strtok_s.MSVCRT ref: 0044820F
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpylstrlenstrtok_s
                      • String ID: ;E$fplugins
                      • API String ID: 3280532728-2780886424
                      • Opcode ID: 5f8ca72dc2c85fd2ba72ac0431b415c0539e924cace4f299be69d073b97c3263
                      • Instruction ID: 47944212d5ec410861e67973958fba10fd35a3707afe1b31d9e1cadedef84239
                      • Opcode Fuzzy Hash: 5f8ca72dc2c85fd2ba72ac0431b415c0539e924cace4f299be69d073b97c3263
                      • Instruction Fuzzy Hash: 0641BD71600606DFEB20EF68D944BAFBBB4EF44700F11415EE859D7254EB78D941CB94
                      APIs
                        • Part of subcall function 00437710: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 00437745
                        • Part of subcall function 00437710: RegEnumValueA.ADVAPI32(80000001,00000000,?,?,00000000,?,?,?,?,00000000,00020019,?), ref: 0043778A
                        • Part of subcall function 00437710: strlen.MSVCRT ref: 004377BE
                        • Part of subcall function 00437710: StrStrA.SHLWAPI(?,Password), ref: 004377F8
                        • Part of subcall function 00437710: strcpy_s.MSVCRT ref: 00437821
                        • Part of subcall function 00437710: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0043782C
                        • Part of subcall function 00437710: HeapFree.KERNEL32(00000000), ref: 00437833
                        • Part of subcall function 00437710: strlen.MSVCRT ref: 00437840
                      • lstrcatA.KERNEL32(00000000,0046509C), ref: 004379D0
                      • lstrcatA.KERNEL32(00000000,?), ref: 004379FD
                      • lstrcatA.KERNEL32(00000000, : ), ref: 00437A0F
                      • lstrcatA.KERNEL32(00000000,?), ref: 00437A30
                      • wsprintfA.USER32 ref: 00437A50
                      • lstrcpy.KERNEL32(00000000,?), ref: 00437A79
                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00437A87
                      • lstrcatA.KERNEL32(00000000,0046509C), ref: 00437AA0
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcat$Heapstrlen$EnumFreeOpenProcessValuelstrcpystrcpy_swsprintf
                      • String ID: :
                      • API String ID: 2460923012-3653984579
                      • Opcode ID: 8c8bfa87c39802fc8459a0769197e744d1330708d036ed29c17de43712132156
                      • Instruction ID: a6530a7621369871af83c073fa23dcec9cd960986e2371ad6001c063aeb5e466
                      • Opcode Fuzzy Hash: 8c8bfa87c39802fc8459a0769197e744d1330708d036ed29c17de43712132156
                      • Instruction Fuzzy Hash: 103199B2A04214DFCB20EB74DC44A6FB77AFB88310F24651AFA4593300DBB9E941D7A5
                      APIs
                      • memcmp.MSVCRT(?,v20,00000003), ref: 00439E64
                      • memcmp.MSVCRT(?,v10,00000003), ref: 00439EA2
                      • memset.MSVCRT ref: 00439ECF
                      • LocalAlloc.KERNEL32(00000040), ref: 00439F07
                        • Part of subcall function 00457210: lstrcpy.KERNEL32(00000000,ERROR), ref: 0045722E
                      • lstrcpy.KERNEL32(00000000,00465210), ref: 0043A012
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpymemcmp$AllocLocalmemset
                      • String ID: @$v10$v20
                      • API String ID: 3420379846-278772428
                      • Opcode ID: a706775e77a779eca552e22e681137413629fee2cc5ce64c2cec7a736a2df08c
                      • Instruction ID: 8f0d64cd166a792e819783dc7a8153b182a7a07afb10822192ebc82baf61dd33
                      • Opcode Fuzzy Hash: a706775e77a779eca552e22e681137413629fee2cc5ce64c2cec7a736a2df08c
                      • Instruction Fuzzy Hash: 1851F471A002099BDB10EF65CC41B9F77B4AF08318F15516AFD88EB252D7B8DD058BD9
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00431015
                      • HeapAlloc.KERNEL32(00000000), ref: 0043101C
                      • RegOpenKeyExA.ADVAPI32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,?), ref: 00431039
                      • RegQueryValueExA.ADVAPI32(?,wallet_path,00000000,00000000,00000000,000000FF), ref: 00431053
                      • RegCloseKey.ADVAPI32(?), ref: 0043105D
                      Strings
                      • SOFTWARE\monero-project\monero-core, xrefs: 0043102F
                      • wallet_path, xrefs: 0043104D
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                      • String ID: SOFTWARE\monero-project\monero-core$wallet_path
                      • API String ID: 3466090806-4244082812
                      • Opcode ID: d89f6d8c0d484a710791412b10e9a9442fbf45bc623bae427fb81203a54f021f
                      • Instruction ID: 512b8a75151fee0da95c2bd0d95a479b7955b302943193765be6b18ca067377d
                      • Opcode Fuzzy Hash: d89f6d8c0d484a710791412b10e9a9442fbf45bc623bae427fb81203a54f021f
                      • Instruction Fuzzy Hash: 6BF09075640309BFD7009BA09D4EFAB7B3DEB04755F100155FE05E2291E6F06A4487A0
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,?), ref: 00454779
                      • Process32First.KERNEL32(00000000,00000128), ref: 00454789
                      • Process32Next.KERNEL32(00000000,00000128), ref: 0045479B
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004547BC
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004547CB
                      • CloseHandle.KERNEL32(00000000), ref: 004547D2
                      • Process32Next.KERNEL32(00000000,00000128), ref: 004547E0
                      • CloseHandle.KERNEL32(00000000), ref: 004547EB
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process32$CloseHandleNextProcess$CreateFirstOpenSnapshotTerminateToolhelp32
                      • String ID:
                      • API String ID: 3836391474-0
                      • Opcode ID: 757b8156209ce7ed14b63749a4ffb0b814b37d5df4a50af20263fb9819fa4a50
                      • Instruction ID: e045fc6895f1a9bfced90c294f7f2ced458a89ea1d136b337cd5b8ded94dbc17
                      • Opcode Fuzzy Hash: 757b8156209ce7ed14b63749a4ffb0b814b37d5df4a50af20263fb9819fa4a50
                      • Instruction Fuzzy Hash: 2801F5316012146FE7205B309C88FEB777DEB48746F001286FD05D6282EFB48DD88B64
                      APIs
                      • LoadLibraryA.KERNEL32(?), ref: 0043717E
                      • GetProcessHeap.KERNEL32(00000008,00000010), ref: 004371B9
                      • HeapAlloc.KERNEL32(00000000), ref: 004371C0
                      • memcpy.MSVCRT(00000000,?), ref: 004371ED
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00437203
                      • HeapFree.KERNEL32(00000000), ref: 0043720A
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00437269
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heap$Process$AddressAllocFreeLibraryLoadProcmemcpy
                      • String ID:
                      • API String ID: 1745114167-0
                      • Opcode ID: f9afc9fd3f7e65a53b4f9b87b0042cf295caef8782acfa78a07c34ea5e4a04b3
                      • Instruction ID: 28ec7573b2ff5279ace3e3a7d1c67aa7559ef0fc7ebdf28a997d26cea9bab006
                      • Opcode Fuzzy Hash: f9afc9fd3f7e65a53b4f9b87b0042cf295caef8782acfa78a07c34ea5e4a04b3
                      • Instruction Fuzzy Hash: 75415EB17046059BDB20CFA9DC84BA7F3E9EB89315F1445AAEC99C7300E635E8108B64
                      APIs
                      • lstrcpy.KERNEL32(00000000), ref: 00439D08
                      • LocalAlloc.KERNEL32(00000040,?), ref: 00439D3A
                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00439D63
                      • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00439D9C
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocLocallstrcpymemcmp
                      • String ID: $"encrypted_key":"$DPAPI
                      • API String ID: 4154055062-738592651
                      • Opcode ID: 2be850cd6d6f2fc41ceb1fc76329007d57ddcc8b2ee5c9ada4726dd7f23e73e9
                      • Instruction ID: 1593f3745bc1f4358629697f06d0091f9df89a1cbda08c98f0f1a1067d53c882
                      • Opcode Fuzzy Hash: 2be850cd6d6f2fc41ceb1fc76329007d57ddcc8b2ee5c9ada4726dd7f23e73e9
                      • Instruction Fuzzy Hash: FC419071E0020A9BCB10EF65CD426EF77B4AF08304F05616BE955A7362DAB8ED05CB98
                      APIs
                      • strtok_s.MSVCRT ref: 00447F84
                      • lstrlenA.KERNEL32(00000000), ref: 00447FB1
                      • lstrcpy.KERNEL32(00000000,00000000), ref: 00447FE0
                      • strtok_s.MSVCRT ref: 00447FF1
                      • StrCmpCA.SHLWAPI(00000000,00465204), ref: 00448025
                      • StrCmpCA.SHLWAPI(00000000,00465204), ref: 00448053
                      • StrCmpCA.SHLWAPI(00000000,00465204), ref: 00448087
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: strtok_s$lstrcpylstrlen
                      • String ID:
                      • API String ID: 348468850-0
                      • Opcode ID: b79b516f06b02b10a4dbf7d2099506bd253456d1dbb4c27329c818fa5454f472
                      • Instruction ID: e31276c9614ad54ab24d1b7ebd92dded6a9c734c0c292405eafa8cfef1a56d63
                      • Opcode Fuzzy Hash: b79b516f06b02b10a4dbf7d2099506bd253456d1dbb4c27329c818fa5454f472
                      • Instruction Fuzzy Hash: 2A41C23460410ADFEB10DF18D880EAE77B4FF44304F11409AE8059B351EB79EA6ACFA6
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 00447DD8
                        • Part of subcall function 0045A1F0: std::exception::exception.LIBCMT ref: 0045A205
                        • Part of subcall function 0045A1F0: __CxxThrowException@8.LIBCMT ref: 0045A21A
                      • std::_Xinvalid_argument.LIBCPMT ref: 00447DF6
                      • std::_Xinvalid_argument.LIBCPMT ref: 00447E11
                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00447CFA,00000000,?,?,00000000,?,004391B6,?), ref: 00447E74
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Xinvalid_argumentstd::_$Exception@8Throwmemcpystd::exception::exception
                      • String ID: invalid string position$string too long
                      • API String ID: 702443124-4289949731
                      • Opcode ID: 9f4640475e8a5d98345d904c4a922ecc18300bd5ea3f076184d55228264f43ee
                      • Instruction ID: 71d31787e0f2192511781c3bf8d55ab1125079f49cae9a30e3b0bfb97d178cbf
                      • Opcode Fuzzy Hash: 9f4640475e8a5d98345d904c4a922ecc18300bd5ea3f076184d55228264f43ee
                      • Instruction Fuzzy Hash: ED21C5323047008BE7209E2CD880A2AB7E5EF91714F304B6FE4968B741D774DC0683A9
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 004388B3
                        • Part of subcall function 0045A1A3: std::exception::exception.LIBCMT ref: 0045A1B8
                        • Part of subcall function 0045A1A3: __CxxThrowException@8.LIBCMT ref: 0045A1CD
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                      • String ID: vector<T> too long$yxxx$yxxx$xC$xC
                      • API String ID: 2884196479-1433540622
                      • Opcode ID: 799483640bc27c9e8b8079bf63d80fac063fe3f165fcb6a59bb24ab856259b8e
                      • Instruction ID: 67168d847ca37355f7354e5ab3b4af82884ad5aeca9348763aa13ee8c02cb863
                      • Opcode Fuzzy Hash: 799483640bc27c9e8b8079bf63d80fac063fe3f165fcb6a59bb24ab856259b8e
                      • Instruction Fuzzy Hash: 543177B5E005159BCB08DF58C8916AEBBB6EB88310F14826EF915EB345DB34E901CBD5
                      APIs
                      • GetSystemTime.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00451E28), ref: 00451B52
                        • Part of subcall function 00451800: lstrcpy.KERNEL32(00000000,0045D014), ref: 0045182F
                        • Part of subcall function 00451800: lstrlenA.KERNEL32(00773048,00000000,00000000,?,?,00451B61), ref: 00451840
                        • Part of subcall function 00451800: lstrcpy.KERNEL32(00000000,00000000), ref: 00451867
                        • Part of subcall function 00451800: lstrcatA.KERNEL32(00000000,00000000), ref: 00451872
                        • Part of subcall function 00451800: lstrcpy.KERNEL32(00000000,00000000), ref: 004518A1
                        • Part of subcall function 00451800: lstrlenA.KERNEL32(00465568,?,?,00451B61), ref: 004518B3
                        • Part of subcall function 00451800: lstrcpy.KERNEL32(00000000,00000000), ref: 004518D4
                        • Part of subcall function 00451800: lstrcatA.KERNEL32(00000000,00465568,?,?,00451B61), ref: 004518E0
                        • Part of subcall function 00451800: lstrcpy.KERNEL32(00000000,00000000), ref: 0045190F
                      • sscanf.NTDLL ref: 00451B7A
                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00451B96
                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00451BA6
                      • ExitProcess.KERNEL32 ref: 00451BC3
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Timelstrcpy$System$Filelstrcatlstrlen$ExitProcesssscanf
                      • String ID: Huw
                      • API String ID: 3040284667-501312582
                      • Opcode ID: 60e551940a8f3c0809a4fe73001a860cb264ce542811b28ec9afb3e2ca35ffa5
                      • Instruction ID: 4c920b2cce8e8a4750ebbde789646207c48114f5fb4d87ede4799fffff9b9dda
                      • Opcode Fuzzy Hash: 60e551940a8f3c0809a4fe73001a860cb264ce542811b28ec9afb3e2ca35ffa5
                      • Instruction Fuzzy Hash: 762126B1508301AF8740DF65D88495FBBF9EFC8304F409A1EF9A9C3220E774E5088BA6
                      APIs
                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,?,004312EE), ref: 00439AFA
                      • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,004312EE), ref: 00439B10
                      • LocalAlloc.KERNEL32(00000040,?,?,?,?,004312EE), ref: 00439B27
                      • ReadFile.KERNEL32(00000000,00000000,?,004312EE,00000000,?,?,?,004312EE), ref: 00439B40
                      • LocalFree.KERNEL32(?,?,?,?,004312EE), ref: 00439B60
                      • CloseHandle.KERNEL32(00000000,?,?,?,004312EE), ref: 00439B67
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                      • String ID:
                      • API String ID: 2311089104-0
                      • Opcode ID: f825bffc65e4f5199f192dff6b29d401e58580a436d5000615cc70a70bcaddde
                      • Instruction ID: 13322cf5b08a1d354c8246b53289e279db2a102604b4c557529325235d0e4855
                      • Opcode Fuzzy Hash: f825bffc65e4f5199f192dff6b29d401e58580a436d5000615cc70a70bcaddde
                      • Instruction Fuzzy Hash: 6E115171A00209AFE710DF65DD84ABFB36DFB08744F10115AF90497280DBB4BD40CBA8
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 004389C6
                        • Part of subcall function 0045A1F0: std::exception::exception.LIBCMT ref: 0045A205
                        • Part of subcall function 0045A1F0: __CxxThrowException@8.LIBCMT ref: 0045A21A
                      • std::_Xinvalid_argument.LIBCPMT ref: 004389FD
                        • Part of subcall function 0045A1A3: std::exception::exception.LIBCMT ref: 0045A1B8
                        • Part of subcall function 0045A1A3: __CxxThrowException@8.LIBCMT ref: 0045A1CD
                      • memcpy.MSVCRT(?,00000000,?,00000000,?,?,00438800,?,00000000,004377D7), ref: 00438A5B
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception$memcpy
                      • String ID: invalid string position$string too long
                      • API String ID: 2202983795-4289949731
                      • Opcode ID: 4cb8257bef1d580ebdfe43acd253e37710692ac8c030c9ca5ef943e5576374d3
                      • Instruction ID: 4749d1a7b4be9c4538179c4ae659b4249f204cb5a8f892e3a296be3c56395e0d
                      • Opcode Fuzzy Hash: 4cb8257bef1d580ebdfe43acd253e37710692ac8c030c9ca5ef943e5576374d3
                      • Instruction Fuzzy Hash: 6521D6723047108BC721AA6DE840A6AF7A9DFA5761F20193FF191CB781DA79D841C3ED
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(004378EE,004388DD,03C3C3C3,00000401,004378EE,?,00000000,?,004378EE,80000001), ref: 00438B70
                      • std::exception::exception.LIBCMT ref: 00438B8B
                      • __CxxThrowException@8.LIBCMT ref: 00438BA0
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ??2@Exception@8Throwstd::exception::exception
                      • String ID: PF$xC
                      • API String ID: 3448701045-3715917059
                      • Opcode ID: ff1c0c8da92737208d7d3782665c109752d88acfe2f4585d08049b393c7dc0d7
                      • Instruction ID: 2b2fecb1852daa92a3f636194bf180594d1a1c8000884a0f6600616e21ecce66
                      • Opcode Fuzzy Hash: ff1c0c8da92737208d7d3782665c109752d88acfe2f4585d08049b393c7dc0d7
                      • Instruction Fuzzy Hash: DBF0A7B150430A97EB14E7E58C027BFF274AF04315F04856EF911D2341FB7CD619819A
                      APIs
                      • ??2@YAPAXI@Z.MSVCRT(?,00438C9B,00000000,?,?,00000000), ref: 00438D92
                      • std::exception::exception.LIBCMT ref: 00438DAD
                      • __CxxThrowException@8.LIBCMT ref: 00438DC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ??2@Exception@8Throwstd::exception::exception
                      • String ID: PF$PF
                      • API String ID: 3448701045-4031463206
                      • Opcode ID: 73f25b5d3d688cca420a8ae3b4073719a24a8c2cb40721b88c81682508cd2a1a
                      • Instruction ID: 0abba186f4f2867a77166eb8f6265b9bbf8f04ea3e26b4f5a141654fd06628cb
                      • Opcode Fuzzy Hash: 73f25b5d3d688cca420a8ae3b4073719a24a8c2cb40721b88c81682508cd2a1a
                      • Instruction Fuzzy Hash: B0E02BB040030997CB14E7B59C016BFB2789F14315F00475FF925522C2EF78C508819E
                      APIs
                      • memcpy.MSVCRT(?,?,00000040), ref: 00436E40
                      • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00436E7C
                      • GetProcessHeap.KERNEL32(00000008,?), ref: 00436EB4
                      • HeapAlloc.KERNEL32(00000000), ref: 00436EBB
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heapmemcpy$AllocProcess
                      • String ID: @
                      • API String ID: 1643994569-2766056989
                      • Opcode ID: abcf7b12da2a8a0f6c64158f552db940c15154da7adca0a304029f7e952d9df8
                      • Instruction ID: c77e5e8163186490f7ff91a3a9e9d7d5e1ae55812c912783ed0c2315a90a52c3
                      • Opcode Fuzzy Hash: abcf7b12da2a8a0f6c64158f552db940c15154da7adca0a304029f7e952d9df8
                      • Instruction Fuzzy Hash: 72116170600712ABDB208B61DD85BB777E8EB44701F059439EE46CB684FBB8D944C759
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 00447D14
                      • std::_Xinvalid_argument.LIBCPMT ref: 00447D2F
                      • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,004391B6,?,?,?,?,00000000,?,00001000,?), ref: 00447D84
                        • Part of subcall function 00447DC0: std::_Xinvalid_argument.LIBCPMT ref: 00447DD8
                        • Part of subcall function 00447DC0: std::_Xinvalid_argument.LIBCPMT ref: 00447DF6
                        • Part of subcall function 00447DC0: std::_Xinvalid_argument.LIBCPMT ref: 00447E11
                        • Part of subcall function 00447DC0: memcpy.MSVCRT(?,?,?,00000000,?,?,00447CFA,00000000,?,?,00000000,?,004391B6,?), ref: 00447E74
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Xinvalid_argumentstd::_$memcpy
                      • String ID: string too long
                      • API String ID: 2304785028-2556327735
                      • Opcode ID: 3efb4ad8437dc237ae6fe289a4e156324492f10dbd49ead525d93c7cecebd585
                      • Instruction ID: 65bf73d6643f71fc7c1aa9ab9d087c60c520d2af0d2ccfd850fdd6cb17af564e
                      • Opcode Fuzzy Hash: 3efb4ad8437dc237ae6fe289a4e156324492f10dbd49ead525d93c7cecebd585
                      • Instruction Fuzzy Hash: F631D5B27186104BF7209E6CE880A7BF7E9EF91754B204A2BF14187741D775984283ED
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 00438767
                        • Part of subcall function 0045A1A3: std::exception::exception.LIBCMT ref: 0045A1B8
                        • Part of subcall function 0045A1A3: __CxxThrowException@8.LIBCMT ref: 0045A1CD
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8ThrowXinvalid_argumentstd::_std::exception::exception
                      • String ID: vector<T> too long$yxxx$yxxx
                      • API String ID: 2884196479-1517697755
                      • Opcode ID: f9c15224bce49a1456cbac6242fbf6334215ea32a0a3dbf2f319e606da12f39e
                      • Instruction ID: 33e8014b352a0ce89914cfac26d265b39a0befa42f23b82a291dba4bb029e4e9
                      • Opcode Fuzzy Hash: f9c15224bce49a1456cbac6242fbf6334215ea32a0a3dbf2f319e606da12f39e
                      • Instruction Fuzzy Hash: 25F0B427F101310B8314A43E8D8405FE94757E93A073AE72AF906EF349ED39EC8281D9
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 0043880C
                      • memcpy.MSVCRT(?,?,00000000,00000000,004377D7), ref: 00438852
                        • Part of subcall function 004389B0: std::_Xinvalid_argument.LIBCPMT ref: 004389C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Xinvalid_argumentstd::_$memcpy
                      • String ID: string too long
                      • API String ID: 2304785028-2556327735
                      • Opcode ID: d575418e56bffe1b92b1344774ed186d66d760a934a5b282ef7b58058a41b83e
                      • Instruction ID: c38885a8c387ff9751951ae8e5ec7fc2c0d5cec97104c79af38e1664409ccc8c
                      • Opcode Fuzzy Hash: d575418e56bffe1b92b1344774ed186d66d760a934a5b282ef7b58058a41b83e
                      • Instruction Fuzzy Hash: 0C2192607047504BDB299A6C8980A2AE7E6EF89701F74191FF491C7781DFA9DC408799
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 00438AA5
                        • Part of subcall function 0045A1A3: std::exception::exception.LIBCMT ref: 0045A1B8
                        • Part of subcall function 0045A1A3: __CxxThrowException@8.LIBCMT ref: 0045A1CD
                      • memcpy.MSVCRT(?,?,?), ref: 00438AEF
                      Strings
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8ThrowXinvalid_argumentmemcpystd::_std::exception::exception
                      • String ID: string too long
                      • API String ID: 2475949303-2556327735
                      • Opcode ID: 62872c68528120dfe96b1bec8294eac0be10b5fa71b87ce2b861df91edeb03e1
                      • Instruction ID: c1be2a0aa929eea6c9a7dd7da6315b15f150e8ae7922a6ae65c03f905e190f65
                      • Opcode Fuzzy Hash: 62872c68528120dfe96b1bec8294eac0be10b5fa71b87ce2b861df91edeb03e1
                      • Instruction Fuzzy Hash: 6121D0726047045BE720DE6DD840A6EF7AAEBD9320F148A2FF895C3380DF74A9458698
                      APIs
                      • std::_Xinvalid_argument.LIBCPMT ref: 00438BBF
                        • Part of subcall function 0045A1F0: std::exception::exception.LIBCMT ref: 0045A205
                        • Part of subcall function 0045A1F0: __CxxThrowException@8.LIBCMT ref: 0045A21A
                      • memmove.MSVCRT(?,?,?,?,?,004389E2,00000000,?,?,00438800,?,00000000,004377D7), ref: 00438BF5
                      Strings
                      • invalid string position, xrefs: 00438BBA
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Exception@8ThrowXinvalid_argumentmemmovestd::_std::exception::exception
                      • String ID: invalid string position
                      • API String ID: 655285616-1799206989
                      • Opcode ID: be5fc026f45ee7ae9dad26999360babd37a6d8f6540dd6d00b10ae549b9ca883
                      • Instruction ID: e6a224b6ec367e2b0a7231d8dc52396ab67256cb2ad6349641d7104c3decf265
                      • Opcode Fuzzy Hash: be5fc026f45ee7ae9dad26999360babd37a6d8f6540dd6d00b10ae549b9ca883
                      • Instruction Fuzzy Hash: 5501D8703047019BD3108E2CED9051AF2E6DB89704F24191DF191C7785DB78EC428399
                      APIs
                      • lstrcpy.KERNEL32(00000000), ref: 00451581
                      • lstrcpy.KERNEL32(00000000,?), ref: 004515B9
                      • lstrcpy.KERNEL32(00000000,?), ref: 004515F1
                      • lstrcpy.KERNEL32(00000000,?), ref: 00451629
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID:
                      • API String ID: 3722407311-0
                      • Opcode ID: 8d569154ac776e5308f04f625a4e5cf17ad0822e1713675f8091649641865d2c
                      • Instruction ID: d19f379ebee4c2ef9b250400f5c79a7bca6c8228e37f278c01fb763e1d2cf76c
                      • Opcode Fuzzy Hash: 8d569154ac776e5308f04f625a4e5cf17ad0822e1713675f8091649641865d2c
                      • Instruction Fuzzy Hash: DB210FB0601B029BD724EF3AC554B17B7F5AF48301F144A1EE896C7B61EB78E804CBA4
                      APIs
                        • Part of subcall function 00431510: lstrcpy.KERNEL32(00000000), ref: 0043152D
                        • Part of subcall function 00431510: lstrcpy.KERNEL32(00000000,?), ref: 0043154F
                        • Part of subcall function 00431510: lstrcpy.KERNEL32(00000000,?), ref: 00431571
                        • Part of subcall function 00431510: lstrcpy.KERNEL32(00000000,?), ref: 00431593
                      • lstrcpy.KERNEL32(00000000,?), ref: 00431437
                      • lstrcpy.KERNEL32(00000000,?), ref: 00431459
                      • lstrcpy.KERNEL32(00000000,?), ref: 0043147B
                      • lstrcpy.KERNEL32(00000000,?), ref: 004314DF
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID:
                      • API String ID: 3722407311-0
                      • Opcode ID: c32ddaf2f0da96529c3808f24a825d74fcfa5edf27dac7240448b67476410e8b
                      • Instruction ID: 4beed86651e8d0b37fb031bf747b8caa65e1fb0767c84035a3c89ac0623104d0
                      • Opcode Fuzzy Hash: c32ddaf2f0da96529c3808f24a825d74fcfa5edf27dac7240448b67476410e8b
                      • Instruction Fuzzy Hash: F331A574A01B029FC728DF3AD588957BBE5BF49704B10592EE956C3B20DB74F811CB94
                      APIs
                      • memcpy.MSVCRT(?,?,00000040), ref: 00436E40
                      • memcpy.MSVCRT(?,00005A4D,000000F8), ref: 00436E7C
                      • GetProcessHeap.KERNEL32(00000008,?), ref: 00436EB4
                      • HeapAlloc.KERNEL32(00000000), ref: 00436EBB
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Heapmemcpy$AllocProcess
                      • String ID:
                      • API String ID: 1643994569-0
                      • Opcode ID: 441224ffd6965d08b8ea6234c055560d665c7193048d8e91fe0b22be95bc724a
                      • Instruction ID: 7fb33337d86262cd5aaa6b7f8267323a37a1cd56017c1740c79cb01c3919b421
                      • Opcode Fuzzy Hash: 441224ffd6965d08b8ea6234c055560d665c7193048d8e91fe0b22be95bc724a
                      • Instruction Fuzzy Hash: 922190B4600702ABDB248B21DC85BB773E8EB44705F44846DFA46CB684FB78E945C754
                      APIs
                      • lstrcpy.KERNEL32(00000000), ref: 0043152D
                      • lstrcpy.KERNEL32(00000000,?), ref: 0043154F
                      • lstrcpy.KERNEL32(00000000,?), ref: 00431571
                      • lstrcpy.KERNEL32(00000000,?), ref: 00431593
                      Memory Dump Source
                      • Source File: 00000002.00000002.2212757781.0000000000431000.00000020.00000400.00020000.00000000.sdmp, Offset: 00430000, based on PE: true
                      • Associated: 00000002.00000002.2212741326.0000000000430000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212784587.000000000045B000.00000002.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000047B000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000049E000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004BE000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C3000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004C6000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000004FD000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000050A000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000529000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000537000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000552000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.000000000058D000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.00000000005B0000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2212803416.0000000000668000.00000040.00000400.00020000.00000000.sdmpDownload File
                      • Associated: 00000002.00000002.2213203097.000000000067A000.00000002.00000400.00020000.00000000.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_430000_BitLockerToGo.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrcpy
                      • String ID:
                      • API String ID: 3722407311-0
                      • Opcode ID: 50d78fb4f62eb9c7bca372e886d1e707b6d50bb64b143ab24f290363e316bfc3
                      • Instruction ID: c8a285d04d2d1dd4fe5b5a6e5ad9214ef60016135da83c51479c66226afed0ce
                      • Opcode Fuzzy Hash: 50d78fb4f62eb9c7bca372e886d1e707b6d50bb64b143ab24f290363e316bfc3
                      • Instruction Fuzzy Hash: AD112474A01B02ABDB189F36D508927B7FCBF49301B14162EE857C3B50DB78E800CB54