Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MXpl6HFisn.exe

Overview

General Information

Sample name:MXpl6HFisn.exe
renamed because original name is a hash value
Original sample name:0aadbca2d0a26b8f90fd4f31cb7f2ffc.exe
Analysis ID:1417443
MD5:0aadbca2d0a26b8f90fd4f31cb7f2ffc
SHA1:57246459c3890dfcd49fb792cc55a45e3bd6c48e
SHA256:4bee7d558a5346bffa5cc2393b579bd8abbdd6beef0ede8e71aeae10dd5ff207
Tags:exeRiseProStealer
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RisePro Stealer
Allocates memory in foreign processes
Contains functionality to inject threads in other processes
Creates autostart registry keys with suspicious names
Found API chain indicative of sandbox detection
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Tries to load missing DLLs
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • MXpl6HFisn.exe (PID: 6880 cmdline: "C:\Users\user\Desktop\MXpl6HFisn.exe" MD5: 0AADBCA2D0A26B8F90FD4F31CB7F2FFC)
    • BitLockerToGo.exe (PID: 2004 cmdline: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\gC7STejDE3WmjzylxWa3QT6.zipJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000003.1836476956.0000000005203000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      00000000.00000002.1769068121.000000C0026F0000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000001.00000002.1871116463.000000C002598000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000004.00000002.1962242072.000000C0025AA000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      00000004.00000002.1959576006.000000C0006B2000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
      • 0x0:$x1: 4d5a9000030000000
      Click to see the 3 entries

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe" , CommandLine: "C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, NewProcessName: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, OriginalFileName: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe" , ProcessId: 2032, ProcessName: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
      Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\MXpl6HFisn.exe, ProcessId: 6880, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\MXpl6HFisn.exe, ProcessId: 6880, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
      Timestamp:03/29/24-09:52:15.811203
      SID:2046266
      Source Port:50500
      Destination Port:49730
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:21.606984
      SID:2046269
      Source Port:49730
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:16.065250
      SID:2046267
      Source Port:50500
      Destination Port:49730
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:25.278346
      SID:2046266
      Source Port:50500
      Destination Port:49739
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:33.605110
      SID:2046266
      Source Port:50500
      Destination Port:49743
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:25.741725
      SID:2046266
      Source Port:50500
      Destination Port:49740
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:15.776952
      SID:2049060
      Source Port:49730
      Destination Port:50500
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:03/29/24-09:52:23.971378
      SID:2049660
      Source Port:50500
      Destination Port:49730
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeReversingLabs: Detection: 42%
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeVirustotal: Detection: 47%Perma Link
      Source: MXpl6HFisn.exeVirustotal: Detection: 36%Perma Link
      Source: MXpl6HFisn.exeReversingLabs: Detection: 42%
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A20380 RegQueryValueExA,RegCloseKey,CryptUnprotectData,CryptUnprotectData,LocalFree,2_2_02A20380
      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49744 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: MXpl6HFisn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: BitLockerToGo.pdb source: MXpl6HFisn.exe, 00000000.00000002.1764630027.000000C0001F5000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002C22000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1757024957.0000023CE79F0000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862067365.000001E67DB70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862099559.000001E67DB30000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002B4E000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936048127.0000027776D70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936018932.0000027776DB0000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.00000000031CF000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BitLockerToGo.pdbGCTL source: MXpl6HFisn.exe, 00000000.00000002.1764630027.000000C0001F5000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002C22000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1757024957.0000023CE79F0000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862067365.000001E67DB70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862099559.000001E67DB30000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002B4E000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936048127.0000027776D70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936018932.0000027776DB0000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.00000000031CF000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3E200 SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CopyFileA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,CopyFileA,__Mtx_unlock,__Mtx_unlock,2_2_02A3E200
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADC3BA FindClose,FindFirstFileExW,GetLastError,2_2_02ADC3BA
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0E0B0 CreateDirectoryA,CreateDirectoryA,FindFirstFileA,GetLastError,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,GetFileAttributesA,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,__Mtx_unlock,2_2_02A0E0B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0A6B0 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,__Mtx_unlock,2_2_02A0A6B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A20CC3 FindFirstFileA,FindNextFileA,GetLastError,FindClose,2_2_02A20CC3
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADC440 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,2_2_02ADC440
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3FD60 FindFirstFileA,2_2_02A3FD60
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0508A17B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,2_2_0508A17B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050590F0 FindFirstFileA,CreateDirectoryA,GetLastError,CopyFileA,CopyFileA,FindNextFileA,FindClose,GetLastError,2_2_050590F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_05059990 FindFirstFileA,SetFileAttributesA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,2_2_05059990

      Networking

      barindex
      Source: TrafficSnort IDS: 2049060 ET TROJAN RisePro TCP Heartbeat Packet 192.168.2.4:49730 -> 95.216.41.236:50500
      Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 95.216.41.236:50500 -> 192.168.2.4:49730
      Source: TrafficSnort IDS: 2046267 ET TROJAN [ANY.RUN] RisePro TCP (External IP) 95.216.41.236:50500 -> 192.168.2.4:49730
      Source: TrafficSnort IDS: 2046269 ET TROJAN [ANY.RUN] RisePro TCP (Activity) 192.168.2.4:49730 -> 95.216.41.236:50500
      Source: TrafficSnort IDS: 2049660 ET TROJAN RisePro CnC Activity (Outbound) 95.216.41.236:50500 -> 192.168.2.4:49730
      Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 95.216.41.236:50500 -> 192.168.2.4:49739
      Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 95.216.41.236:50500 -> 192.168.2.4:49740
      Source: TrafficSnort IDS: 2046266 ET TROJAN [ANY.RUN] RisePro TCP (Token) 95.216.41.236:50500 -> 192.168.2.4:49743
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 95.216.41.236:50500
      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
      Source: Joe Sandbox ViewIP Address: 104.26.5.15 104.26.5.15
      Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: unknownDNS query: name: ipinfo.io
      Source: unknownDNS query: name: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /widget/demo/102.165.48.43 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /demo/home.php?s=102.165.48.43 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: db-ip.com
      Source: global trafficHTTP traffic detected: GET /widget/demo/102.165.48.43 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /demo/home.php?s=102.165.48.43 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: db-ip.com
      Source: global trafficHTTP traffic detected: GET /widget/demo/102.165.48.43 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /demo/home.php?s=102.165.48.43 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: db-ip.com
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: unknownTCP traffic detected without corresponding DNS query: 95.216.41.236
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1F5F0 recv,__Mtx_unlock,2_2_02A1F5F0
      Source: global trafficHTTP traffic detected: GET /widget/demo/102.165.48.43 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /demo/home.php?s=102.165.48.43 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: db-ip.com
      Source: global trafficHTTP traffic detected: GET /widget/demo/102.165.48.43 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /demo/home.php?s=102.165.48.43 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: db-ip.com
      Source: global trafficHTTP traffic detected: GET /widget/demo/102.165.48.43 HTTP/1.1Connection: Keep-AliveReferer: https://ipinfo.io/User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: ipinfo.io
      Source: global trafficHTTP traffic detected: GET /demo/home.php?s=102.165.48.43 HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: db-ip.com
      Source: unknownDNS traffic detected: queries for: ipinfo.io
      Source: MXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7C70000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DDB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, BitLockerToGo.exe, 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1960476547.000000C001CF8000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1881301271.0000027776EB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920173465.00000000026B0000.00000040.00000400.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999600227.0000000002EA0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: BitLockerToGo.exe, 00000002.00000003.1803412679.0000000002C34000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/-
      Source: BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=102.165.48.43
      Source: BitLockerToGo.exe, 00000002.00000003.1803412679.0000000002C34000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/s
      Source: BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002BF6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BD0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BD0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003216000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003217000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=102.165.48.43
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://duckduckgo.com/ac/?q=
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
      Source: MXpl6HFisn.exe, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe.0.drString found in binary or memory: https://golang.org/doc/faq#nil_errortls:
      Source: BitLockerToGo.exe, 00000005.00000002.1920528481.0000000002B48000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BC3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BC3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003235000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
      Source: BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/O
      Source: BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/R
      Source: MXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7C70000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DDB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1960476547.000000C001CF8000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1881301271.0000027776EB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920173465.00000000026B0000.00000040.00000400.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999600227.0000000002EA0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
      Source: BitLockerToGo.exe, 00000005.00000002.1920528481.0000000002B48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/s
      Source: BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/t
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BA5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003216000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003217000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/102.165.48.43
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/102.165.48.43o
      Source: BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BC3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BC3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/102.165.48.43
      Source: BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003216000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003217000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/102.165.48.43:
      Source: BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002BF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/102.165.48.43P$
      Source: BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
      Source: BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
      Source: BitLockerToGo.exe, 00000002.00000003.1826342628.0000000004F64000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828530915.0000000004F7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
      Source: BitLockerToGo.exe, 00000002.00000003.1826342628.0000000004F64000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828530915.0000000004F7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.V
      Source: BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920528481.0000000002B48000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
      Source: BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTR
      Source: BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.000000000329B000.00000004.00000020.00020000.00000000.sdmp, passwords.txt.2.drString found in binary or memory: https://t.me/risepro_bot
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botbackup
      Source: BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botisepro_botc
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botrisep
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bott
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.p
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://www.ecosia.org/newtab/
      Source: BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
      Source: BitLockerToGo.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
      Source: BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
      Source: BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
      Source: BitLockerToGo.exe, 00000002.00000003.1829264822.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1826241376.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828447229.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827672274.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1829573161.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1830796791.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1830547597.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1829150612.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1829776196.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
      Source: BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
      Source: BitLockerToGo.exe, 00000002.00000003.1829264822.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1826241376.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828447229.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827672274.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1829573161.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1830796791.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1830547597.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1829150612.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1829776196.0000000004F4E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
      Source: BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/refox
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49734 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49742 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.117.186.192:443 -> 192.168.2.4:49744 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 104.26.5.15:443 -> 192.168.2.4:49745 version: TLS 1.2
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0AE90 GdiplusStartup,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,DeleteObject,GdipDisposeImage,DeleteObject,ReleaseDC,GdiplusShutdown,2_2_02A0AE90
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_05061510 __aulldiv,__aulldiv,__aulldiv,send,__aulldiv,__aulldiv,__aulldiv,send,ExitProcess,__aulldiv,__aulldiv,__aulldiv,send,__aulldiv,__aulldiv,__aulldiv,send,CreateThread,CloseHandle,lstrcatA,lstrcatA,CreateProcessA,lstrcatA,CreateProcessA,Sleep,SetThreadDesktop,OpenDesktopA,EnumDesktopWindows,CloseDesktop,CreateDesktopA,SetThreadDesktop,PostMessageA,PostMessageA,PostMessageA,WindowFromPoint,FindWindowA,GetWindowRect,PtInRect,PostMessageA,RealGetWindowClassA,lstrcmpA,SendMessageA,MenuItemFromPoint,GetMenuItemID,PostMessageA,PostMessageA,WindowFromPoint,SendMessageA,GetWindowLongA,SetWindowLongA,SendMessageA,PostMessageA,PostMessageA,GetWindowPlacement,PostMessageA,PostMessageA,WindowFromPoint,WindowFromPoint,WindowFromPoint,SendMessageA,GetWindowRect,MoveWindow,ScreenToClient,ChildWindowFromPoint,RealGetWindowClassA,RealGetWindowClassA,PostMessageA,PostMessageA,lstrcatA,lstrcatA,CreateProcessA,CreateProcessA,CreateProcessA,PostMessageA,GetCurrentThreadId,GetThreadDesktop,CreateThread,CloseHandle,send,shutdown,closesocket,2_2_05061510

      System Summary

      barindex
      Source: 00000000.00000002.1769068121.000000C0026F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000001.00000002.1871116463.000000C002598000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000004.00000002.1962242072.000000C0025AA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000004.00000002.1959576006.000000C0006B2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess Stats: CPU usage > 49%
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0505A360 CreateProcessAsUserA,CloseHandle,CloseHandle,WaitForSingleObject,GetExitCodeProcess,2_2_0505A360
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3E2002_2_02A3E200
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8E2402_2_02A8E240
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A2C3B02_2_02A2C3B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0E0B02_2_02A0E0B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A561A02_2_02A561A0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A287E02_2_02A287E0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3C7202_2_02A3C720
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ACC4A02_2_02ACC4A0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A604002_2_02A60400
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AEA58E2_2_02AEA58E
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A24A102_2_02A24A10
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A6286B2_2_02A6286B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A2E9A02_2_02A2E9A0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3C9B02_2_02A3C9B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A389302_2_02A38930
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8CEC02_2_02A8CEC0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A42E702_2_02A42E70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F972_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A2AD702_2_02A2AD70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A232702_2_02A23270
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3B3B02_2_02A3B3B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8D3402_2_02A8D340
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A430902_2_02A43090
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A5B1602_2_02A5B160
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A411502_2_02A41150
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A357D02_2_02A357D0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A377102_2_02A37710
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A494802_2_02A49480
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A5D4C02_2_02A5D4C0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8D5A02_2_02A8D5A0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A55B202_2_02A55B20
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADB8302_2_02ADB830
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3D8402_2_02A3D840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A31E102_2_02A31E10
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A57E702_2_02A57E70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A25D702_2_02A25D70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A882B02_2_02A882B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ACE2202_2_02ACE220
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AF82442_2_02AF8244
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A443872_2_02A44387
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8E0302_2_02A8E030
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A280692_2_02A28069
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A2E0482_2_02A2E048
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1A1F02_2_02A1A1F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A461602_2_02A46160
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A2E1692_2_02A2E169
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A5E6972_2_02A5E697
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ABC6902_2_02ABC690
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A586092_2_02A58609
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8A7802_2_02A8A780
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A587692_2_02A58769
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A024F02_2_02A024F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A5C4C92_2_02A5C4C9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AA44112_2_02AA4411
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A165E92_2_02A165E9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A4C5502_2_02A4C550
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A845502_2_02A84550
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AB65502_2_02AB6550
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A88A6B2_2_02A88A6B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A18BB82_2_02A18BB8
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A32B992_2_02A32B99
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A38BC72_2_02A38BC7
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8CB702_2_02A8CB70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AEA8D02_2_02AEA8D0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A4A8302_2_02A4A830
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A908602_2_02A90860
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A148402_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A829B02_2_02A829B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AE4E882_2_02AE4E88
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AE6EC02_2_02AE6EC0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A94E002_2_02A94E00
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A58E182_2_02A58E18
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A84F802_2_02A84F80
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A9AF202_2_02A9AF20
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A952F02_2_02A952F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A412082_2_02A41208
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8F2612_2_02A8F261
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AD53902_2_02AD5390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AD13702_2_02AD1370
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A2B0292_2_02A2B029
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A870402_2_02A87040
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A910402_2_02A91040
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A4F1B02_2_02A4F1B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A191B92_2_02A191B9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A331C62_2_02A331C6
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A311102_2_02A31110
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A596F92_2_02A596F9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A5D6282_2_02A5D628
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A856302_2_02A85630
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A917202_2_02A91720
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AE17002_2_02AE1700
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A4B4982_2_02A4B498
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3B5F92_2_02A3B5F9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A23A682_2_02A23A68
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A9BBD02_2_02A9BBD0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AD3B202_2_02AD3B20
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A87B102_2_02A87B10
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A4B8692_2_02A4B869
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A599992_2_02A59999
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A5F9282_2_02A5F928
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A159702_2_02A15970
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A379772_2_02A37977
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A83FE02_2_02A83FE0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A9FCA02_2_02A9FCA0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A83C702_2_02A83C70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A8DD902_2_02A8DD90
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AF9DD92_2_02AF9DD9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A17D202_2_02A17D20
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050615102_2_05061510
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050580402_2_05058040
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0507A3402_2_0507A340
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_05079C002_2_05079C00
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0506EE702_2_0506EE70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050578202_2_05057820
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0505D4602_2_0505D460
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050764702_2_05076470
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0505E4902_2_0505E490
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050A34F92_2_050A34F9
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050717E02_2_050717E0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050747F02_2_050747F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0505A6402_2_0505A640
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050950702_2_05095070
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050543602_2_05054360
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050993802_2_05099380
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050953CF2_2_050953CF
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0508ED002_2_0508ED00
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_05094D2E2_2_05094D2E
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050A2D602_2_050A2D60
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_05072F502_2_05072F50
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0505FE402_2_0505FE40
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0505D8E02_2_0505D8E0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050A8BEB2_2_050A8BEB
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 0508D5E0 appears 54 times
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 02ADE8F0 appears 53 times
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 02A90E80 appears 84 times
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: String function: 02A6CE60 appears 41 times
      Source: MXpl6HFisn.exeStatic PE information: Number of sections : 12 > 10
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe.0.drStatic PE information: Number of sections : 12 > 10
      Source: MXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1764630027.000000C0001F5000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002C22000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000003.1757024957.0000023CE79F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7DA6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1781559884.00007FF6A6BF5000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameupdate1503.exe8 vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002D65000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameupdate1503.exe8 vs MXpl6HFisn.exe
      Source: MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000000.1709669640.00007FF7B8D95000.00000008.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameupdate1503.exe8 vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C0016F7000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameupdate1503.exe8 vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DEE6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862067365.000001E67DB70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862099559.000001E67DB30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000000.1793682334.00007FF7B8D95000.00000008.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameupdate1503.exe8 vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1960476547.000000C001CF8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002B4E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936048127.0000027776D70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1964029089.000000C004035000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameupdate1503.exe8 vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1881301271.0000027776EB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKVM Vision Viewer.exeD vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936018932.0000027776DB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBITLOCKERTOGO.EXEj% vs MXpl6HFisn.exe
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: devobj.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: vaultcli.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: devobj.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: devobj.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: 00000000.00000002.1769068121.000000C0026F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000001.00000002.1871116463.000000C002598000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000004.00000002.1962242072.000000C0025AA000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000004.00000002.1959576006.000000C0006B2000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/24@2/3
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A93220 GetLastError,GetVersionExA,FormatMessageW,LocalFree,FormatMessageA,2_2_02A93220
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A92B40 GetVersionExA,CreateFileW,CreateFileA,GetDiskFreeSpaceW,GetDiskFreeSpaceA,2_2_02A92B40
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0C390 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_02A0C390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A46160 CopyFileA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,CopyFileA,GetUserNameA,CopyFileA,SHGetFolderPathA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,ShellExecuteA,2_2_02A46160
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeFile created: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeMutant created: \Sessions\1\BaseNamedObjects\slickSlideAnd120
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile created: C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEKJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeFile opened: C:\Windows\system32\d0302a26f0ed28ccdce81572cf8cd1028c63f048c9335d664d9761c42b5dbf6dAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeFile opened: C:\Windows\system32\c86af2d723e0710b7134d6e4af68ef7880000ae7d68cad633f8174379f7214bdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeFile opened: C:\Windows\system32\346283a18873cd58eabb7a2be2ff6e75f220f81c682fdbe77aa33085aeebe489AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
      Source: MXpl6HFisn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: MXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7C70000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DDB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: MXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7C70000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DDB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
      Source: TEtREnT7JaI7Login Data.2.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
      Source: MXpl6HFisn.exeVirustotal: Detection: 36%
      Source: MXpl6HFisn.exeReversingLabs: Detection: 42%
      Source: MXpl6HFisn.exeString found in binary or memory: google.golang.org/grpc@v1.62.0/internal/balancerload/load.go
      Source: MXpl6HFisn.exeString found in binary or memory: 500SNM8/WJmTlrtHo5fYJoHAvTJniG9TIJ1Fw6jJhVqKsGbb3KDvsivuRJuU0G5/Kn29bDvMRPWe2E9JA3Rrl9unCFzyjY445kDPy5McSufgeoG/0eeoEM0zzlb/AdDvZrLsrCaqu563nil/gAG/5N2taU+7piS3McYaVGKV8XjA28tOGwEXzehTy5NYTAbjqExFVROPKb257a3WdjE/gVSZM+Z4VXviN4bqgsvJpNkcaZxYoUc0tr4/PG/DUHBsP3P/
      Source: MXpl6HFisn.exeString found in binary or memory: net/addrselect.go
      Source: MXpl6HFisn.exeString found in binary or memory: github.com/saferwall/pe@v1.4.8/loadconfig.go
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeString found in binary or memory: google.golang.org/grpc@v1.62.0/internal/balancerload/load.go
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeString found in binary or memory: 500SNM8/WJmTlrtHo5fYJoHAvTJniG9TIJ1Fw6jJhVqKsGbb3KDvsivuRJuU0G5/Kn29bDvMRPWe2E9JA3Rrl9unCFzyjY445kDPy5McSufgeoG/0eeoEM0zzlb/AdDvZrLsrCaqu563nil/gAG/5N2taU+7piS3McYaVGKV8XjA28tOGwEXzehTy5NYTAbjqExFVROPKb257a3WdjE/gVSZM+Z4VXviN4bqgsvJpNkcaZxYoUc0tr4/PG/DUHBsP3P/
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeString found in binary or memory: net/addrselect.go
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeString found in binary or memory: github.com/saferwall/pe@v1.4.8/loadconfig.go
      Source: BitLockerToGo.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
      Source: MXpl6HFisn.exeString found in binary or memory: runqueue= stopwait= runqsize= gfreecnt= throwing= spinning=atomicand8float64nanfloat32nanException ptrSize= targetpc= until pc= pcruntime: ggoroutine RIPEMD-160ChorasmianDevanagariGlagoliticKharoshthiManichaeanOld_ItalicOld_PermicOld_TurkicOld_UyghurPhoenicianSaurashtra.localhostwsarecvmsgwsasendmsgIP addressunixpacket netGo = SHA256-RSASHA384-RSASHA512-RSADSA-SHA256ECDSA-SHA1POSTALCODEexecerrdotSYSTEMROOT for type pick_firstChannel %s:authoritygrpc.Recv.grpc.Sent."INTERNAL"OutOfRangeConnectionlocal-addrRST_STREAMEND_STREAMSet-Cookie stream=%dset-cookieuser-agentkeep-aliveconnectionequivalentHost: %s
      Source: MXpl6HFisn.exeString found in binary or memory: stopm spinning nmidlelocked= needspinning=randinit twicestore64 failedsemaRoot queuebad allocCountbad span statestack overflow untyped args out of range no module dataruntime: seq1=runtime: goid= in goroutine unreachable: internal error.in-addr.arpa. mode: /log/filter.go/log/helper.godata truncated
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeFile read: C:\Users\user\Desktop\MXpl6HFisn.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\MXpl6HFisn.exe "C:\Users\user\Desktop\MXpl6HFisn.exe"
      Source: unknownProcess created: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe "C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe"
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      Source: unknownProcess created: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe "C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe"
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
      Source: MXpl6HFisn.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: MXpl6HFisn.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: MXpl6HFisn.exeStatic file information: File size 21056512 > 1048576
      Source: MXpl6HFisn.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x6cbc00
      Source: MXpl6HFisn.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0xc7ba00
      Source: MXpl6HFisn.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: BitLockerToGo.pdb source: MXpl6HFisn.exe, 00000000.00000002.1764630027.000000C0001F5000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002C22000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1757024957.0000023CE79F0000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862067365.000001E67DB70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862099559.000001E67DB30000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002B4E000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936048127.0000027776D70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936018932.0000027776DB0000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.00000000031CF000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BitLockerToGo.pdbGCTL source: MXpl6HFisn.exe, 00000000.00000002.1764630027.000000C0001F5000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002C22000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1757024957.0000023CE79F0000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862067365.000001E67DB70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1862099559.000001E67DB30000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002B4E000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936048127.0000027776D70000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1936018932.0000027776DB0000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.00000000031CF000.00000004.00000020.00020000.00000000.sdmp
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3C720 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_02A3C720
      Source: MXpl6HFisn.exeStatic PE information: section name: .xdata
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe.0.drStatic PE information: section name: .xdata
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADE4BA push ecx; ret 2_2_02ADE4CD
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0508D06F push ecx; ret 2_2_0508D082
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050B3225 push esi; ret 2_2_050B322E
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeFile created: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A829B0 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_02A829B0
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSandbox detection routine: GetCursorPos, DecisionNode, Sleepgraph_2-161722
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_2-163665
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetCursorPos,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,Sleep,GetCursorPos,2_2_02A62460
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWindow / User API: threadDelayed 1595Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWindow / User API: threadDelayed 1139Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWindow / User API: threadDelayed 6510Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6460Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 3804Thread sleep time: -543000s >= -30000sJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6460Thread sleep time: -1595000s >= -30000sJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 3804Thread sleep time: -3417000s >= -30000sJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6460Thread sleep time: -6510000s >= -30000sJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 6880Thread sleep count: 75 > 30Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A66760 GetKeyboardLayoutList followed by cmp: cmp eax, 2eh and CTI: jc 02A66770h country: Upper Sorbian (hsb)2_2_02A66760
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A930A0 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 02A930F1h2_2_02A930A0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3E200 SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,FindFirstFileA,FindNextFileA,FindClose,CreateDirectoryA,CreateDirectoryA,CopyFileA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,CopyFileA,__Mtx_unlock,__Mtx_unlock,2_2_02A3E200
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADC3BA FindClose,FindFirstFileExW,GetLastError,2_2_02ADC3BA
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0E0B0 CreateDirectoryA,CreateDirectoryA,FindFirstFileA,GetLastError,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,CopyFileA,FindNextFileA,FindClose,GetLastError,GetLastError,CreateDirectoryA,SHGetFolderPathA,GetFileAttributesA,GetFileAttributesA,GetLastError,GetLastError,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,GetFileAttributesA,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,GetFileAttributesA,GetLastError,__Mtx_unlock,__Mtx_unlock,CreateDirectoryA,__Mtx_unlock,2_2_02A0E0B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0A6B0 FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,GetLastError,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,GetLastError,__Mtx_unlock,2_2_02A0A6B0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A20CC3 FindFirstFileA,FindNextFileA,GetLastError,FindClose,2_2_02A20CC3
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADC440 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,2_2_02ADC440
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3FD60 FindFirstFileA,2_2_02A3FD60
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0508A17B GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,___std_fs_open_handle@16,GetFileInformationByHandleEx,GetLastError,GetFileInformationByHandleEx,GetFileInformationByHandleEx,2_2_0508A17B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050590F0 FindFirstFileA,CreateDirectoryA,GetLastError,CopyFileA,CopyFileA,FindNextFileA,FindClose,GetLastError,2_2_050590F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_05059990 FindFirstFileA,SetFileAttributesA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,GetLastError,SetFileAttributesA,GetLastError,RemoveDirectoryA,GetLastError,2_2_05059990
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0C390 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_02A0C390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeThread delayed: delay time: 30000Jump to behavior
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002B96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
      Source: BitLockerToGo.exe, 00000002.00000003.3882145503.0000000004F7D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}]]
      Source: BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003217000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: BitLockerToGo.exe, 00000002.00000003.1791900220.0000000002BF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}e
      Source: BitLockerToGo.exe, 00000002.00000003.1831701071.0000000004F6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}&%
      Source: BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}5b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097\
      Source: BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}y
      Source: BitLockerToGo.exe, 00000002.00000003.1803412679.0000000002C34000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003242000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003242000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003208000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003208000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}et
      Source: BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb
      Source: BitLockerToGo.exe, 00000008.00000003.1969479982.0000000003219000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: MXpl6HFisn.exe, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeBinary or memory string: LAZ8i9NlUZ0lSPkzdHAg7kjRjkCnkH5aScnzZ0FLRc1HCl8Q+efVI91gv9Deb3GTYAJfB+FhRxsT7Jv//u2UkAKVUPsvpvijNnwUsTR98GVFC1yLAH9dfaCHlTb3Z3ZkP27Czki7TkW5TKALHxSHcPnVQvYyW/LygsnXcy92ZHGfShugzWK0nNUime6ySx5bkL6GpCGdzyz0hMhyFXSQ5pp4MJFYvJ+rBld0DtOfszB0z2XEyXUmRSOb8J/vYPKh/xrs
      Source: BitLockerToGo.exe, 00000002.00000003.3882165826.0000000002C84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}exe [2424]
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002B96000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW!
      Source: MXpl6HFisn.exe, 00000000.00000002.1778270791.0000023CC2374000.00000004.00000020.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1873704360.000001E65847C000.00000004.00000020.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1965180617.000002773172F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_7D9421B6M
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_7D9421B6
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: BitLockerToGo.exe, 00000005.00000003.1890881232.0000000002BAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}b
      Source: BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}ntEK\History\Firefox_fqs92o4p.default-release.txtl
      Source: BitLockerToGo.exe, 00000005.00000003.1890881232.0000000002BA8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91e
      Source: (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeBinary or memory string: fDvj1yreL7RfHuqV3C2PUy8owhmOA+mCYLiETYIkDcTHBTrmX+wpLezG9YdaDHr5cGnuEo5uEiXCaky47RoK/bChyJEW8jCuhk0aFdyQMUoc5jMY9pXAd5S+9cgnKo0TT1IMuNG02lx46KKqpDU5dsQWx9sExIa7NSHGDDbBP93PLYhRsNMkCBklZVvmCi+FdsT8bWRGD9u3K8O6qmB6HAcWy5V6iF6kPQBBtPN7IxxvZanQWddbsZJJFtVb0Kepu3SW
      Source: BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWz8_x
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}ntEKn(
      Source: BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A143F0 IsDebuggerPresent,IsProcessorFeaturePresent,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegCloseKey,GetComputerNameA,2_2_02A143F0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 CreateThread,FindCloseChangeNotification,Sleep,GetTempPathA,CreateDirectoryA,CreateDirectoryA,CreateDirectoryA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,SetCurrentDirectoryA,CreateMutexA,GetLastError,Sleep,Sleep,Sleep,shutdown,closesocket,WSACleanup,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,Sleep,Sleep,Sleep,GetModuleHandleA,GetProcAddress,GetCurrentProcess,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,OutputDebugStringA,CreateThread,CreateThread,CreateThread,FreeLibrary,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,CloseHandle,OutputDebugStringA,CreateMutexA,GetLastError,Sleep,Sleep,Sleep,Sleep,Sleep,shutdown,closesocket,Sleep,2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3C720 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,2_2_02A3C720
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1C000 mov eax, dword ptr fs:[00000030h]2_2_02A1C000
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62460 mov eax, dword ptr fs:[00000030h]2_2_02A62460
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62460 mov eax, dword ptr fs:[00000030h]2_2_02A62460
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A6286B mov eax, dword ptr fs:[00000030h]2_2_02A6286B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A6286B mov eax, dword ptr fs:[00000030h]2_2_02A6286B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A6286B mov eax, dword ptr fs:[00000030h]2_2_02A6286B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A6286B mov eax, dword ptr fs:[00000030h]2_2_02A6286B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov ecx, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A62F97 mov eax, dword ptr fs:[00000030h]2_2_02A62F97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A3D840 mov eax, dword ptr fs:[00000030h]2_2_02A3D840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1C000 mov eax, dword ptr fs:[00000030h]2_2_02A1C000
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A141E0 mov eax, dword ptr fs:[00000030h]2_2_02A141E0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A641C3 mov eax, dword ptr fs:[00000030h]2_2_02A641C3
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A64405 mov eax, dword ptr fs:[00000030h]2_2_02A64405
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14840 mov eax, dword ptr fs:[00000030h]2_2_02A14840
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1C000 mov eax, dword ptr fs:[00000030h]2_2_02A1C000
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A14D29 mov eax, dword ptr fs:[00000030h]2_2_02A14D29
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A153F8 mov eax, dword ptr fs:[00000030h]2_2_02A153F8
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1C000 mov eax, dword ptr fs:[00000030h]2_2_02A1C000
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A63058 mov eax, dword ptr fs:[00000030h]2_2_02A63058
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A15718 mov eax, dword ptr fs:[00000030h]2_2_02A15718
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1C000 mov eax, dword ptr fs:[00000030h]2_2_02A1C000
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A638E8 mov eax, dword ptr fs:[00000030h]2_2_02A638E8
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A15970 mov ecx, dword ptr fs:[00000030h]2_2_02A15970
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A1FF70 mov eax, dword ptr fs:[00000030h]2_2_02A1FF70
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A089A0 GetModuleHandleA,GetProcAddress,GetProcessHeap,HeapAlloc,HeapFree,HeapAlloc,HeapFree,2_2_02A089A0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADE6E4 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02ADE6E4
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADEA8D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_02ADEA8D
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02AE2FC4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02AE2FC4
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0508D469 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0508D469
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_050964F5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_050964F5
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_0508D756 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0508D756

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2A00000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 26B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2EA0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A19EB0 VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAllocEx,LoadLibraryA,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,2_2_02A19EB0
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2A00000 value starts with: 4D5AJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 26B0000 value starts with: 4D5AJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2EA0000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2A00000Jump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 29BD008Jump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 26B0000Jump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 29DA008Jump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2EA0000Jump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2C4C008Jump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02ADE2E6 cpuid 2_2_02ADE2E6
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_02A0C390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoEx,FormatMessageA,2_2_02ADC1B6
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,2_2_02AFE6DB
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_02AFEAF8
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_02AFEA6D
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_02AFE8E0
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_02AFE987
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_02AFE9D2
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_02AFEE74
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_02AFEF7A
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_02AFED4B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_02AFF050
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_02AF596A
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_02AF5EED
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_050A841C
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_050A8117
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_050A8346
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_050A8240
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_050A7D53
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_050A7D51
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_050A7D9E
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,2_2_0509BD97
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoEx,FormatMessageA,2_2_05089F98
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_050A7E39
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_050A7EC4
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: EnumSystemLocalesW,2_2_0509B82B
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Users\user\Desktop\MXpl6HFisn.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Users\user\Desktop\MXpl6HFisn.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0C390 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_02A0C390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0C390 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_02A0C390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A0C390 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetCurrentHwProfileA,GetModuleHandleExA,GetModuleFileNameA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetComputerNameA,GetUserNameA,GetDesktopWindow,GetWindowRect,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,GetLocalTime,GetSystemTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,EnumDisplayDevicesA,EnumDisplayDevicesA,CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,Process32Next,CloseHandle,RegOpenKeyExA,RegEnumKeyExA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegCloseKey,2_2_02A0C390
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 2_2_02A92B40 GetVersionExA,CreateFileW,CreateFileA,GetDiskFreeSpaceW,GetDiskFreeSpaceA,2_2_02A92B40
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000002.00000003.1836476956.0000000005203000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gC7STejDE3WmjzylxWa3QT6.zip, type: DROPPED
      Source: BitLockerToGo.exe, 00000002.00000003.1831664218.0000000004F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
      Source: BitLockerToGo.exe, 00000002.00000003.1831664218.0000000004F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\ElectronCash\wallets
      Source: MXpl6HFisn.exeString found in binary or memory: xLto3LGtv5CKXSSE5+nVIVaYPjAXXGgqV6cjexCM4VtMBfGvXcNh7/76oyR9jWbgZkloaUNL4OwebNCXz0RIHaVzY6vRG03qCgbw7IYhmoT4V5OP/xcFjPgrZNZB8YMIQdGec81HD/fLYV4cOYssg9TbUjN7/mEKRq1lKBntR05T5l4BXNuC3o/CAO6dFIgqDSiSrME85itPr1HsR8pMwsntWSCnOw9awPz9NljR+I3n3EcUKlAAB16Ge1MzHCgJVktU
      Source: BitLockerToGo.exe, 00000002.00000003.1834309967.0000000004F6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: BitLockerToGo.exe, 00000002.00000003.1834309967.0000000004F6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
      Source: BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ledger Live
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\places.sqliteJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_blnieiiffboillknjnepogjhkgnoapac_0.indexeddb.leveldb\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_cjelfplplebdjjenllpjcblmjkfcffne_0.indexeddb.leveldb\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\signons.sqliteJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\formhistory.sqliteJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\signons.sqliteJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\logins.jsonJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENTJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000002.00000003.1836476956.0000000005203000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\gC7STejDE3WmjzylxWa3QT6.zip, type: DROPPED
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure1
      Valid Accounts
      11
      Native API
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      1
      OS Credential Dumping
      12
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts2
      Command and Scripting Interpreter
      1
      Create Account
      1
      Valid Accounts
      2
      Obfuscated Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol2
      Data from Local System
      21
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAt1
      Valid Accounts
      1
      Access Token Manipulation
      1
      DLL Side-Loading
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin Shares1
      Screen Capture
      1
      Non-Standard Port
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCron11
      Registry Run Keys / Startup Folder
      411
      Process Injection
      1
      Masquerading
      NTDS57
      System Information Discovery
      Distributed Component Object Model1
      Email Collection
      2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
      Registry Run Keys / Startup Folder
      1
      Valid Accounts
      LSA Secrets241
      Security Software Discovery
      SSHKeylogging13
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Access Token Manipulation
      Cached Domain Credentials111
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
      Virtualization/Sandbox Evasion
      DCSync2
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job411
      Process Injection
      Proc Filesystem1
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
      System Network Configuration Discovery
      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1417443 Sample: MXpl6HFisn.exe Startdate: 29/03/2024 Architecture: WINDOWS Score: 100 28 ipinfo.io 2->28 30 db-ip.com 2->30 46 Snort IDS alert for network traffic 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 4 other signatures 2->52 7 MXpl6HFisn.exe 1 3 2->7         started        11 (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe 2 2->11         started        13 (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe 2 2->13         started        signatures3 process4 file5 26 (0aadbca2d0a26b8f9...2ffc)MXpl6HFisn.exe, PE32+ 7->26 dropped 54 Creates autostart registry keys with suspicious names 7->54 56 Writes to foreign memory regions 7->56 58 Allocates memory in foreign processes 7->58 15 BitLockerToGo.exe 81 7->15         started        60 Multi AV Scanner detection for dropped file 11->60 62 Injects a PE file into a foreign processes 11->62 20 BitLockerToGo.exe 2 11->20         started        22 BitLockerToGo.exe 2 13->22         started        signatures6 process7 dnsIp8 32 95.216.41.236, 49730, 49739, 49740 HETZNER-ASDE Germany 15->32 34 ipinfo.io 34.117.186.192, 443, 49732, 49741 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 15->34 36 db-ip.com 104.26.5.15, 443, 49734, 49742 CLOUDFLARENETUS United States 15->36 24 C:\Users\user\...\gC7STejDE3WmjzylxWa3QT6.zip, Zip 15->24 dropped 38 Tries to steal Mail credentials (via file / registry access) 15->38 40 Found many strings related to Crypto-Wallets (likely being stolen) 15->40 42 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 15->42 44 3 other signatures 15->44 file9 signatures10

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      MXpl6HFisn.exe36%VirustotalBrowse
      MXpl6HFisn.exe42%ReversingLabsWin64.Trojan.Generic
      SourceDetectionScannerLabelLink
      C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe42%ReversingLabsWin64.Trojan.Generic
      C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe47%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://t.p0%Avira URL Cloudsafe
      https://t.V0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      ipinfo.io
      34.117.186.192
      truefalse
        high
        db-ip.com
        104.26.5.15
        truefalse
          high
          NameMaliciousAntivirus DetectionReputation
          https://db-ip.com/demo/home.php?s=102.165.48.43false
            high
            https://ipinfo.io/widget/demo/102.165.48.43false
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtabBitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                high
                https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFBitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://ipinfo.io:443/widget/demo/102.165.48.43:BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003216000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003217000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://duckduckgo.com/ac/?q=BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                      high
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoBitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                        high
                        https://ipinfo.io/OBitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t.me/risepro_botrisepBitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://ipinfo.io/RBitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://db-ip.com/BitLockerToGo.exe, 00000002.00000003.1803412679.0000000002C34000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://ipinfo.io/widget/demo/102.165.48.43oBitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://t.pBitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllMXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7C70000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DDB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1960476547.000000C001CF8000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1881301271.0000027776EB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920173465.00000000026B0000.00000040.00000400.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999600227.0000000002EA0000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                                      high
                                      https://golang.org/doc/faq#nil_errortls:MXpl6HFisn.exe, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe.0.drfalse
                                        high
                                        https://ipinfo.io:443/widget/demo/102.165.48.43P$BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002BF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://db-ip.com/sBitLockerToGo.exe, 00000002.00000003.1803412679.0000000002C34000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://t.me/RiseProSUPPORTBitLockerToGo.exe, 00000002.00000002.4067895125.0000000002B90000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920528481.0000000002B48000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                                                high
                                                https://db-ip.com/-BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016BitLockerToGo.exe, 00000002.00000003.1826342628.0000000004F64000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828530915.0000000004F7C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17BitLockerToGo.exe, 00000002.00000003.1826342628.0000000004F64000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828530915.0000000004F7C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://db-ip.com:443/demo/home.php?s=102.165.48.43BitLockerToGo.exe, 00000002.00000002.4067895125.0000000002BF6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BD0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BD0000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003216000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003217000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.ecosia.org/newtab/BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                                                          high
                                                          https://ipinfo.io/Mozilla/5.0BitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C14000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BC3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BC3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003235000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBitLockerToGo.exe, 00000002.00000003.1828806562.0000000004F4E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ac.ecosia.org/autocomplete?q=BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                                                                high
                                                                https://t.me/risepro_botBitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.000000000329B000.00000004.00000020.00020000.00000000.sdmp, passwords.txt.2.drfalse
                                                                  high
                                                                  https://t.VBitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://ipinfo.io/BitLockerToGo.exe, 00000005.00000002.1920528481.0000000002B48000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.0000000003235000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999895233.0000000003235000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://t.me/RiseProSUPPORTRBitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://t.me/risepro_botbackupBitLockerToGo.exe, 00000002.00000002.4068012610.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.3882223341.0000000002C31000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.maxmind.com/en/locate-my-ip-addressBitLockerToGo.exefalse
                                                                          high
                                                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                                                                            high
                                                                            https://ipinfo.io/sBitLockerToGo.exe, 00000005.00000002.1920528481.0000000002B48000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://ipinfo.io/tBitLockerToGo.exe, 00000008.00000002.1999851047.00000000031B7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://www.winimage.com/zLibDllMXpl6HFisn.exe, 00000000.00000002.1767327389.000000C001E3E000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1763770095.0000023CE7C70000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000003.1701201194.0000023CE7B30000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C00296C000.00000004.00001000.00020000.00000000.sdmp, MXpl6HFisn.exe, 00000000.00000002.1769068121.000000C002400000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1865976558.000001E67DDB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000002.1869403565.000000C001CE6000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000001.00000003.1807163070.000001E67DC70000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, BitLockerToGo.exe, 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1960476547.000000C001CF8000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000003.1881301271.0000027776EB0000.00000004.00001000.00020000.00000000.sdmp, (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920173465.00000000026B0000.00000040.00000400.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000002.1999600227.0000000002EA0000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://ipinfo.io:443/widget/demo/102.165.48.43BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BC3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BC3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BitLockerToGo.exe, 00000002.00000003.1825988400.0000000004F67000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1827211496.0000000004F86000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000002.00000003.1828884319.0000000004F8D000.00000004.00000020.00020000.00000000.sdmp, jKXEuRSxIEMXWeb Data.2.drfalse
                                                                                      high
                                                                                      https://t.me/risepro_bottBitLockerToGo.exe, 00000005.00000002.1920564820.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://t.me/risepro_botisepro_botcBitLockerToGo.exe, 00000005.00000003.1919146241.0000000002BDE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000008.00000003.1999122763.000000000326C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          34.117.186.192
                                                                                          ipinfo.ioUnited States
                                                                                          139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                          95.216.41.236
                                                                                          unknownGermany
                                                                                          24940HETZNER-ASDEtrue
                                                                                          104.26.5.15
                                                                                          db-ip.comUnited States
                                                                                          13335CLOUDFLARENETUSfalse
                                                                                          Joe Sandbox version:40.0.0 Tourmaline
                                                                                          Analysis ID:1417443
                                                                                          Start date and time:2024-03-29 09:51:12 +01:00
                                                                                          Joe Sandbox product:CloudBasic
                                                                                          Overall analysis duration:0h 11m 14s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:full
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                          Number of analysed new started processes analysed:10
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Sample name:MXpl6HFisn.exe
                                                                                          renamed because original name is a hash value
                                                                                          Original Sample Name:0aadbca2d0a26b8f90fd4f31cb7f2ffc.exe
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.spyw.evad.winEXE@9/24@2/3
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 33.3%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 69%
                                                                                          • Number of executed functions: 74
                                                                                          • Number of non-executed functions: 0
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .exe
                                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                          • Execution Graph export aborted for target (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe, PID 2032 because there are no executed function
                                                                                          • Execution Graph export aborted for target MXpl6HFisn.exe, PID 6880 because there are no executed function
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                          • Report size getting too big, too many NtCreateFile calls found.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          TimeTypeDescription
                                                                                          08:51:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
                                                                                          08:52:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run (0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
                                                                                          09:52:18API Interceptor7436556x Sleep call for process: BitLockerToGo.exe modified
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          34.117.186.192SecuriteInfo.com.Win32.Evo-gen.24318.16217.exeGet hashmaliciousUnknownBrowse
                                                                                          • ipinfo.io/json
                                                                                          SecuriteInfo.com.Win32.Evo-gen.28489.31883.exeGet hashmaliciousUnknownBrowse
                                                                                          • ipinfo.io/json
                                                                                          Raptor.HardwareService.Setup 1.msiGet hashmaliciousUnknownBrowse
                                                                                          • ipinfo.io/ip
                                                                                          Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                                                                                          • ipinfo.io/
                                                                                          Conferma_Pdf_Editor.exeGet hashmaliciousPlanet StealerBrowse
                                                                                          • ipinfo.io/
                                                                                          w.shGet hashmaliciousXmrigBrowse
                                                                                          • /ip
                                                                                          Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                                                                          • ipinfo.io/ip
                                                                                          Raptor.HardwareService.Setup_2.3.6.0.msiGet hashmaliciousUnknownBrowse
                                                                                          • ipinfo.io/ip
                                                                                          uUsgzQ3DoW.exeGet hashmaliciousRedLineBrowse
                                                                                          • ipinfo.io/ip
                                                                                          8BZBgbeCcz.exeGet hashmaliciousRedLineBrowse
                                                                                          • ipinfo.io/ip
                                                                                          104.26.5.15SecuriteInfo.com.Win64.Evo-gen.17494.7440.exeGet hashmaliciousUnknownBrowse
                                                                                          • api.db-ip.com/v2/free/127.0.0.1
                                                                                          Nemty.exeGet hashmaliciousNemtyBrowse
                                                                                          • api.db-ip.com/v2/free/84.17.52.2/countryName
                                                                                          227.exeGet hashmaliciousNemtyBrowse
                                                                                          • api.db-ip.com/v2/free/102.129.143.40/countryName
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          ipinfo.ioXqC4Zcp8qg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          3MdZ1WiAYP.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          7GofFHQDvk.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          88Oj06xDol.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          uQeIMs91Vh.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                                                          • 34.117.186.192
                                                                                          jUlAlD6KHz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          Iv88OQbqpE.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          https://cloudflare-ipfs.com/ipfs/QmWogjL6GutGKbdVU2x417hXn56fpyEV8KCHFJUBJrcBaA/#hello@domain.comGet hashmaliciousHTMLPhisherBrowse
                                                                                          • 34.117.186.192
                                                                                          i1crvbOZAP.exeGet hashmaliciousAmadey, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                                                                          • 34.117.186.192
                                                                                          db-ip.comXqC4Zcp8qg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          3MdZ1WiAYP.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 172.67.75.166
                                                                                          7GofFHQDvk.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 172.67.75.166
                                                                                          88Oj06xDol.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          uQeIMs91Vh.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                                                          • 104.26.5.15
                                                                                          jUlAlD6KHz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          Iv88OQbqpE.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 172.67.75.166
                                                                                          i1crvbOZAP.exeGet hashmaliciousAmadey, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                                                                          • 104.26.4.15
                                                                                          file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
                                                                                          • 172.67.75.166
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          GOOGLE-AS-APGoogleAsiaPacificPteLtdSGl2ZKczbGRq.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                                                          • 34.117.186.192
                                                                                          XqC4Zcp8qg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          3MdZ1WiAYP.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          7GofFHQDvk.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          88Oj06xDol.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          https://attwebupdate.w3spaces.com/Get hashmaliciousUnknownBrowse
                                                                                          • 34.117.239.71
                                                                                          uQeIMs91Vh.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                                                          • 34.117.186.192
                                                                                          jUlAlD6KHz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          Iv88OQbqpE.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 34.117.186.192
                                                                                          HETZNER-ASDEMcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                                                          • 144.76.170.20
                                                                                          getscreen-728974364.exeGet hashmaliciousUnknownBrowse
                                                                                          • 5.75.168.191
                                                                                          getscreen-728974364.exeGet hashmaliciousUnknownBrowse
                                                                                          • 5.75.168.191
                                                                                          file.exeGet hashmaliciousVidarBrowse
                                                                                          • 78.46.229.36
                                                                                          BuThoFHNNK.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                                                                                          • 78.46.229.36
                                                                                          6uVlPQSJ4e.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                                                                                          • 78.46.229.36
                                                                                          file.exeGet hashmaliciousVidarBrowse
                                                                                          • 78.46.229.36
                                                                                          JAJL2EYBPH.exeGet hashmaliciousDCRatBrowse
                                                                                          • 138.201.79.103
                                                                                          https://mnrdtfqrcyfqiou.s3.amazonaws.com/mnrdtfqrcyfqiou.html#4HHHnO7279bGJq492fumheqtoju1686NCUIKVMPNMDQVMT689230/736882Y21#qgow23ahs76jjbq8j26ouc8n3ucpjfst25g85oeaei03mafty5n389rGet hashmaliciousHTMLPhisherBrowse
                                                                                          • 49.12.134.254
                                                                                          cvdLNZXNPZ.elfGet hashmaliciousMiraiBrowse
                                                                                          • 188.42.90.189
                                                                                          CLOUDFLARENETUShttps://airdrop-online-altlayer-anniversary.s3.us-east-2.amazonaws.com/posten.html?cid=freetomfr@hotmail.comGet hashmaliciousPhisherBrowse
                                                                                          • 172.64.150.248
                                                                                          7ITPeT3VWW.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.38.98
                                                                                          l2ZKczbGRq.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                                                          • 104.26.4.15
                                                                                          XqC4Zcp8qg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          3MdZ1WiAYP.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 172.67.75.166
                                                                                          7GofFHQDvk.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 172.67.75.166
                                                                                          TBC#01 Rev.A3 - lnexa.xls.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                          • 104.26.12.205
                                                                                          DHL_LHER000678175.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                          • 172.67.74.152
                                                                                          inpau292101.jsGet hashmaliciousFormBookBrowse
                                                                                          • 172.67.215.45
                                                                                          https://brilink.me/xD6ksaGet hashmaliciousUnknownBrowse
                                                                                          • 104.21.37.172
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          a0e9f5d64349fb13191bc781f81f42e17ITPeT3VWW.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          XqC4Zcp8qg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          3MdZ1WiAYP.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          7GofFHQDvk.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          20qMFnd9tO.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          88Oj06xDol.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          uQeIMs91Vh.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, RisePro Stealer, zgRATBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          Zam#U00f3wienie_27900045542300.CMD.cmdGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          jUlAlD6KHz.exeGet hashmaliciousRisePro StealerBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          Document 20240327_1188908_1188909.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                          • 104.26.5.15
                                                                                          • 34.117.186.192
                                                                                          No context
                                                                                          Process:C:\Users\user\Desktop\MXpl6HFisn.exe
                                                                                          File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                          Category:dropped
                                                                                          Size (bytes):21056512
                                                                                          Entropy (8bit):5.476356034801967
                                                                                          Encrypted:false
                                                                                          SSDEEP:98304:rFrNAOGfsjEhnR91LLdASLKR7jjYLgIXW86sfr9rmp4QJEf3v5EzlNTDLjDvIy0:3G0jEhnlLLdAdjjY84NAEf3vaBNHjc
                                                                                          MD5:0AADBCA2D0A26B8F90FD4F31CB7F2FFC
                                                                                          SHA1:57246459C3890DFCD49FB792CC55A45E3BD6C48E
                                                                                          SHA-256:4BEE7D558A5346BFFA5CC2393B579BD8ABBDD6BEEF0EDE8E71AEAE10DD5FF207
                                                                                          SHA-512:62D64664DC307C423BCE2EF3BE545026DFDC120598E42B22AB51A2F1C139BE7D2C083E68D03605F8E85CEB764DC8E9B51F6D51F12EA4D67C33123CDF47D99CE3
                                                                                          Malicious:true
                                                                                          Antivirus:
                                                                                          • Antivirus: ReversingLabs, Detection: 42%
                                                                                          • Antivirus: Virustotal, Detection: 47%, Browse
                                                                                          Reputation:low
                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$..l..HA................@..............................J......TA...`... .......................................G.N.....G.X....PG......`;.(i............H.8?...........................K;.(.....................G.X............................text.....l.......l.................`.``.data.........l.......l.............@.`..rdata..0.....s.......s.............@.`@.pdata..(i...`;..j...H;.............@.0@.xdata..P.....=.......=.............@.0@.bss.... .....=.......................`..edata..N.....G.......=.............@.0@.idata..X.....G.......=.............@.0..CRT....p....0G.......=.............@.@..tls.........@G.......=.............@.@..rsrc........PG..0....=.............@.0..reloc..8?....H..@....?.............@.0B................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:ASCII text, with very long lines (769), with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):6085
                                                                                          Entropy (8bit):6.038274200863744
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:gxsumX/xKO2KbcRfbZJ5Jxjxcx1xcbza5BC126oxgxA26Fxr/CxbTxqCGYURxOeb:gWFXZQHRFJ5Pts7c3avC126Ygb6Lr/WY
                                                                                          MD5:ACB5AD34236C58F9F7D219FB628E3B58
                                                                                          SHA1:02E39404CA22F1368C46A7B8398F5F6001DB8F5C
                                                                                          SHA-256:05E5013B848C2E619226F9E7A084DC7DCD1B3D68EE45108F552DB113D21B49D1
                                                                                          SHA-512:5895F39765BA3CEDFD47D57203FD7E716347CD79277EDDCDC83A729A86E2E59F03F0E7B6B0D0E7C7A383755001EDACC82171052BE801E015E6BF7E6B9595767F
                                                                                          Malicious:false
                                                                                          Reputation:moderate, very likely benign file
                                                                                          Preview:.google.com.TRUE./.TRUE.1712145003.NID.ENC893*_djEw3+k+F2A/rK1XOX2BXUq6pY2LBCOzoXODiJnrrvDbDsPWiYwKZowg9PxHqkTm37HpwC52rXpnuUFrQMpV3iKtdSHegOm+XguZZ6tGaCY2hGVyR8JgIqQma1WLXyhCiWqjou7/c3qSeaKyNoUKHa4TULX4ZnNNtXFoCuZcBAAy4tYcz+0BF4j/0Pg+MgV+s7367kYcjO4q3zwc+XorjSs7PlgWlYrcc55rCJplhJ+H13M00HIdLm+1t9PACck2xxSWX2DsA61sEDJCHEc=_b3i0u6LLcKCMUaF/UlQgEPSL9PtLZ21CuT1dJkfCzME=*..support.microsoft.com.FALSE./.TRUE.1696413835..AspNetCore.AuthProvider.ENC893*_djEwVWJCCNyFkY3ZM/58ZZ/F/bz9H1yPvi6FOaroXC+KU8E=_b3i0u6LLcKCMUaF/UlQgEPSL9PtLZ21CuT1dJkfCzME=*..support.microsoft.com.TRUE./signin-oidc.TRUE.1696414135..AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuU.ENC893*_djEwBAKLrkJs5PZ6BD7Beoa9N/bOSh5JtRch10gZT+E=_b3i0u6LLcKCMUaF/UlQgEPSL9PtLZ21CuT1dJkfCzME=*..support.microsoft.com.TRUE./signin-oidc.TRUE.1696414135..AspNetCore.OpenIdConnect.Nonce.CfDJ8Kiuy_B5JgFMo7PeP95NLhqwcJ8koDy5pXkfoWsb5SbbU2hVCbsH2qt9GF_OVCqFkLEwhvzeADNQOF5RSmkDfh5RqfqlOkx5QWo4Lltvwb0CvwBFD8ujlm3BAglOeGca3ZatkLMUkH
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):112
                                                                                          Entropy (8bit):4.911305722693245
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:N8DSLvIJiMgTE2WdkQUl7R8DSLvIJiMhKVX3L2WdkQUlv:2OLciodq7R8OLciA8dqv
                                                                                          MD5:978B9515D3688A43726604AC169DF379
                                                                                          SHA1:D61293AB99332FC45CAE37D78AB17A5DA5BCD189
                                                                                          SHA-256:CDEF3FB1CE312E4B67DC5F1B1F9FB551241C08564FDB26AFA4CBF448BB02EA65
                                                                                          SHA-512:86146AA576129B73743B1EBC0BC60880FDA58A11498048B3C68284C4520F1ADC324D016696B0E995A51AC56966E0F38B0AF12458A986868701C6AAAA89C829CB
                                                                                          Malicious:false
                                                                                          Reputation:moderate, very likely benign file
                                                                                          Preview:https://www.mozilla.org/privacy/firefox/.1696333827..https://www.mozilla.org/en-US/privacy/firefox/.1696333827..
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:ASCII text, with CRLF, LF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):5346
                                                                                          Entropy (8bit):5.320945751433256
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:xzZPBuRUoQcT4Aisph+9hcmz+GftHToANUbg3x:xyGoQvAtphWhcmz+GHB
                                                                                          MD5:1223F1E6639681C771D2ACC0A1E3855C
                                                                                          SHA1:BE2B113015854F03D5CFAE4504EED8BA53C83316
                                                                                          SHA-256:08861592823B784CF1097B4C30AD16C3C9C006F5740820A91FD856277A9E0333
                                                                                          SHA-512:CC75082B7D0F62D1CA07D9828975C449E4281AF6233572BCD607D79F811A55DCD054BBF66E651A29F4C79738B7B59EE215594A6D88AF80D35533BA51F3778BB0
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:Build: default..Version: 1.7....Date: Fri Mar 29 09:52:18 2024.MachineID: 9e146be9-c76a-4720-bcdb-53011b87bd06..GUID: {a33c7340-61ca-11ee-8c18-806e6f6e6963}..HWID: c7fc9cec10a0ccc99d2aed642316ca86....Path: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe..Work Dir: C:\Users\user\AppData\Local\Temp\adobe3S903DOZntEK....IP: 102.165.48.43..Location: US, Washington..ZIP (Autofills): -..Windows: Windows 10 Pro [x64]..Computer Name: 506407 [WORKGROUP]..User Name: user..Display Resolution: 1280x1024..Display Language: en-CH..Keyboard Languages: English (United Kingdom) / English (United Kingdom)..Local Time: 29/3/2024 9:52:18..TimeZone: UTC1....[Hardware]..Processor: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz..CPU Count: 4..RAM: 8191 MB..VideoCard #0: Microsoft Basic Display Adapter....[Processes]..System [4]..Registry [92]..smss.exe [324]..csrss.exe [408]..wininit.exe [484]..csrss.exe [492]..winlogon.exe [552]..services.exe [620]..lsass.exe [628]..svchost.exe [752]..fontdrvhost.ex
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:Unicode text, UTF-8 text, with CRLF, LF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4897
                                                                                          Entropy (8bit):2.518316437186352
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:4MMMMMMMMMMdMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMM1MMMMMMMMMMdMMMMMMMM3:q
                                                                                          MD5:B3E9D0E1B8207AA74CB8812BAAF52EAE
                                                                                          SHA1:A2DCE0FB6B0BBC955A1E72EF3D87CADCC6E3CC6B
                                                                                          SHA-256:4993311FC913771ACB526BB5EF73682EDA69CD31AC14D25502E7BDA578FFA37C
                                                                                          SHA-512:B17ADF4AA80CADC581A09C72800DA22F62E5FB32953123F2C513D2E88753C430CC996E82AAE7190C8CB3340FCF2D9E0D759D99D909D2461369275FBE5C68C27A
                                                                                          Malicious:false
                                                                                          Reputation:moderate, very likely benign file
                                                                                          Preview:................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                                                          Category:dropped
                                                                                          Size (bytes):711390
                                                                                          Entropy (8bit):7.926039821425995
                                                                                          Encrypted:false
                                                                                          SSDEEP:12288:Yr0TCybz8atmfvuws3ej+LjJP0EMr2NZ61X49kbf+Lef9NvLJ1Dvi:Yr0TCybzZmHuyiPJcEtZ619bBf9Nv3Da
                                                                                          MD5:FC095005D226AFC7C9834E94BDF42A21
                                                                                          SHA1:16CC433E86E00617D5B17593FC0C8DB0D89F3A2A
                                                                                          SHA-256:BAE5B778D819BE2AF729DBF18483AC6F8F9ED9E85D0A0E01972C232D26BA6F08
                                                                                          SHA-512:964280173F5085E841270A3F7A80447206D09D3949FE0C135A7E6492A7ECAC843CD06B6F1A62CC8043FC82CF72624FB28A8C7F92649B471066476B3398AF1699
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....]..s.U.zt......W.Ww.]U..._......69HBd.......1..0Y........&.@..9. .....0...........<..s..e..Xk.5.....l..s.].].F.-k....qnvlE......-..F.......6..:.vn.s.s^oD..H_F=.W/..=-}g.R?ku...*A_.^.}..~......;.....S_]..f..S...O......S?qE[.N(......X....JG..p..]V.7B..<".~......{J.{/tE_F.....w.V.....w..!..\K...q}........|.....t..O...aKJ.......hI.F.W./.J\..w..r..../=^.....|).Wl...XK.?....G...-...#.....c.<Gc..1..}..k,...........<4.;o..| ..^..}.00..!...@..SK....>....q1O0f..A...'#....s...q..........q..{.0.<...7.q...U...|0.?0.q......}1>...w.)6..{..c.~1......(..X..{/....>....{.1......./L.9.b;.X..O^....'.1......Z....!..{-......0..3..1/Q...*6q...}.osi.........P........g...}......`.....mm.;S...%.........?......~wj5Vl`....q.].J0....5.w...........8&'.....&.<b}..;..O.3.M.#.....7B.>..j...q.........5;.iq}l5....v.=.O..}b.....&........k....;..j..b.....s......bB..
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                          Category:dropped
                                                                                          Size (bytes):699426
                                                                                          Entropy (8bit):7.997663873659064
                                                                                          Encrypted:true
                                                                                          SSDEEP:12288:tyew37DsWKZ2pMzTYoO2kQJHM+RDZoBlWc9jFtL53UJjgfBG5FkT4:tyewrKLYoO2kYDZMlZX95AsZ+Fk8
                                                                                          MD5:D43F959A9FB0C3623E71D9436F1DBEBD
                                                                                          SHA1:296E7B8B86AB54598185C99656D15B2C9DCEC0CF
                                                                                          SHA-256:8CBDA65FA1D7ECF05A2B0171DDC94D7E94FCDC0472607181A0210A6680E78753
                                                                                          SHA-512:4590F8EA39A0E826BA5730C74958751E6C9253113F9DF3EEE62270517B92F319CB3D35A898CB9929BBC995ADA5291A5EFE75635463FA9973B5189675A0EDE5AA
                                                                                          Malicious:true
                                                                                          Yara Hits:
                                                                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: C:\Users\user\AppData\Local\Temp\gC7STejDE3WmjzylxWa3QT6.zip, Author: Joe Security
                                                                                          Preview:PK.........N}X................Cookies\..PK.........N}XQn.+............Cookies\Chrome_Default.txt.G..r...U.#.5C.....s$..-.D...7.\..$.G.)o....:....Z.C.f_..pm............"..t..t....}.k.@...a.2+P`.0.x.>....s..k%.._..b..P..((......B.....`.7..-m..JY..F....E.*.l.....I..&.....<J..M.......,V...)b.....Q..k......M?.5L....h}......X..'.0..tB.G...\;.a....4.......B4.......J.4.6.y:....4.-.UfE...3A*p.U5UX....Z.g:*e.j.C..Bw..........e..a^.vU:....$..U......B..`._.e.....+...9.{u...7.e...H.]02...%yR".0...x...P<..N....R.}....{.G...;..c..x...kw.'S>.d|.....B..k.9.t.!>.rh...~n.[....s#/....`.!..Kb8%&.vZB`....O|.....>K......L*...d0..03..t...T&.......`N.xp.."..J.......Q.....c..5...).Z.91.6.j..G.....Wr...a.52!..(^.U.....6....dB.D.^...7..0H.\J9.H.$^`e"..d...\....B.8Z=.qeP.3Y.>..'W.X..T..>z...,..K......g....%B.w4#...;.[]u|....v...3.;L..U?..b.....u..*..... .......F...P.a...|R*3.=......r.:.64...#D..^..>.A..ZT.]E........t...f...1..3.....`...X.....C.]%...p.p.ym
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                          Category:dropped
                                                                                          Size (bytes):98304
                                                                                          Entropy (8bit):0.08235737944063153
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):5242880
                                                                                          Entropy (8bit):0.037963276276857943
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                                          MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                                          SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                                          SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                                          SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):126976
                                                                                          Entropy (8bit):0.47147045728725767
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                                                                          MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                                                                          SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                                                                          SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                                                                          SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):126976
                                                                                          Entropy (8bit):0.47147045728725767
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                                                                          MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                                                                          SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                                                                          SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                                                                          SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):5242880
                                                                                          Entropy (8bit):0.037963276276857943
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                                          MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                                          SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                                          SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                                          SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                          Category:dropped
                                                                                          Size (bytes):106496
                                                                                          Entropy (8bit):1.1358696453229276
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                          MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                          SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                          SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                          SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                          Category:dropped
                                                                                          Size (bytes):40960
                                                                                          Entropy (8bit):0.8553638852307782
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):114688
                                                                                          Entropy (8bit):0.9746603542602881
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                                          Category:dropped
                                                                                          Size (bytes):28672
                                                                                          Entropy (8bit):2.5793180405395284
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                                          MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                                          SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                                          SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                                          SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                          Category:dropped
                                                                                          Size (bytes):40960
                                                                                          Entropy (8bit):0.8553638852307782
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                          Category:dropped
                                                                                          Size (bytes):106496
                                                                                          Entropy (8bit):1.1358696453229276
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                          MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                          SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                          SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                          SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):114688
                                                                                          Entropy (8bit):0.9746603542602881
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                                                          Category:dropped
                                                                                          Size (bytes):159744
                                                                                          Entropy (8bit):0.7873599747470391
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                                                          MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                                                          SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                                                          SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                                                          SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                          Category:dropped
                                                                                          Size (bytes):49152
                                                                                          Entropy (8bit):0.8180424350137764
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                          MD5:349E6EB110E34A08924D92F6B334801D
                                                                                          SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                          SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                          SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                                                          Category:dropped
                                                                                          Size (bytes):159744
                                                                                          Entropy (8bit):0.7873599747470391
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                                                          MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                                                          SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                                                          SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                                                          SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                          Category:dropped
                                                                                          Size (bytes):106496
                                                                                          Entropy (8bit):1.1358696453229276
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                          MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                          SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                          SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                          SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                          Category:dropped
                                                                                          Size (bytes):114688
                                                                                          Entropy (8bit):0.9746603542602881
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                          Malicious:false
                                                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                          Entropy (8bit):5.476356034801967
                                                                                          TrID:
                                                                                          • Win64 Executable (generic) (12005/4) 74.95%
                                                                                          • Generic Win/DOS Executable (2004/3) 12.51%
                                                                                          • DOS Executable Generic (2002/1) 12.50%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                                          File name:MXpl6HFisn.exe
                                                                                          File size:21'056'512 bytes
                                                                                          MD5:0aadbca2d0a26b8f90fd4f31cb7f2ffc
                                                                                          SHA1:57246459c3890dfcd49fb792cc55a45e3bd6c48e
                                                                                          SHA256:4bee7d558a5346bffa5cc2393b579bd8abbdd6beef0ede8e71aeae10dd5ff207
                                                                                          SHA512:62d64664dc307c423bce2ef3be545026dfdc120598e42b22ab51a2f1c139be7d2c083e68d03605f8e85ceb764dc8e9b51f6d51f12ea4d67c33123cdf47d99ce3
                                                                                          SSDEEP:98304:rFrNAOGfsjEhnR91LLdASLKR7jjYLgIXW86sfr9rmp4QJEf3v5EzlNTDLjDvIy0:3G0jEhnlLLdAdjjY84NAEf3vaBNHjc
                                                                                          TLSH:9E274943E96544E8C0ADD534C5668262BB71BC488B3137D72BA0FB782F76BD0AE79710
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$..l..HA................@..............................J......TA...`... ............................
                                                                                          Icon Hash:13459ab2b25a6517
                                                                                          Entrypoint:0x1400014c0
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x140000000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                          Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                          TLS Callbacks:0x406c1520, 0x1, 0x406c14f0, 0x1, 0x406c4f90, 0x1
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:6
                                                                                          OS Version Minor:1
                                                                                          File Version Major:6
                                                                                          File Version Minor:1
                                                                                          Subsystem Version Major:6
                                                                                          Subsystem Version Minor:1
                                                                                          Import Hash:c595f1660e1a3c84f4d9b0761d23cd7a
                                                                                          Instruction
                                                                                          dec eax
                                                                                          sub esp, 28h
                                                                                          dec eax
                                                                                          mov eax, dword ptr [013B3CD5h]
                                                                                          mov dword ptr [eax], 00000001h
                                                                                          call 00007F9E14FC56CFh
                                                                                          nop
                                                                                          nop
                                                                                          dec eax
                                                                                          add esp, 28h
                                                                                          ret
                                                                                          nop dword ptr [eax]
                                                                                          dec eax
                                                                                          sub esp, 28h
                                                                                          dec eax
                                                                                          mov eax, dword ptr [013B3CB5h]
                                                                                          mov dword ptr [eax], 00000000h
                                                                                          call 00007F9E14FC56AFh
                                                                                          nop
                                                                                          nop
                                                                                          dec eax
                                                                                          add esp, 28h
                                                                                          ret
                                                                                          nop dword ptr [eax]
                                                                                          dec eax
                                                                                          sub esp, 28h
                                                                                          call 00007F9E1569080Ch
                                                                                          dec eax
                                                                                          test eax, eax
                                                                                          sete al
                                                                                          movzx eax, al
                                                                                          neg eax
                                                                                          dec eax
                                                                                          add esp, 28h
                                                                                          ret
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          dec eax
                                                                                          lea ecx, dword ptr [00000009h]
                                                                                          jmp 00007F9E14FC59E9h
                                                                                          nop dword ptr [eax+00h]
                                                                                          ret
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          nop
                                                                                          jmp dword ptr [eax]
                                                                                          inc edi
                                                                                          outsd
                                                                                          and byte ptr [edx+75h], ah
                                                                                          imul ebp, dword ptr [esp+20h], 203A4449h
                                                                                          and dh, byte ptr [esi]
                                                                                          xor byte ptr [eax+35h], cl
                                                                                          outsb
                                                                                          bound esi, dword ptr [edi]
                                                                                          outsb
                                                                                          arpl word ptr [esi], si
                                                                                          pop edi
                                                                                          pop ecx
                                                                                          push ecx
                                                                                          imul esi, dword ptr [esi], 49597369h
                                                                                          push 0000002Fh
                                                                                          dec eax
                                                                                          xor eax, 4E587041h
                                                                                          xor byte ptr [esi+51h], cl
                                                                                          insd
                                                                                          inc ebp
                                                                                          xor byte ptr [36723131h], dh
                                                                                          inc edi
                                                                                          dec ebx
                                                                                          das
                                                                                          jne 00007F9E14FC5A64h
                                                                                          dec edi
                                                                                          cmp byte ptr [ecx+76h], dl
                                                                                          cmp dword ptr [esi+35h], esi
                                                                                          pop ecx
                                                                                          xor eax, 00007237h
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x14700000x4e.edata
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x14710000x1458.idata
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x14750000x12e98.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x13b60000x26928.pdata
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x14880000x23f38.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x13b4b000x28.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x14714940x458.idata
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x10000x6cbac00x6cbc003a3601525da8761b1eb0a340212cf518unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .data0x6cd0000x6cdb00x6ce00eb594568ff57faa673dd863ef95ee5e6False0.31138328788748565dBase III DBT, version number 0, next free block index 10, 1st item "nkalti/backoff/v3\011v3.0.0\011h1:ske+9nBpD9qZsTBoF41nW5L+AIuFBKMeze18XQ3eG1c="4.748732255503778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .rdata0x73a0000xc7b9300xc7ba00f5aface59debe050022ea8cae52ab5c3unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                                          .pdata0x13b60000x269280x26a00fe29e22ae8b4694fbb9f22ea59540cf7False0.40243856189320387data5.940748306238338IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                                          .xdata0x13dd0000xc500xe00c9bbd713e749d858e5a7e9e0e5621a62False0.25864955357142855data3.9997040298344486IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                                          .bss0x13de0000x915200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .edata0x14700000x4e0x20029b57eede7f054d66fa260227508fb6dFalse0.08984375data0.6553641017611729IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                                                          .idata0x14710000x14580x1600d956be78470099513c0824179955dfe7False0.29847301136363635data4.593096815007166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .CRT0x14730000x700x2009e58f747daf2242773bf8094b32b8893False0.083984375data0.47677526113352753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .tls0x14740000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .rsrc0x14750000x12e980x130006b00c9a39872e28f476499762ac7b572False0.4592542146381579data5.849528840289981IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .reloc0x14880000x23f380x24000186f17491d63553ae419bec122302f45False0.20198567708333334data5.452114043355917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                          RT_ICON0x14753700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.42338709677419356
                                                                                          RT_ICON0x14756580x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.5101351351351351
                                                                                          RT_ICON0x14757800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 26880.40298507462686567
                                                                                          RT_ICON0x14766280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 11520.5464801444043321
                                                                                          RT_ICON0x1476ed00x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.6047687861271677
                                                                                          RT_ICON0x14774380x5c48PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9979258381307146
                                                                                          RT_ICON0x147d0800x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.10640056683986773
                                                                                          RT_ICON0x14812a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.20715767634854773
                                                                                          RT_ICON0x14838500x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 67200.2334319526627219
                                                                                          RT_ICON0x14852b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.19090056285178236
                                                                                          RT_ICON0x14863600x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.35327868852459016
                                                                                          RT_ICON0x1486ce80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 16800.39127906976744187
                                                                                          RT_ICON0x14873a00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3342198581560284
                                                                                          RT_GROUP_ICON0x14878080xbcdata0.6702127659574468
                                                                                          RT_VERSION0x14878c40x2a8dataEnglishUnited States0.47058823529411764
                                                                                          RT_MANIFEST0x1487b6c0x32cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4642857142857143
                                                                                          DLLImport
                                                                                          KERNEL32.dllAddAtomA, AddVectoredContinueHandler, AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileA, CreateIoCompletionPort, CreateMutexA, CreateSemaphoreA, CreateThread, CreateWaitableTimerExW, DeleteAtom, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, ExitProcess, FindAtomA, FormatMessageA, FreeEnvironmentStringsW, GetAtomNameA, GetConsoleMode, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetEnvironmentStringsW, GetErrorMode, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetQueuedCompletionStatusEx, GetStartupInfoA, GetStdHandle, GetSystemDirectoryA, GetSystemInfo, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDBCSLeadByteEx, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryExW, LoadLibraryW, LocalFree, MultiByteToWideChar, OpenProcess, OutputDebugStringA, PostQueuedCompletionStatus, QueryPerformanceCounter, QueryPerformanceFrequency, RaiseException, RaiseFailFastException, ReleaseMutex, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlLookupFunctionEntry, RtlVirtualUnwind, SetConsoleCtrlHandler, SetErrorMode, SetEvent, SetLastError, SetProcessAffinityMask, SetProcessPriorityBoost, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, SetWaitableTimer, Sleep, SuspendThread, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WerGetFlags, WerSetFlags, WideCharToMultiByte, WriteConsoleW, WriteFile, __C_specific_handler
                                                                                          msvcrt.dll___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthread, _beginthreadex, _cexit, _commode, _endthreadex, _errno, _fmode, _initterm, _lock, _memccpy, _onexit, _setjmp, _strdup, _ultoa, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, localeconv, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strerror, strlen, strncmp, vfprintf, wcslen
                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          EnglishUnited States
                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                          03/29/24-09:52:15.811203TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)505004973095.216.41.236192.168.2.4
                                                                                          03/29/24-09:52:21.606984TCP2046269ET TROJAN [ANY.RUN] RisePro TCP (Activity)4973050500192.168.2.495.216.41.236
                                                                                          03/29/24-09:52:16.065250TCP2046267ET TROJAN [ANY.RUN] RisePro TCP (External IP)505004973095.216.41.236192.168.2.4
                                                                                          03/29/24-09:52:25.278346TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)505004973995.216.41.236192.168.2.4
                                                                                          03/29/24-09:52:33.605110TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)505004974395.216.41.236192.168.2.4
                                                                                          03/29/24-09:52:25.741725TCP2046266ET TROJAN [ANY.RUN] RisePro TCP (Token)505004974095.216.41.236192.168.2.4
                                                                                          03/29/24-09:52:15.776952TCP2049060ET TROJAN RisePro TCP Heartbeat Packet4973050500192.168.2.495.216.41.236
                                                                                          03/29/24-09:52:23.971378TCP2049660ET TROJAN RisePro CnC Activity (Outbound)505004973095.216.41.236192.168.2.4
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Mar 29, 2024 09:52:15.403074026 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:15.607089043 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:15.607203960 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:15.776952028 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:15.811203003 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:15.861314058 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:15.980807066 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:15.980928898 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:16.065249920 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.110129118 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:16.225837946 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.240926027 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.240947962 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.241018057 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.243802071 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.243819952 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.514143944 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.514226913 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.516618967 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.516630888 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.516859055 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.559035063 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.559660912 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.604228020 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.793872118 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.793982029 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.794071913 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.801991940 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.802006960 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.802042961 CET49732443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:16.802047968 CET4434973234.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.907232046 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:16.907263994 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.907330990 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:16.907660007 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:16.907670021 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.110066891 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.110129118 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:17.111785889 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:17.111793995 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.112020016 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.113066912 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:17.156244993 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.381699085 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.381774902 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.381850004 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:17.381994963 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:17.382005930 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.382029057 CET49734443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:17.382035017 CET44349734104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.382339954 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:17.590552092 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.595273972 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:17.804805994 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:17.811084032 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:18.023627043 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:18.044038057 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:18.252588987 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:18.267838955 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:18.476484060 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:18.517755985 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:19.900731087 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:19.906291962 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.110332966 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.110402107 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.110438108 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.110450983 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.110502005 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.110516071 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.110539913 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.110563993 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.110603094 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.150521994 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.150619984 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.314565897 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.314578056 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.314631939 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.314913988 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.314954996 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.315009117 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.315057039 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.315095901 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.315140009 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.315164089 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.315221071 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.315279007 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.315331936 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.315388918 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.315432072 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.315563917 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.315608025 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.354368925 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.354419947 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.518640041 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.518657923 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.518671036 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.518681049 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.518723011 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.518740892 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.518786907 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.518862009 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519020081 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.519105911 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519303083 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519360065 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.519386053 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519429922 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.519464016 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519521952 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.519568920 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519658089 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.519706011 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519799948 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519825935 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.519850969 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.519876957 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.558377981 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.558576107 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723084927 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723104954 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723169088 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723201036 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723241091 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723278046 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723325014 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723328114 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723449945 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723500013 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723709106 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723763943 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723764896 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723892927 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.723953962 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.723998070 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724083900 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.724128962 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724255085 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.724306107 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724505901 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.724534035 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.724551916 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724577904 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724664927 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.724775076 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724889994 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.724939108 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.724968910 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725012064 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725054026 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725117922 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725159883 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725203991 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725235939 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725307941 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725434065 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725476980 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725548029 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725564003 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725610971 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725687981 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725733995 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.725923061 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.725985050 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726003885 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726073027 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726083040 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726121902 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726351976 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726392984 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726418018 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726449966 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726480961 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726496935 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726614952 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726672888 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726763964 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726809978 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.726860046 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.726949930 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.727037907 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.727088928 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.727358103 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.727399111 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.727411032 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.727437973 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.762423038 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.762475014 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.762481928 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.762525082 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.762654066 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.762722015 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.762782097 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.762991905 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.927229881 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927247047 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927265882 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927284002 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927300930 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927320957 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.927366018 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.927385092 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927421093 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927483082 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.927500010 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927546978 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.927759886 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927802086 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.927825928 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.927892923 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928040028 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928098917 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928121090 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928209066 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928232908 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928250074 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928343058 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928378105 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928389072 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928412914 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928438902 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928462982 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928538084 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928601980 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928625107 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928659916 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928682089 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928735971 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928806067 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928827047 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928874016 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.928930044 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.928965092 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929019928 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929039955 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929054976 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929162025 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929189920 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929208040 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929233074 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929286003 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929347038 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929374933 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929450989 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929462910 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929511070 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929569006 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929640055 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929698944 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929708958 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929764032 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929832935 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929850101 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929883957 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929902077 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.929922104 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.929991961 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930012941 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930085897 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930134058 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930167913 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930179119 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930227995 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930275917 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930330038 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930383921 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930447102 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930454969 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930509090 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930557966 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:20.930597067 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930682898 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.930841923 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931168079 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931253910 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931269884 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931339025 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931410074 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931484938 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.931579113 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.966511011 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.966597080 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.966707945 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.966933966 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.966985941 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.967363119 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.967411041 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:20.967458010 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131603956 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131622076 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131639004 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131697893 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131776094 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131921053 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131979942 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.131994009 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132188082 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132323980 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132427931 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132529974 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132582903 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132664919 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132742882 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132817030 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132880926 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.132972956 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133024931 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133137941 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133235931 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133306026 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133430004 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133512974 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133554935 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133650064 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133758068 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133816004 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.133856058 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134016037 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134032965 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134103060 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134186983 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134306908 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134385109 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134483099 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134582996 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134697914 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134746075 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134768963 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134902000 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.134952068 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135020018 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135245085 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135327101 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135390997 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135441065 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135550022 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135643005 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135776043 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135853052 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.135931015 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136034012 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136096954 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136195898 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136250973 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136382103 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136588097 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136640072 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.136907101 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137068033 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137181044 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137193918 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137345076 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137568951 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137600899 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137689114 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137856960 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.137934923 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138005018 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138092041 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138175964 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138254881 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138329983 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138421059 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138477087 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138580084 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138670921 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138870001 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138881922 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.138906956 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.139034033 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.139081001 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.139112949 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:21.139195919 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.139213085 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.343008041 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.343024015 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:21.606983900 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:21.851656914 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.959110975 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971378088 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971400023 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971426010 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:23.971467018 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971518040 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971555948 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:23.971563101 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971630096 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971666098 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971674919 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:23.971712112 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:23.971750021 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971762896 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971798897 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971801043 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:23.971827984 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:23.971919060 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.176160097 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176183939 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176235914 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.176256895 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176326036 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176368952 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.176383972 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176434040 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176476955 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.176517010 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176598072 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176652908 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176656008 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.176676989 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.176718950 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.176981926 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177026033 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177062988 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.177071095 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177151918 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177174091 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177191973 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.177249908 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177289963 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.177303076 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177437067 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177481890 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.177511930 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177545071 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177584887 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.177648067 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177696943 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.177737951 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380006075 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380022049 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380033016 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380043983 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380058050 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380086899 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380095959 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380110025 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380145073 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380157948 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380158901 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380192041 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380192995 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380501032 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380513906 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380527020 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380553961 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380562067 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380564928 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380573988 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380605936 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380610943 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380636930 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380650043 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380676031 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380706072 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380711079 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380733967 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380748034 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380779982 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380806923 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380827904 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380867958 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380877018 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380888939 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380925894 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380939007 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380944967 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.380953074 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.380973101 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381016970 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381072044 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381079912 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381118059 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381130934 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381165028 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381165028 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381174088 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381186008 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381197929 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381211042 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381222010 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381238937 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381309986 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381347895 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381362915 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381398916 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381510019 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381705999 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381747961 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381817102 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381865978 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381879091 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.381911993 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.381911993 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.583936930 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584372044 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584412098 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584427118 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584431887 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584438086 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584461927 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584491968 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584503889 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584513903 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584525108 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584533930 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584574938 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584583998 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584585905 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584610939 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584634066 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584692955 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584741116 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584769964 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584800959 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584822893 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584846020 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584857941 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.584886074 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.584938049 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585001945 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585014105 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585043907 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585088015 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585088968 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585156918 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585213900 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585258007 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585273981 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585305929 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585342884 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585376978 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585413933 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585417986 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585472107 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585514069 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585561037 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585562944 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585621119 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585668087 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585669994 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585712910 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585721970 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585763931 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585803986 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585834026 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585877895 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585925102 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.585928917 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.585985899 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586029053 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586076975 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586077929 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586142063 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586189032 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586189985 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586237907 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586250067 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586287975 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586338997 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586342096 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586410046 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586431980 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586474895 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586488008 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586498976 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586509943 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586541891 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586541891 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586555004 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586566925 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586602926 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586647987 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586658001 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586668015 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586679935 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586707115 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586734056 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586743116 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586755037 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586764097 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586795092 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586846113 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586858988 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586869001 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586879969 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586889982 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586890936 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586900949 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586920977 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586930990 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586930990 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586937904 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586962938 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.586966991 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.586990118 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587001085 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587033033 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587050915 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587050915 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587055922 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587084055 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587097883 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587110043 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587142944 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587142944 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587156057 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587198973 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587204933 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587218046 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587239027 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587249994 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587260008 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587260008 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587297916 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587304115 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587344885 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587348938 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587389946 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587400913 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587429047 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587447882 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587486982 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587495089 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.587502956 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.587657928 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788114071 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788131952 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788144112 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788198948 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788212061 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788228989 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788240910 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788244009 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788253069 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788280010 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788280964 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788301945 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788309097 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788413048 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788425922 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788436890 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788450956 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788460970 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788472891 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788475990 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788475990 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788491011 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788512945 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788532972 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788544893 CET505004973095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:24.788558006 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.788598061 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:24.870301962 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.074090958 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.074197054 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.278346062 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.279201984 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.324819088 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.483218908 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.483356953 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.533127069 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.533267021 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.555130959 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.727751017 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.741724968 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.763021946 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:25.763155937 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.861428022 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:25.971051931 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.017575026 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:26.110364914 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.230674982 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.230705023 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.230884075 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.231795073 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.231806040 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.499058008 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.499154091 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.524405956 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.524420023 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.524610043 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.575359106 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.620240927 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.783081055 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.783188105 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.783312082 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.783554077 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.783567905 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.783585072 CET49741443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:26.783590078 CET4434974134.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.784960985 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:26.784992933 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.785063982 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:26.785335064 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:26.785346031 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.983164072 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.983270884 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:26.984348059 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:26.984354019 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.984560013 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:26.985836029 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:27.028234959 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.259219885 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.259305954 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.259404898 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:27.259758949 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:27.259773970 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.259790897 CET49742443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:27.259794950 CET44349742104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.260297060 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:27.474915028 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.486480951 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:27.699157000 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.705178976 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:27.861443043 CET4973050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:27.918617010 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:27.924113989 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:28.137654066 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:28.142750025 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:28.356585026 CET505004974095.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:28.408198118 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:28.533381939 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:28.579868078 CET4974050500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:28.744523048 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:28.798820972 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.185117006 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.395116091 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:33.395231009 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.414874077 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.605109930 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:33.624623060 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:33.624780893 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.721302986 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.834753990 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:33.877491951 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:33.972068071 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.089683056 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.089714050 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.089843988 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.090833902 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.090850115 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.357686996 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.357769966 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.358900070 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.358911037 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.359144926 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.400988102 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.448236942 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.691363096 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.691472054 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.691523075 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.691951990 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.691967010 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.691977978 CET49744443192.168.2.434.117.186.192
                                                                                          Mar 29, 2024 09:52:34.691986084 CET4434974434.117.186.192192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.693756104 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:34.693784952 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.693844080 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:34.694108009 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:34.694125891 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.891283035 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.891382933 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:34.892350912 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:34.892358065 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.892577887 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:34.893893957 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:34.940238953 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.155411959 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.155486107 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.155531883 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:35.155734062 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:35.155741930 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.155775070 CET49745443192.168.2.4104.26.5.15
                                                                                          Mar 29, 2024 09:52:35.155780077 CET44349745104.26.5.15192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.156440020 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:35.371289968 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.377690077 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:35.592302084 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.596426010 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:35.811886072 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:35.815062046 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:36.029678106 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:36.040684938 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:36.256264925 CET505004974395.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:52:36.299329996 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:36.497826099 CET4974350500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:59.785238981 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:52:59.996463060 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:00.049362898 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:15.252811909 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:15.462970972 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:15.518178940 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:21.549491882 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:21.761274099 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:21.814986944 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:25.025491953 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:25.238485098 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:25.283745050 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:28.283864975 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:28.495157957 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:28.549364090 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:31.549534082 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:31.761509895 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:31.814963102 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:34.815105915 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:35.026787043 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:35.080615997 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:38.080696106 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:38.292431116 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:38.346312046 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:41.346355915 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:41.560314894 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:41.658716917 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:44.830986977 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:45.043648958 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:45.143245935 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:48.080950022 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:48.291970015 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:48.455594063 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:51.330846071 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:51.541327000 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:51.658720970 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:54.580775976 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:54.792592049 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:54.846220970 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:55.280529022 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:55.280685902 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:55.525907993 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:58.315921068 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:53:58.527532101 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:53:58.658725023 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:01.580230951 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:01.792102098 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:01.961574078 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:04.910082102 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:05.121825933 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:05.349014044 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:08.174408913 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:08.385802984 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:08.455595970 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:11.424418926 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:11.635817051 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:11.846220016 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:14.676002979 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:14.886895895 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:14.955600023 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:17.928812027 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:18.140894890 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:18.252485991 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:22.127553940 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:22.339287996 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:22.455715895 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:25.393405914 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:25.604224920 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:25.752573013 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:28.645076990 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:28.856411934 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:28.955595970 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:31.895070076 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:32.106734991 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:32.252492905 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:35.164869070 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:35.376229048 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:35.455610991 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:38.652957916 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:38.863168955 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:38.955614090 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:42.143204927 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:42.354347944 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:42.455598116 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:45.393176079 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:45.604057074 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:45.661122084 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:48.644686937 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:48.855670929 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:49.050008059 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:51.893184900 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:52.105062962 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:52.158720016 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:55.143279076 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:55.354548931 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:55.455647945 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:58.409810066 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:54:58.619815111 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:54:58.846257925 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:01.662570953 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:01.872827053 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:01.955588102 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:04.908973932 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:05.119431019 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:05.346225023 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:08.177366972 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:08.388556004 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:08.456573963 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:11.440179110 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:11.650518894 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:11.752479076 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:14.707612038 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:14.919862986 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:15.174442053 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:18.587019920 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:18.797868013 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:18.861855030 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:21.846363068 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:22.057012081 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:22.158718109 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:25.117132902 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:25.281995058 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:25.346282005 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:25.363209963 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:25.363449097 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:25.551270008 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:25.607762098 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:25.658729076 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:28.580676079 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:28.792134047 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:28.846230984 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:31.849064112 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:32.060343981 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:32.158736944 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:35.137706995 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:35.347902060 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:35.455600977 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:38.471355915 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:38.682786942 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:38.846239090 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:41.721306086 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:41.932992935 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:42.158726931 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:44.987236023 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:45.198513031 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:45.346230030 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:48.236948967 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:48.448401928 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:48.658751011 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:51.490940094 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:51.701431990 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:51.861891031 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:54.783850908 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:54.995332956 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:55.151170969 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:58.050062895 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:55:58.262820959 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:55:58.455607891 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:56:01.301414967 CET4973950500192.168.2.495.216.41.236
                                                                                          Mar 29, 2024 09:56:01.513436079 CET505004973995.216.41.236192.168.2.4
                                                                                          Mar 29, 2024 09:56:01.643199921 CET4973950500192.168.2.495.216.41.236
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Mar 29, 2024 09:52:16.139003992 CET5194753192.168.2.41.1.1.1
                                                                                          Mar 29, 2024 09:52:16.234750986 CET53519471.1.1.1192.168.2.4
                                                                                          Mar 29, 2024 09:52:16.809196949 CET6480153192.168.2.41.1.1.1
                                                                                          Mar 29, 2024 09:52:16.906254053 CET53648011.1.1.1192.168.2.4
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Mar 29, 2024 09:52:16.139003992 CET192.168.2.41.1.1.10xb79aStandard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                                                                          Mar 29, 2024 09:52:16.809196949 CET192.168.2.41.1.1.10x498bStandard query (0)db-ip.comA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Mar 29, 2024 09:52:16.234750986 CET1.1.1.1192.168.2.40xb79aNo error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                                                                          Mar 29, 2024 09:52:16.906254053 CET1.1.1.1192.168.2.40x498bNo error (0)db-ip.com104.26.5.15A (IP address)IN (0x0001)false
                                                                                          Mar 29, 2024 09:52:16.906254053 CET1.1.1.1192.168.2.40x498bNo error (0)db-ip.com172.67.75.166A (IP address)IN (0x0001)false
                                                                                          Mar 29, 2024 09:52:16.906254053 CET1.1.1.1192.168.2.40x498bNo error (0)db-ip.com104.26.4.15A (IP address)IN (0x0001)false
                                                                                          • https:
                                                                                            • ipinfo.io
                                                                                          • db-ip.com
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.44973234.117.186.1924432004C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-03-29 08:52:16 UTC238OUTGET /widget/demo/102.165.48.43 HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Referer: https://ipinfo.io/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Host: ipinfo.io
                                                                                          2024-03-29 08:52:16 UTC514INHTTP/1.1 200 OK
                                                                                          server: nginx/1.24.0
                                                                                          date: Fri, 29 Mar 2024 08:52:16 GMT
                                                                                          content-type: application/json; charset=utf-8
                                                                                          Content-Length: 1021
                                                                                          access-control-allow-origin: *
                                                                                          x-frame-options: SAMEORIGIN
                                                                                          x-xss-protection: 1; mode=block
                                                                                          x-content-type-options: nosniff
                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                          x-envoy-upstream-service-time: 2
                                                                                          via: 1.1 google
                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                          Connection: close
                                                                                          2024-03-29 08:52:16 UTC738INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 30 32 2e 31 36 35 2e 34 38 2e 34 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 30 32 2e 31 36 35 2e 34 38 2e 34 33 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 57 61 73 68 69 6e 67 74 6f 6e 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 57 61 73 68 69 6e 67 74 6f 6e 2c 20 44 2e 43 2e 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 33 38 2e 38 39 35 31 2c 2d 37 37 2e 30 33 36 34 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 32 30 30 30 34 22 2c 0a 20 20 20 20 22 74 69 6d 65
                                                                                          Data Ascii: { "input": "102.165.48.43", "data": { "ip": "102.165.48.43", "city": "Washington", "region": "Washington, D.C.", "country": "US", "loc": "38.8951,-77.0364", "org": "AS174 Cogent Communications", "postal": "20004", "time
                                                                                          2024-03-29 08:52:16 UTC283INData Raw: 22 3a 20 7b 0a 20 20 20 20 20 20 22 61 64 64 72 65 73 73 22 3a 20 22 47 72 6f 75 6e 64 20 46 6c 6f 6f 72 2c 20 34 20 56 69 63 74 6f 72 69 61 20 53 71 75 61 72 65 2c 20 53 74 20 41 6c 62 61 6e 73 2c 20 48 65 72 74 66 6f 72 64 73 68 69 72 65 2c 20 4c 6f 6e 64 6f 6e 2c 20 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 47 42 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 45 64 76 69 6e 61 73 20 52 61 63 6b 61 75 73 6b 61 73 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 30 32 2e 31 36 35 2e 30 2e 30 2f 31 38 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 74 65 6c 3a 2b
                                                                                          Data Ascii: ": { "address": "Ground Floor, 4 Victoria Square, St Albans, Hertfordshire, London, United Kingdom", "country": "GB", "email": "abuse@ipxo.com", "name": "Edvinas Rackauskas", "network": "102.165.0.0/18", "phone": "tel:+


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          1192.168.2.449734104.26.5.154432004C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-03-29 08:52:17 UTC262OUTGET /demo/home.php?s=102.165.48.43 HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Host: db-ip.com
                                                                                          2024-03-29 08:52:17 UTC650INHTTP/1.1 200 OK
                                                                                          Date: Fri, 29 Mar 2024 08:52:17 GMT
                                                                                          Content-Type: application/json
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          x-iplb-request-id: AC462770:7E7A_93878F2E:0050_66068141_5D18FA2:4F34
                                                                                          x-iplb-instance: 59215
                                                                                          CF-Cache-Status: DYNAMIC
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OuWNM3tE9REjuZiYqAR6K89tQaI4w0RPwI7rgPElehYjnPz35vmhAwTzieGN%2Bc3AJ7FS2F9yuJBpWQVm0bDENcKVI8CaoVD8s22m1LBSZBzvQA5gcqaRxEyHOw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 86be9f780ddf07f5-IAD
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          2024-03-29 08:52:17 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                          2024-03-29 08:52:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          2192.168.2.44974134.117.186.1924436884C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-03-29 08:52:26 UTC238OUTGET /widget/demo/102.165.48.43 HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Referer: https://ipinfo.io/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Host: ipinfo.io
                                                                                          2024-03-29 08:52:26 UTC514INHTTP/1.1 200 OK
                                                                                          server: nginx/1.24.0
                                                                                          date: Fri, 29 Mar 2024 08:52:26 GMT
                                                                                          content-type: application/json; charset=utf-8
                                                                                          Content-Length: 1021
                                                                                          access-control-allow-origin: *
                                                                                          x-frame-options: SAMEORIGIN
                                                                                          x-xss-protection: 1; mode=block
                                                                                          x-content-type-options: nosniff
                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                          x-envoy-upstream-service-time: 2
                                                                                          via: 1.1 google
                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                          Connection: close
                                                                                          2024-03-29 08:52:26 UTC738INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 30 32 2e 31 36 35 2e 34 38 2e 34 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 30 32 2e 31 36 35 2e 34 38 2e 34 33 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 57 61 73 68 69 6e 67 74 6f 6e 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 57 61 73 68 69 6e 67 74 6f 6e 2c 20 44 2e 43 2e 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 33 38 2e 38 39 35 31 2c 2d 37 37 2e 30 33 36 34 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 32 30 30 30 34 22 2c 0a 20 20 20 20 22 74 69 6d 65
                                                                                          Data Ascii: { "input": "102.165.48.43", "data": { "ip": "102.165.48.43", "city": "Washington", "region": "Washington, D.C.", "country": "US", "loc": "38.8951,-77.0364", "org": "AS174 Cogent Communications", "postal": "20004", "time
                                                                                          2024-03-29 08:52:26 UTC283INData Raw: 22 3a 20 7b 0a 20 20 20 20 20 20 22 61 64 64 72 65 73 73 22 3a 20 22 47 72 6f 75 6e 64 20 46 6c 6f 6f 72 2c 20 34 20 56 69 63 74 6f 72 69 61 20 53 71 75 61 72 65 2c 20 53 74 20 41 6c 62 61 6e 73 2c 20 48 65 72 74 66 6f 72 64 73 68 69 72 65 2c 20 4c 6f 6e 64 6f 6e 2c 20 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 47 42 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 45 64 76 69 6e 61 73 20 52 61 63 6b 61 75 73 6b 61 73 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 30 32 2e 31 36 35 2e 30 2e 30 2f 31 38 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 74 65 6c 3a 2b
                                                                                          Data Ascii: ": { "address": "Ground Floor, 4 Victoria Square, St Albans, Hertfordshire, London, United Kingdom", "country": "GB", "email": "abuse@ipxo.com", "name": "Edvinas Rackauskas", "network": "102.165.0.0/18", "phone": "tel:+


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          3192.168.2.449742104.26.5.154436884C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-03-29 08:52:26 UTC262OUTGET /demo/home.php?s=102.165.48.43 HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Host: db-ip.com
                                                                                          2024-03-29 08:52:27 UTC652INHTTP/1.1 200 OK
                                                                                          Date: Fri, 29 Mar 2024 08:52:27 GMT
                                                                                          Content-Type: application/json
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          x-iplb-request-id: AC46862F:F06E_93878F2E:0050_6606814B_5D259EA:7B63
                                                                                          x-iplb-instance: 59128
                                                                                          CF-Cache-Status: DYNAMIC
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bPMnrHLN5plVswiQrku4sGUHHAPbBTrirr2JWxLjZYoQSi7gcKE2SqyjpcrWVUNoERmeqFrwj3f7Dnro2nxds62sBfNhrHQ1UrD%2FGJIXI%2FGwsz50eFt8JJSRLw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 86be9fb5cb659c72-IAD
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          2024-03-29 08:52:27 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                          2024-03-29 08:52:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          4192.168.2.44974434.117.186.1924435500C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-03-29 08:52:34 UTC238OUTGET /widget/demo/102.165.48.43 HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Referer: https://ipinfo.io/
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Host: ipinfo.io
                                                                                          2024-03-29 08:52:34 UTC515INHTTP/1.1 200 OK
                                                                                          server: nginx/1.24.0
                                                                                          date: Fri, 29 Mar 2024 08:52:34 GMT
                                                                                          content-type: application/json; charset=utf-8
                                                                                          Content-Length: 1021
                                                                                          access-control-allow-origin: *
                                                                                          x-frame-options: SAMEORIGIN
                                                                                          x-xss-protection: 1; mode=block
                                                                                          x-content-type-options: nosniff
                                                                                          referrer-policy: strict-origin-when-cross-origin
                                                                                          x-envoy-upstream-service-time: 52
                                                                                          via: 1.1 google
                                                                                          strict-transport-security: max-age=2592000; includeSubDomains
                                                                                          Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                          Connection: close
                                                                                          2024-03-29 08:52:34 UTC737INData Raw: 7b 0a 20 20 22 69 6e 70 75 74 22 3a 20 22 31 30 32 2e 31 36 35 2e 34 38 2e 34 33 22 2c 0a 20 20 22 64 61 74 61 22 3a 20 7b 0a 20 20 20 20 22 69 70 22 3a 20 22 31 30 32 2e 31 36 35 2e 34 38 2e 34 33 22 2c 0a 20 20 20 20 22 63 69 74 79 22 3a 20 22 57 61 73 68 69 6e 67 74 6f 6e 22 2c 0a 20 20 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 57 61 73 68 69 6e 67 74 6f 6e 2c 20 44 2e 43 2e 22 2c 0a 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 20 20 22 6c 6f 63 22 3a 20 22 33 38 2e 38 39 35 31 2c 2d 37 37 2e 30 33 36 34 22 2c 0a 20 20 20 20 22 6f 72 67 22 3a 20 22 41 53 31 37 34 20 43 6f 67 65 6e 74 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 22 2c 0a 20 20 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 32 30 30 30 34 22 2c 0a 20 20 20 20 22 74 69 6d 65
                                                                                          Data Ascii: { "input": "102.165.48.43", "data": { "ip": "102.165.48.43", "city": "Washington", "region": "Washington, D.C.", "country": "US", "loc": "38.8951,-77.0364", "org": "AS174 Cogent Communications", "postal": "20004", "time
                                                                                          2024-03-29 08:52:34 UTC284INData Raw: 65 22 3a 20 7b 0a 20 20 20 20 20 20 22 61 64 64 72 65 73 73 22 3a 20 22 47 72 6f 75 6e 64 20 46 6c 6f 6f 72 2c 20 34 20 56 69 63 74 6f 72 69 61 20 53 71 75 61 72 65 2c 20 53 74 20 41 6c 62 61 6e 73 2c 20 48 65 72 74 66 6f 72 64 73 68 69 72 65 2c 20 4c 6f 6e 64 6f 6e 2c 20 55 6e 69 74 65 64 20 4b 69 6e 67 64 6f 6d 22 2c 0a 20 20 20 20 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 47 42 22 2c 0a 20 20 20 20 20 20 22 65 6d 61 69 6c 22 3a 20 22 61 62 75 73 65 40 69 70 78 6f 2e 63 6f 6d 22 2c 0a 20 20 20 20 20 20 22 6e 61 6d 65 22 3a 20 22 45 64 76 69 6e 61 73 20 52 61 63 6b 61 75 73 6b 61 73 22 2c 0a 20 20 20 20 20 20 22 6e 65 74 77 6f 72 6b 22 3a 20 22 31 30 32 2e 31 36 35 2e 30 2e 30 2f 31 38 22 2c 0a 20 20 20 20 20 20 22 70 68 6f 6e 65 22 3a 20 22 74 65 6c 3a
                                                                                          Data Ascii: e": { "address": "Ground Floor, 4 Victoria Square, St Albans, Hertfordshire, London, United Kingdom", "country": "GB", "email": "abuse@ipxo.com", "name": "Edvinas Rackauskas", "network": "102.165.0.0/18", "phone": "tel:


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          5192.168.2.449745104.26.5.154435500C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-03-29 08:52:34 UTC262OUTGET /demo/home.php?s=102.165.48.43 HTTP/1.1
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: application/x-www-form-urlencoded
                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                          Host: db-ip.com
                                                                                          2024-03-29 08:52:35 UTC656INHTTP/1.1 200 OK
                                                                                          Date: Fri, 29 Mar 2024 08:52:35 GMT
                                                                                          Content-Type: application/json
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          x-iplb-request-id: AC4626BA:A362_93878F2E:0050_66068153_5D19211:4F34
                                                                                          x-iplb-instance: 59215
                                                                                          CF-Cache-Status: DYNAMIC
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=f0FKDPeeOaUnBCZFQpkMpZMMYBCycn3kmu0dGghx%2BuPryEXGEFwr6m7%2BewDigl%2BLHUQfaJi4%2FYgxqeUVnTRwriLdhHuaUQtQoWAcJaS6mo6Lj8zyyRE3ckg2NA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 86be9fe7383a394f-IAD
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          2024-03-29 08:52:35 UTC85INData Raw: 34 66 0d 0a 7b 22 73 74 61 74 75 73 22 3a 22 6f 6b 22 2c 22 64 65 6d 6f 49 6e 66 6f 22 3a 7b 22 65 72 72 6f 72 22 3a 22 6f 76 65 72 20 71 75 65 72 79 20 6c 69 6d 69 74 2c 20 70 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 22 7d 7d 0d 0a
                                                                                          Data Ascii: 4f{"status":"ok","demoInfo":{"error":"over query limit, please try again later"}}
                                                                                          2024-03-29 08:52:35 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                          Data Ascii: 0


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:09:51:55
                                                                                          Start date:29/03/2024
                                                                                          Path:C:\Users\user\Desktop\MXpl6HFisn.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Users\user\Desktop\MXpl6HFisn.exe"
                                                                                          Imagebase:0x7ff6a5780000
                                                                                          File size:21'056'512 bytes
                                                                                          MD5 hash:0AADBCA2D0A26B8F90FD4F31CB7F2FFC
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:Go lang
                                                                                          Yara matches:
                                                                                          • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.1769068121.000000C0026F0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:1
                                                                                          Start time:09:52:06
                                                                                          Start date:29/03/2024
                                                                                          Path:C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe"
                                                                                          Imagebase:0x7ff7b7920000
                                                                                          File size:21'056'512 bytes
                                                                                          MD5 hash:0AADBCA2D0A26B8F90FD4F31CB7F2FFC
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:Go lang
                                                                                          Yara matches:
                                                                                          • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000001.00000002.1871116463.000000C002598000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                          • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000001.00000002.1871116463.000000C002814000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                          Antivirus matches:
                                                                                          • Detection: 42%, ReversingLabs
                                                                                          • Detection: 47%, Virustotal, Browse
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:2
                                                                                          Start time:09:52:11
                                                                                          Start date:29/03/2024
                                                                                          Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          Imagebase:0x670000
                                                                                          File size:231'736 bytes
                                                                                          MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000002.00000003.1836476956.0000000005203000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000002.00000002.4068353569.0000000004F00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:moderate
                                                                                          Has exited:false

                                                                                          Target ID:4
                                                                                          Start time:09:52:14
                                                                                          Start date:29/03/2024
                                                                                          Path:C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Users\Public\Libraries\(0aadbca2d0a26b8f90fd4f31cb7f2ffc)MXpl6HFisn.exe"
                                                                                          Imagebase:0x7ff7b7920000
                                                                                          File size:21'056'512 bytes
                                                                                          MD5 hash:0AADBCA2D0A26B8F90FD4F31CB7F2FFC
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:Go lang
                                                                                          Yara matches:
                                                                                          • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000004.00000002.1962242072.000000C0025AA000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                          • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000004.00000002.1959576006.000000C0006B2000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                          • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000004.00000002.1962242072.000000C002826000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                          Reputation:low
                                                                                          Has exited:true

                                                                                          Target ID:5
                                                                                          Start time:09:52:21
                                                                                          Start date:29/03/2024
                                                                                          Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          Imagebase:0x670000
                                                                                          File size:231'736 bytes
                                                                                          MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:8
                                                                                          Start time:09:52:28
                                                                                          Start date:29/03/2024
                                                                                          Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                          Imagebase:0x670000
                                                                                          File size:231'736 bytes
                                                                                          MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                                          Has elevated privileges:false
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Reset < >

                                                                                            Execution Graph

                                                                                            Execution Coverage:9.4%
                                                                                            Dynamic/Decrypted Code Coverage:4.9%
                                                                                            Signature Coverage:14.5%
                                                                                            Total number of Nodes:2000
                                                                                            Total number of Limit Nodes:170
                                                                                            execution_graph 161371 2a77ee6 161372 2a77f6c 161371->161372 161389 2a77a0f 161371->161389 161372->161389 161436 2a803c0 40 API calls 161372->161436 161375 2a78e25 161378 2a7809f 161437 2a713b0 40 API calls 161378->161437 161379 2a788b2 161468 2a713b0 40 API calls 161379->161468 161383 2a79210 40 API calls 161383->161389 161384 2a78a08 161472 2a713b0 40 API calls 161384->161472 161385 2a7811b 161438 2a78ea0 40 API calls Concurrency::cancel_current_task 161385->161438 161386 2a78cbf 161476 2a713b0 40 API calls 161386->161476 161387 2a78930 161469 2a78ea0 40 API calls Concurrency::cancel_current_task 161387->161469 161389->161378 161389->161379 161389->161383 161389->161384 161389->161386 161390 2a78258 161389->161390 161392 2a6aa50 40 API calls 161389->161392 161431 2a77c84 std::ios_base::_Ios_base_dtor 161389->161431 161434 2a71e00 40 API calls 161389->161434 161435 2a80630 40 API calls 161389->161435 161441 2a79980 40 API calls 161389->161441 161442 2a6ac60 161389->161442 161454 2addcb0 161390->161454 161392->161389 161394 2a78a8b 161473 2a78ea0 40 API calls Concurrency::cancel_current_task 161394->161473 161399 2a78d3c 161477 2a78ea0 40 API calls Concurrency::cancel_current_task 161399->161477 161403 2a7899d 161471 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161403->161471 161404 2a7812a std::ios_base::_Ios_base_dtor 161426 2a78b11 161404->161426 161439 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161404->161439 161405 2a78188 161440 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161405->161440 161406 2a7893f std::ios_base::_Ios_base_dtor 161406->161426 161470 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161406->161470 161410 2a7826a 161464 2a713b0 40 API calls 161410->161464 161414 2a78a9a std::ios_base::_Ios_base_dtor 161414->161426 161474 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161414->161474 161415 2a78af8 161475 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161415->161475 161416 2a786b1 std::ios_base::_Ios_base_dtor 161417 2a78d4b std::ios_base::_Ios_base_dtor 161417->161426 161478 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161417->161478 161419 2a78da9 161479 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161419->161479 161424 2a782f5 161465 2a78ea0 40 API calls Concurrency::cancel_current_task 161424->161465 161426->161416 161481 2ae31d0 161426->161481 161429 2a78304 std::ios_base::_Ios_base_dtor 161429->161426 161466 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161429->161466 161430 2a78362 161467 2adf0d4 14 API calls std::locale::_Locimp::~_Locimp 161430->161467 161480 2a66610 39 API calls std::ios_base::_Ios_base_dtor 161431->161480 161433 2a781a1 std::ios_base::_Ios_base_dtor 161433->161416 161433->161426 161433->161431 161434->161389 161435->161389 161436->161389 161437->161385 161438->161404 161439->161405 161440->161433 161441->161389 161445 2a6ac90 161442->161445 161443 2a6acce 161447 2addcb0 std::_Facet_Register 40 API calls 161443->161447 161444 2a6ad49 161528 2a06b70 40 API calls 161444->161528 161445->161443 161445->161444 161453 2a6ad14 161445->161453 161449 2a6ace8 161447->161449 161448 2a6ad4e 161486 2a69190 161449->161486 161451 2a6ad02 161503 2a6aa50 161451->161503 161453->161389 161457 2addcb5 ___std_exception_copy 161454->161457 161455 2addccf 161455->161410 161457->161455 161459 2a021d0 Concurrency::cancel_current_task 161457->161459 161557 2af01f8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 161457->161557 161458 2addcdb 161458->161458 161459->161458 161555 2adf91b RaiseException 161459->161555 161461 2a021ec 161556 2adf071 39 API calls 2 library calls 161461->161556 161463 2a02213 161463->161410 161464->161424 161465->161429 161466->161430 161467->161433 161468->161387 161469->161406 161470->161403 161471->161433 161472->161394 161473->161414 161474->161415 161475->161426 161476->161399 161477->161417 161478->161419 161479->161433 161480->161375 161558 2ae310c 39 API calls _strftime 161481->161558 161483 2ae31df 161559 2ae31ed IsProcessorFeaturePresent 161483->161559 161485 2ae31ec 161487 2a691b9 161486->161487 161488 2a69271 161487->161488 161494 2a691ca 161487->161494 161529 2a02270 40 API calls 161488->161529 161490 2a691d6 __Strxfrm 161490->161451 161491 2a691fb 161495 2addcb0 std::_Facet_Register 40 API calls 161491->161495 161492 2a69276 161530 2a021d0 40 API calls 2 library calls 161492->161530 161494->161490 161494->161491 161497 2a69234 161494->161497 161498 2a6923d 161494->161498 161496 2a6920e 161495->161496 161499 2ae31d0 39 API calls 161496->161499 161502 2a69215 __Strxfrm 161496->161502 161497->161491 161497->161492 161501 2addcb0 std::_Facet_Register 40 API calls 161498->161501 161498->161502 161500 2a69280 161499->161500 161500->161451 161501->161502 161502->161451 161504 2a6abf7 161503->161504 161505 2a6aa7e 161503->161505 161524 2a6aab5 161504->161524 161547 2a02980 161504->161547 161506 2a6ab8d 161505->161506 161507 2a6aa85 161505->161507 161508 2a6ab12 161505->161508 161509 2a6ab53 161505->161509 161510 2a6aade 161505->161510 161506->161453 161512 2addcb0 std::_Facet_Register 40 API calls 161507->161512 161515 2addcb0 std::_Facet_Register 40 API calls 161508->161515 161511 2addcb0 std::_Facet_Register 40 API calls 161509->161511 161513 2addcb0 std::_Facet_Register 40 API calls 161510->161513 161517 2a6ab5a 161511->161517 161518 2a6aa8c 161512->161518 161519 2a6aae5 161513->161519 161516 2a6ab19 161515->161516 161531 2a02ae0 161516->161531 161517->161453 161522 2addcb0 std::_Facet_Register 40 API calls 161518->161522 161519->161453 161522->161524 161524->161453 161525 2a6ac25 161552 2adf91b RaiseException 161525->161552 161527 2a6ac36 161528->161448 161530->161496 161532 2a02ba5 161531->161532 161537 2a02af6 161531->161537 161553 2a02270 40 API calls 161532->161553 161534 2a02b02 __Strxfrm 161534->161524 161535 2a02baa 161554 2a021d0 40 API calls 2 library calls 161535->161554 161537->161534 161539 2a02b65 161537->161539 161540 2a02b6e 161537->161540 161543 2a02b2a 161537->161543 161538 2addcb0 std::_Facet_Register 40 API calls 161541 2a02b3d 161538->161541 161539->161535 161539->161543 161545 2addcb0 std::_Facet_Register 40 API calls 161540->161545 161546 2a02b46 __Strxfrm 161540->161546 161542 2ae31d0 39 API calls 161541->161542 161541->161546 161544 2a02bb4 161542->161544 161543->161538 161545->161546 161546->161524 161548 2a029a2 161547->161548 161548->161548 161549 2a02ae0 40 API calls 161548->161549 161550 2a029b4 161549->161550 161551 2a07b40 40 API calls 2 library calls 161550->161551 161551->161525 161552->161527 161554->161541 161555->161461 161556->161463 161557->161457 161558->161483 161560 2ae31f9 161559->161560 161563 2ae2fc4 161560->161563 161564 2ae2fe0 __fread_nolock std::locale::_Setgloballocale 161563->161564 161565 2ae300c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 161564->161565 161568 2ae30dd std::locale::_Setgloballocale 161565->161568 161567 2ae30fb GetCurrentProcess TerminateProcess 161567->161485 161569 2ade2d8 161568->161569 161570 2ade2e1 IsProcessorFeaturePresent 161569->161570 161571 2ade2e0 161569->161571 161573 2adeaca 161570->161573 161571->161567 161576 2adea8d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 161573->161576 161575 2adebad 161575->161567 161576->161575 161577 2a14060 161578 2a140c2 161577->161578 161586 2a140ef __fread_nolock 161577->161586 161609 2a704a0 40 API calls 2 library calls 161578->161609 161580 2a140cb __fread_nolock 161610 2a6f870 39 API calls std::ios_base::_Ios_base_dtor 161580->161610 161583 2a14177 161587 2a1418b 161583->161587 161611 2a68d70 40 API calls 4 library calls 161583->161611 161585 2a141b1 std::ios_base::_Ios_base_dtor 161586->161583 161591 2a8b8a0 161586->161591 161595 2a75be0 161586->161595 161587->161585 161589 2ae31d0 39 API calls 161587->161589 161590 2a141d3 161589->161590 161592 2a8b8c3 161591->161592 161612 2a88090 161592->161612 161594 2a8b90b 161594->161586 161596 2a75ce0 161595->161596 161597 2a75bf8 161595->161597 161628 2a02e40 40 API calls 161596->161628 161599 2a75c14 161597->161599 161602 2a75c5a 161597->161602 161600 2a75ce5 161599->161600 161601 2addcb0 std::_Facet_Register 40 API calls 161599->161601 161629 2a021d0 40 API calls 2 library calls 161600->161629 161604 2a75c24 __fread_nolock __Strxfrm 161601->161604 161602->161604 161606 2addcb0 std::_Facet_Register 40 API calls 161602->161606 161607 2ae31d0 39 API calls 161604->161607 161608 2a75cb6 std::ios_base::_Ios_base_dtor 161604->161608 161605 2a75cea 161606->161604 161607->161596 161608->161586 161609->161580 161610->161586 161611->161587 161613 2a88097 161612->161613 161617 2a8809c ___std_exception_copy 161612->161617 161613->161594 161614 2a880f2 161614->161594 161617->161614 161618 2aec1f7 161617->161618 161621 2af57d3 161618->161621 161622 2af57de RtlFreeHeap 161621->161622 161623 2a88185 161621->161623 161622->161623 161624 2af57f3 GetLastError 161622->161624 161623->161594 161625 2af5800 __dosmaperr 161624->161625 161627 2aebc60 14 API calls __dosmaperr 161625->161627 161627->161623 161629->161605 161630 2aa5d29 161631 2aa5d6e 161630->161631 161632 2aa5d45 161630->161632 161634 2a9a2c0 161632->161634 161636 2a9a2dd 161634->161636 161640 2a9a2fa 161636->161640 161642 2a99fb0 161636->161642 161637 2aa12a0 14 API calls 161641 2a9a323 161637->161641 161640->161631 161641->161637 161641->161640 161655 2a99ad0 18 API calls 2 library calls 161641->161655 161656 2a99040 161641->161656 161643 2a99fc8 161642->161643 161644 2a99fde 161642->161644 161645 2a99fcc 161643->161645 161661 2a8eb50 161643->161661 161646 2a9a045 161644->161646 161651 2a99ff5 161644->161651 161645->161641 161648 2a99040 18 API calls 161646->161648 161650 2a9a038 161648->161650 161649 2a9a05c 161649->161641 161650->161649 161666 2a99f40 161650->161666 161651->161650 161665 2a977a0 18 API calls 161651->161665 161655->161641 161670 2a97800 161656->161670 161658 2a990b4 161658->161641 161659 2a9905d 161659->161658 161684 2a977a0 18 API calls 161659->161684 161662 2a8eba6 161661->161662 161663 2a8eb5b 161661->161663 161662->161644 161663->161662 161664 2aec1f7 14 API calls 161663->161664 161664->161662 161665->161651 161667 2a99f57 161666->161667 161669 2a99f63 161666->161669 161668 2a99040 18 API calls 161667->161668 161668->161669 161669->161641 161671 2a97818 161670->161671 161675 2a97822 161670->161675 161671->161659 161673 2a97a1e 161673->161659 161674 2a97944 161676 2a9790a 161674->161676 161678 2a97953 161674->161678 161675->161674 161675->161676 161679 2a978ae 161675->161679 161682 2a978cd __fread_nolock 161675->161682 161676->161682 161693 2a977a0 18 API calls 161676->161693 161677 2a97971 161692 2a95630 14 API calls 161677->161692 161678->161677 161678->161682 161691 2a933b0 14 API calls __fread_nolock 161678->161691 161679->161682 161685 2a92210 SetFilePointer 161679->161685 161682->161659 161684->161658 161686 2a9223a GetLastError 161685->161686 161687 2a92251 ReadFile 161685->161687 161686->161687 161688 2a92244 161686->161688 161689 2a9226c GetLastError 161687->161689 161690 2a92280 __fread_nolock 161687->161690 161688->161676 161689->161676 161690->161676 161691->161677 161692->161682 161693->161673 161694 2a6a762 161695 2a6a76b 161694->161695 161701 2a6a77f 161694->161701 161696 2a6aa16 161695->161696 161714 2a6c700 40 API calls 161695->161714 161720 2a02e40 40 API calls 161696->161720 161711 2a6a7e3 161701->161711 161715 2a76310 40 API calls 161701->161715 161703 2a6a94d 161718 2a6c690 39 API calls std::ios_base::_Ios_base_dtor 161703->161718 161705 2a6a95b 161707 2a6a924 std::ios_base::_Ios_base_dtor 161705->161707 161708 2a6aa11 161705->161708 161706 2a6a9fe 161719 2a6c690 39 API calls std::ios_base::_Ios_base_dtor 161707->161719 161710 2ae31d0 39 API calls 161708->161710 161710->161696 161712 2a6a90c 161711->161712 161716 2a6eca0 40 API calls 161711->161716 161717 2a76310 40 API calls 161711->161717 161712->161703 161712->161705 161712->161707 161714->161701 161715->161701 161716->161711 161717->161711 161718->161707 161719->161706 161721 2a62460 GetCursorPos 161722 2a62475 GetCursorPos 161721->161722 161723 2a62548 GetPEB 161722->161723 161725 2a62487 161722->161725 161723->161725 161724 2a62493 GetPEB 161724->161725 161725->161723 161725->161724 161725->161725 161726 2a625bd Sleep 161725->161726 161727 2a62508 Sleep GetCursorPos 161725->161727 161728 2a625e7 161725->161728 161726->161722 161727->161723 161727->161725 161729 2a946a0 161730 2a946ac 161729->161730 161732 2a946d1 161730->161732 161733 2a93ec0 161730->161733 161734 2a93fc5 161733->161734 161735 2a93eda 161733->161735 161734->161732 161735->161734 161736 2a8eb50 14 API calls 161735->161736 161736->161735 161737 2a205eb 161739 2a205fd 161737->161739 161738 2a02ae0 40 API calls 161740 2a2069d std::ios_base::_Ios_base_dtor 161738->161740 161739->161738 161769 2a20652 std::ios_base::_Ios_base_dtor 161739->161769 161740->161769 161772 2a68d70 40 API calls 4 library calls 161740->161772 161741 2ae31d0 39 API calls 161742 2a20c22 161741->161742 161743 2a20bf1 std::ios_base::_Ios_base_dtor 161745 2a20742 161746 2a20803 161745->161746 161747 2a2074f 161745->161747 161777 2a02280 40 API calls __fread_nolock 161746->161777 161773 2a02280 40 API calls __fread_nolock 161747->161773 161749 2a20824 161778 2a02280 40 API calls __fread_nolock 161749->161778 161751 2a20777 161774 2a02280 40 API calls __fread_nolock 161751->161774 161754 2a20788 161775 2a1ff70 84 API calls 2 library calls 161754->161775 161756 2a20851 161779 2a68ea0 161756->161779 161757 2a20797 161760 2a207be 161757->161760 161776 2a68d70 40 API calls 4 library calls 161757->161776 161762 2ae31d0 39 API calls 161760->161762 161760->161769 161761 2a208a2 161784 2a70800 161761->161784 161764 2a20c18 161762->161764 161767 2ae31d0 39 API calls 161764->161767 161765 2a208ef 161766 2a68ea0 40 API calls 161765->161766 161768 2a20902 std::ios_base::_Ios_base_dtor 161766->161768 161767->161769 161768->161764 161770 2a20aa7 std::ios_base::_Ios_base_dtor 161768->161770 161769->161741 161769->161743 161770->161769 161801 2a68d70 40 API calls 4 library calls 161770->161801 161772->161745 161773->161751 161774->161754 161775->161757 161776->161760 161777->161749 161778->161756 161780 2a68eb0 161779->161780 161783 2a68ec7 __Strxfrm 161780->161783 161802 2a6eff0 161780->161802 161782 2a68f02 161782->161761 161783->161761 161785 2a70842 161784->161785 161786 2a70934 161785->161786 161787 2a709fe 161785->161787 161793 2a70847 __Strxfrm 161785->161793 161789 2a70944 161786->161789 161791 2a70996 161786->161791 161792 2a7098d 161786->161792 161819 2a02270 40 API calls 161787->161819 161795 2addcb0 std::_Facet_Register 40 API calls 161789->161795 161790 2a70a03 161820 2a021d0 40 API calls 2 library calls 161790->161820 161797 2addcb0 std::_Facet_Register 40 API calls 161791->161797 161800 2a70964 __Strxfrm 161791->161800 161792->161789 161792->161790 161793->161765 161796 2a70959 161795->161796 161798 2ae31d0 39 API calls 161796->161798 161796->161800 161797->161800 161799 2a70a0d 161798->161799 161800->161765 161801->161769 161803 2a6f132 161802->161803 161806 2a6f015 161802->161806 161817 2a02270 40 API calls 161803->161817 161805 2a6f137 161818 2a021d0 40 API calls 2 library calls 161805->161818 161808 2a6f073 161806->161808 161809 2a6f080 161806->161809 161812 2a6f02a 161806->161812 161808->161805 161808->161812 161811 2a6f03a __Strxfrm 161809->161811 161815 2addcb0 std::_Facet_Register 40 API calls 161809->161815 161810 2addcb0 std::_Facet_Register 40 API calls 161810->161811 161813 2ae31d0 39 API calls 161811->161813 161816 2a6f0f0 std::ios_base::_Ios_base_dtor __Strxfrm 161811->161816 161812->161810 161814 2a6f141 161813->161814 161815->161811 161816->161782 161818->161811 161820->161796 161821 2a96925 161822 2a9692c 161821->161822 161829 2a95740 161822->161829 161824 2a96977 161825 2a96992 161824->161825 161833 2a921c0 FindCloseChangeNotification 161824->161833 161826 2a8eb50 14 API calls 161825->161826 161827 2a969c4 161826->161827 161830 2a95750 161829->161830 161831 2a95768 161829->161831 161830->161831 161837 2a98250 18 API calls 161830->161837 161831->161824 161834 2a921da 161833->161834 161835 2a921f7 161833->161835 161834->161835 161836 2a921e6 Sleep CloseHandle 161834->161836 161835->161825 161836->161834 161836->161835 161837->161831 161838 2a93b64 161839 2a93b69 161838->161839 161840 2a8eb50 14 API calls 161839->161840 161841 2a93b7f 161839->161841 161840->161841 161842 2a6286b 161843 2a62870 161842->161843 161844 2a62984 MessageBoxA 161843->161844 161845 2a628cc __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 161843->161845 161844->161845 161846 2a6299e 161844->161846 161848 2a62a99 GetProcessId 161845->161848 161889 2a028d0 161846->161889 161850 2a62ab9 161848->161850 161849 2a65848 161860 2a62af0 161850->161860 161881 2a141e0 GetPEB IsDebuggerPresent 161850->161881 161852 2a62ad6 161853 2a62ade GetPEB 161852->161853 161854 2a62b68 161852->161854 161853->161860 161882 2a14320 GetTickCount64 Sleep GetTickCount64 161854->161882 161856 2a62b6d 161857 2a62b75 GetPEB 161856->161857 161856->161860 161864 2a62b81 161857->161864 161859 2a62c48 161884 2a143f0 46 API calls std::ios_base::_Ios_base_dtor 161859->161884 161862 2a62d0a 161860->161862 161860->161864 161866 2a62d47 161862->161866 161867 2a62c80 161862->161867 161863 2a62c4f 161885 2a14690 IsDebuggerPresent IsProcessorFeaturePresent GetVolumeInformationA 161863->161885 161864->161860 161883 2a14360 GetModuleHandleA 161864->161883 161871 2a62d7c 161866->161871 161875 2a62d81 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 161866->161875 161867->161862 161887 2a14840 20 API calls 161867->161887 161869 2a62c6f GetPEB 161869->161867 161870 2a62c56 161870->161869 161886 2a14220 GetUserNameA GetComputerNameA GetCurrentProcess TerminateProcess __fread_nolock 161870->161886 161888 2a17d20 112 API calls 4 library calls 161871->161888 161874 2a62c67 161874->161862 161874->161869 161876 2a62e31 SetThreadExecutionState 161875->161876 161877 2a62e42 SetThreadExecutionState 161876->161877 161878 2a62e49 161876->161878 161877->161878 161879 2a62e79 GetPEB 161878->161879 161880 2a62e85 161879->161880 161881->161852 161882->161856 161883->161859 161884->161863 161885->161870 161886->161874 161887->161866 161888->161875 161890 2a028db 161889->161890 161891 2a028f6 std::ios_base::_Ios_base_dtor 161889->161891 161890->161891 161892 2ae31d0 39 API calls 161890->161892 161891->161849 161893 2a0291a 161892->161893 161894 2aa6aba 161895 2aa6acb 161894->161895 161896 2aa891d 161894->161896 161897 2aa6b0d 161895->161897 161898 2aa6b06 161895->161898 161902 2aa360d 161895->161902 161923 2a9a930 18 API calls 161897->161923 161904 2a9a7c0 161898->161904 161901 2a8eb50 14 API calls 161901->161902 161902->161901 161903 2aa82db 161902->161903 161903->161903 161905 2a9a7d9 161904->161905 161906 2a9a7d4 161904->161906 161908 2a9a7e7 161905->161908 161909 2a9a83e 161905->161909 161910 2a9a914 161905->161910 161928 2a98650 18 API calls 161906->161928 161908->161902 161911 2a9a890 161909->161911 161912 2a9a843 161909->161912 161910->161908 161924 2a9a100 161910->161924 161914 2a9a901 161911->161914 161917 2a9a8e1 161911->161917 161929 2a977a0 18 API calls 161911->161929 161915 2a99f40 18 API calls 161912->161915 161914->161902 161916 2a9a870 161915->161916 161916->161908 161918 2a9a100 18 API calls 161916->161918 161917->161908 161920 2a9a7c0 18 API calls 161917->161920 161919 2a9a87f 161918->161919 161919->161902 161922 2a9a8fa 161920->161922 161922->161902 161923->161902 161927 2a9a110 161924->161927 161925 2a9a1bf 161925->161908 161926 2a99040 18 API calls 161926->161927 161927->161925 161927->161926 161928->161905 161929->161911 161930 2a0a170 161931 2addcb0 std::_Facet_Register 40 API calls 161930->161931 161932 2a0a1a8 161931->161932 161933 2a02ae0 40 API calls 161932->161933 161934 2a0a1eb 161933->161934 161952 2ae3d80 161934->161952 161937 2a0a2d7 std::ios_base::_Ios_base_dtor 161939 2a0a2ae 161939->161937 161943 2ae31d0 39 API calls 161939->161943 161945 2a0a2f9 161943->161945 161944 2ae7b56 66 API calls 161946 2a0a25c 161944->161946 161948 2a0a278 161946->161948 161967 2a6b980 161946->161967 161972 2aec600 161948->161972 161981 2ae3cbe 161952->161981 161955 2ae7b56 161956 2ae7b69 _strftime 161955->161956 162054 2ae78ad 161956->162054 161961 2ae390b 161962 2ae391e _strftime 161961->161962 162200 2ae3221 161962->162200 161965 2ae2efc _strftime 39 API calls 161966 2a0a250 161965->161966 161966->161944 161968 2a6b9c7 161967->161968 161969 2a6b998 __fread_nolock 161967->161969 162251 2a6ee90 161968->162251 161969->161948 161971 2a6b9da 161971->161948 162268 2aec61d 161972->162268 161975 2ae7608 161976 2ae761b _strftime 161975->161976 162394 2ae74e3 161976->162394 161982 2ae3cca __FrameHandler3::FrameUnwindToState 161981->161982 161983 2ae3cd1 161982->161983 161985 2ae3cf1 161982->161985 162006 2aebc60 14 API calls __dosmaperr 161983->162006 161987 2ae3cf6 161985->161987 161988 2ae3d03 161985->161988 161986 2ae3cd6 162007 2ae31c0 39 API calls _strftime 161986->162007 162008 2aebc60 14 API calls __dosmaperr 161987->162008 161998 2af50a8 161988->161998 161992 2a0a237 161992->161939 161992->161955 161994 2ae3d13 162009 2aebc60 14 API calls __dosmaperr 161994->162009 161995 2ae3d20 162010 2ae3d5e LeaveCriticalSection __fread_nolock 161995->162010 161999 2af50b4 __FrameHandler3::FrameUnwindToState 161998->161999 162011 2aee728 EnterCriticalSection 161999->162011 162001 2af50c2 162012 2af514c 162001->162012 162006->161986 162007->161992 162008->161992 162009->161992 162010->161992 162011->162001 162019 2af516f 162012->162019 162013 2af50cf 162025 2af5108 162013->162025 162014 2af51c7 162030 2af4e13 162014->162030 162018 2af57d3 std::locale::_Locimp::~_Locimp 14 API calls 162020 2af51d9 162018->162020 162019->162013 162019->162014 162028 2aeb7b1 EnterCriticalSection 162019->162028 162029 2aeb7c5 LeaveCriticalSection 162019->162029 162020->162013 162037 2af5fad 162020->162037 162053 2aee770 LeaveCriticalSection 162025->162053 162027 2ae3d0c 162027->161994 162027->161995 162028->162019 162029->162019 162035 2af4e20 _strftime 162030->162035 162031 2af4e60 162044 2aebc60 14 API calls __dosmaperr 162031->162044 162032 2af4e4b RtlAllocateHeap 162033 2af4e5e 162032->162033 162032->162035 162033->162018 162035->162031 162035->162032 162043 2af01f8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 162035->162043 162045 2af5c02 162037->162045 162040 2af5fe7 InitializeCriticalSectionAndSpinCount 162041 2af51f8 162040->162041 162042 2aeb7b1 EnterCriticalSection 162041->162042 162042->162013 162043->162035 162044->162033 162046 2af5c32 162045->162046 162050 2af5c2e 162045->162050 162046->162050 162052 2af5b37 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary ___vcrt_InitializeCriticalSectionEx 162046->162052 162048 2af5c46 162049 2af5c4c GetProcAddress 162048->162049 162048->162050 162049->162050 162051 2af5c5c _unexpected 162049->162051 162050->162040 162050->162041 162051->162050 162052->162048 162053->162027 162057 2ae78b9 __FrameHandler3::FrameUnwindToState 162054->162057 162055 2ae78bf 162081 2ae3143 39 API calls 2 library calls 162055->162081 162057->162055 162058 2ae7902 162057->162058 162071 2aeb7b1 EnterCriticalSection 162058->162071 162059 2ae78da 162065 2ae2efc 162059->162065 162061 2ae790e 162072 2ae7a30 162061->162072 162063 2ae7924 162082 2ae794d LeaveCriticalSection __fread_nolock 162063->162082 162066 2ae2f08 162065->162066 162068 2ae2f1f 162066->162068 162198 2ae2fa7 39 API calls 2 library calls 162066->162198 162069 2a0a24a 162068->162069 162199 2ae2fa7 39 API calls 2 library calls 162068->162199 162069->161961 162071->162061 162073 2ae7a56 162072->162073 162074 2ae7a43 162072->162074 162083 2ae7957 162073->162083 162074->162063 162076 2ae7a79 162077 2ae7b07 162076->162077 162087 2ae3ff1 162076->162087 162077->162063 162081->162059 162082->162059 162084 2ae7968 162083->162084 162086 2ae79c0 162083->162086 162084->162086 162096 2aecb5e 41 API calls 2 library calls 162084->162096 162086->162076 162088 2ae400a 162087->162088 162092 2ae4031 162087->162092 162088->162092 162097 2af49a2 162088->162097 162090 2ae4026 162104 2af3dac 162090->162104 162093 2aecb9e 162092->162093 162174 2aeca7d 162093->162174 162095 2aecbb7 162095->162077 162096->162086 162098 2af49ae 162097->162098 162099 2af49c3 162097->162099 162115 2aebc60 14 API calls __dosmaperr 162098->162115 162099->162090 162101 2af49b3 162116 2ae31c0 39 API calls _strftime 162101->162116 162103 2af49be 162103->162090 162105 2af3db8 __FrameHandler3::FrameUnwindToState 162104->162105 162106 2af3df9 162105->162106 162108 2af3e3f 162105->162108 162114 2af3dc0 162105->162114 162146 2ae3143 39 API calls 2 library calls 162106->162146 162117 2af8e82 EnterCriticalSection 162108->162117 162110 2af3e45 162111 2af3e63 162110->162111 162118 2af3ebd 162110->162118 162147 2af3eb5 LeaveCriticalSection __wsopen_s 162111->162147 162114->162092 162115->162101 162116->162103 162117->162110 162119 2af3ee5 162118->162119 162122 2af3f08 __wsopen_s 162118->162122 162120 2af3ee9 162119->162120 162123 2af3f44 162119->162123 162155 2ae3143 39 API calls 2 library calls 162120->162155 162122->162111 162125 2aecb9e __wsopen_s 41 API calls 162123->162125 162127 2af3f62 162123->162127 162125->162127 162148 2af3a02 162127->162148 162146->162114 162147->162114 162161 2aff764 162148->162161 162151 2af3a14 162155->162122 162162 2aff771 162161->162162 162164 2aff77e 162161->162164 162171 2aebc60 14 API calls __dosmaperr 162162->162171 162166 2aff78a 162164->162166 162172 2aebc60 14 API calls __dosmaperr 162164->162172 162165 2aff776 162165->162151 162166->162151 162168 2aff7ab 162171->162165 162172->162168 162180 2af90fe 162174->162180 162176 2aeca8f 162177 2aecaab SetFilePointerEx 162176->162177 162179 2aeca97 __wsopen_s 162176->162179 162178 2aecac3 GetLastError 162177->162178 162177->162179 162178->162179 162179->162095 162181 2af910b 162180->162181 162182 2af9120 162180->162182 162193 2aebc4d 14 API calls __dosmaperr 162181->162193 162186 2af9145 162182->162186 162195 2aebc4d 14 API calls __dosmaperr 162182->162195 162185 2af9110 162194 2aebc60 14 API calls __dosmaperr 162185->162194 162186->162176 162187 2af9150 162196 2aebc60 14 API calls __dosmaperr 162187->162196 162190 2af9118 162190->162176 162191 2af9158 162197 2ae31c0 39 API calls _strftime 162191->162197 162193->162185 162194->162190 162195->162187 162196->162191 162197->162190 162198->162068 162199->162069 162201 2ae322d __FrameHandler3::FrameUnwindToState 162200->162201 162202 2ae3234 162201->162202 162203 2ae3255 162201->162203 162215 2ae3143 39 API calls 2 library calls 162202->162215 162211 2aeb7b1 EnterCriticalSection 162203->162211 162206 2ae324d 162206->161965 162207 2ae3260 162212 2ae3330 162207->162212 162211->162207 162217 2ae3362 162212->162217 162214 2ae326f 162216 2ae3297 LeaveCriticalSection __fread_nolock 162214->162216 162215->162206 162216->162206 162218 2ae3399 162217->162218 162219 2ae3371 162217->162219 162221 2af49a2 __fread_nolock 39 API calls 162218->162221 162234 2ae3143 39 API calls 2 library calls 162219->162234 162222 2ae33a2 162221->162222 162231 2aecb40 162222->162231 162225 2ae344c 162235 2ae36ce 44 API calls 4 library calls 162225->162235 162226 2ae3463 162230 2ae338c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 162226->162230 162236 2ae3503 43 API calls 2 library calls 162226->162236 162228 2ae345b 162228->162230 162230->162214 162237 2aec958 162231->162237 162234->162230 162235->162228 162236->162230 162239 2aec964 __FrameHandler3::FrameUnwindToState 162237->162239 162238 2ae33c0 162238->162225 162238->162226 162238->162230 162239->162238 162240 2aec9a7 162239->162240 162242 2aec9ed 162239->162242 162249 2ae3143 39 API calls 2 library calls 162240->162249 162248 2af8e82 EnterCriticalSection 162242->162248 162244 2aec9f3 162245 2aeca14 162244->162245 162246 2aeca7d __fread_nolock 41 API calls 162244->162246 162250 2aeca75 LeaveCriticalSection __wsopen_s 162245->162250 162246->162245 162248->162244 162249->162238 162250->162238 162252 2a6efd9 162251->162252 162255 2a6eeb5 162251->162255 162266 2a02270 40 API calls 162252->162266 162254 2a6efde 162267 2a021d0 40 API calls 2 library calls 162254->162267 162257 2a6ef13 162255->162257 162258 2a6ef20 162255->162258 162261 2a6eeca 162255->162261 162257->162254 162257->162261 162262 2a6eeda __fread_nolock __Strxfrm 162258->162262 162264 2addcb0 std::_Facet_Register 40 API calls 162258->162264 162259 2addcb0 std::_Facet_Register 40 API calls 162259->162262 162260 2ae31d0 39 API calls 162263 2a6efe8 162260->162263 162261->162259 162262->162260 162265 2a6ef97 std::ios_base::_Ios_base_dtor __fread_nolock __Strxfrm 162262->162265 162264->162262 162265->161971 162267->162262 162269 2aec629 __FrameHandler3::FrameUnwindToState 162268->162269 162270 2aec63c __fread_nolock 162269->162270 162271 2aec673 162269->162271 162280 2a0a2a8 162269->162280 162295 2aebc60 14 API calls __dosmaperr 162270->162295 162281 2aeb7b1 EnterCriticalSection 162271->162281 162274 2aec67d 162282 2aec427 162274->162282 162275 2aec656 162296 2ae31c0 39 API calls _strftime 162275->162296 162280->161975 162281->162274 162286 2aec439 __fread_nolock 162282->162286 162288 2aec456 162282->162288 162286->162288 162295->162275 162296->162280 162395 2ae74ef __FrameHandler3::FrameUnwindToState 162394->162395 162459 2a19eb0 162460 2a19eec VirtualAllocEx 162459->162460 162462 2a19f1c 162460->162462 162463 2a19f1f WriteProcessMemory 162460->162463 162462->162463 162464 2a19f75 VirtualAllocEx 162463->162464 162465 2a19f37 WriteProcessMemory 162463->162465 162468 2a19feb __fread_nolock 162464->162468 162467 2a19f72 162465->162467 162467->162464 162469 2a1a1dc 162468->162469 162470 2a1a01c 162468->162470 162504 2a02270 40 API calls 162469->162504 162484 2a70a10 162470->162484 162472 2a1a1e1 162475 2ae31d0 39 API calls 162472->162475 162474 2a1a042 162499 2a68f10 162474->162499 162482 2a1a161 std::ios_base::_Ios_base_dtor 162475->162482 162477 2ae31d0 39 API calls 162478 2a1a1eb 162477->162478 162479 2a1a053 162479->162472 162480 2a1a0c7 std::ios_base::_Ios_base_dtor 162479->162480 162481 2a1a103 WriteProcessMemory WriteProcessMemory CreateRemoteThread WaitForSingleObject 162480->162481 162481->162482 162482->162477 162483 2a1a1c1 std::ios_base::_Ios_base_dtor 162482->162483 162486 2a70a42 162484->162486 162490 2a70a6d __Strxfrm 162484->162490 162485 2a70a4f 162487 2addcb0 std::_Facet_Register 40 API calls 162485->162487 162486->162485 162488 2a70a92 162486->162488 162489 2a70a9b 162486->162489 162491 2a70a62 162487->162491 162488->162485 162492 2a70aec 162488->162492 162489->162490 162493 2addcb0 std::_Facet_Register 40 API calls 162489->162493 162490->162474 162491->162490 162495 2ae31d0 39 API calls 162491->162495 162505 2a021d0 40 API calls 2 library calls 162492->162505 162493->162490 162496 2a70af6 162495->162496 162497 2aec1f7 std::locale::_Locimp::~_Locimp 14 API calls 162496->162497 162498 2a70b14 std::ios_base::_Ios_base_dtor 162497->162498 162498->162474 162500 2a68f24 162499->162500 162501 2a6eff0 40 API calls 162500->162501 162503 2a68f34 __Strxfrm 162500->162503 162502 2a68f7a 162501->162502 162502->162479 162503->162479 162505->162491 162506 2af4bbb 162507 2af49a2 __fread_nolock 39 API calls 162506->162507 162509 2af4bc8 162507->162509 162508 2af4bd4 162509->162508 162513 2af4c20 162509->162513 162529 2af4d83 41 API calls __wsopen_s 162509->162529 162513->162508 162517 2af4c82 162513->162517 162530 2af7026 162513->162530 162514 2af4c75 162514->162517 162537 2af7e43 14 API calls 2 library calls 162514->162537 162518 2af4cb1 162517->162518 162519 2af49a2 __fread_nolock 39 API calls 162518->162519 162520 2af4cc0 162519->162520 162521 2af4d66 162520->162521 162522 2af4cd3 162520->162522 162523 2af3dac __wsopen_s 64 API calls 162521->162523 162524 2af4d17 162522->162524 162525 2af4cf0 162522->162525 162527 2af4c93 162523->162527 162524->162527 162538 2aecb00 162524->162538 162526 2af3dac __wsopen_s 64 API calls 162525->162526 162526->162527 162529->162513 162531 2af7032 162530->162531 162532 2af705c 162531->162532 162533 2af49a2 __fread_nolock 39 API calls 162531->162533 162532->162514 162534 2af704d 162533->162534 162535 2aff764 __fread_nolock 39 API calls 162534->162535 162536 2af7053 162535->162536 162536->162514 162537->162517 162539 2aecb14 _strftime 162538->162539 162540 2aec958 43 API calls 162539->162540 162541 2aecb29 162540->162541 162542 2ae2efc _strftime 39 API calls 162541->162542 162543 2aecb38 162542->162543 162543->162527 162544 2aa4d7f 162545 2aa4d9c 162544->162545 162549 2aa360d 162544->162549 162560 2a996a0 162545->162560 162547 2a8eb50 14 API calls 162547->162549 162548 2aa3615 162550 2aa86ae 162548->162550 162551 2a9a2c0 18 API calls 162548->162551 162559 2a9a7c0 18 API calls 162548->162559 162570 2a98650 18 API calls 162548->162570 162571 2a9ce60 18 API calls 162548->162571 162549->162547 162556 2aa82db 162549->162556 162553 2aa876c 162550->162553 162572 2a8ef90 14 API calls 162550->162572 162551->162548 162556->162556 162559->162548 162561 2a997ad 162560->162561 162566 2a996c1 162560->162566 162563 2a996d7 162561->162563 162587 2a982e0 14 API calls __fread_nolock 162561->162587 162563->162548 162563->162550 162569 2a982e0 14 API calls __fread_nolock 162563->162569 162566->162561 162566->162563 162573 2a993e0 162566->162573 162584 2a97bd0 14 API calls 162566->162584 162585 2a995f0 18 API calls __fread_nolock 162566->162585 162586 2a990c0 18 API calls 162566->162586 162569->162548 162570->162548 162571->162548 162572->162553 162588 2a97240 162573->162588 162575 2a993f5 162576 2a97800 18 API calls 162575->162576 162577 2a9954f 162575->162577 162579 2a9940f 162576->162579 162577->162566 162578 2a99547 162578->162577 162597 2a977a0 18 API calls 162578->162597 162579->162577 162579->162578 162581 2a994f7 162579->162581 162583 2a99513 162581->162583 162596 2a977a0 18 API calls 162581->162596 162583->162566 162584->162566 162585->162566 162586->162566 162587->162563 162589 2a97257 162588->162589 162592 2a973aa 162589->162592 162593 2a972de 162589->162593 162598 2a92ed0 162589->162598 162591 2a9733d __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 162591->162592 162595 2a92210 4 API calls 162591->162595 162592->162575 162592->162592 162593->162591 162593->162592 162609 2a96140 18 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 162593->162609 162595->162592 162596->162583 162597->162577 162610 2a92880 162598->162610 162600 2a92ee5 162601 2a92eeb 162600->162601 162602 2a92efd GetVersionExA 162600->162602 162603 2a92f26 162600->162603 162601->162593 162602->162603 162604 2a92f2d GetFileAttributesW 162603->162604 162605 2a92f35 GetFileAttributesA 162603->162605 162606 2a92f3b 162604->162606 162605->162606 162607 2aec1f7 std::locale::_Locimp::~_Locimp 14 API calls 162606->162607 162608 2a92f43 162607->162608 162608->162593 162609->162591 162611 2a928be 162610->162611 162612 2a92895 GetVersionExA 162610->162612 162613 2a928cf 162611->162613 162614 2a928c5 162611->162614 162612->162611 162629 2a92060 16 API calls 2 library calls 162613->162629 162628 2a92060 16 API calls 2 library calls 162614->162628 162617 2a928ca 162617->162600 162618 2a928d5 162619 2a928db 162618->162619 162620 2a928e1 AreFileApisANSI WideCharToMultiByte 162618->162620 162619->162600 162621 2a9290a ___std_exception_copy 162620->162621 162622 2a92913 WideCharToMultiByte 162621->162622 162623 2a92931 162621->162623 162622->162623 162624 2a9292b 162622->162624 162626 2aec1f7 std::locale::_Locimp::~_Locimp 14 API calls 162623->162626 162625 2aec1f7 std::locale::_Locimp::~_Locimp 14 API calls 162624->162625 162625->162623 162627 2a9293c 162626->162627 162627->162600 162628->162617 162629->162618 162630 2af5438 162635 2af520e 162630->162635 162634 2af5477 162636 2af522d 162635->162636 162637 2af5240 162636->162637 162641 2af5255 162636->162641 162655 2aebc60 14 API calls __dosmaperr 162637->162655 162639 2af5245 162656 2ae31c0 39 API calls _strftime 162639->162656 162642 2af5375 162641->162642 162657 2aeb50f 162641->162657 162643 2af5250 162642->162643 162671 2aebc60 14 API calls __dosmaperr 162642->162671 162643->162634 162652 2aed214 162643->162652 162645 2af5426 162672 2ae31c0 39 API calls _strftime 162645->162672 162648 2af53c5 162648->162642 162649 2aeb50f 39 API calls 162648->162649 162650 2af53e3 162649->162650 162650->162642 162651 2aeb50f 39 API calls 162650->162651 162651->162642 162678 2aecbbc 162652->162678 162655->162639 162656->162643 162658 2aeb566 162657->162658 162660 2aeb51e 162657->162660 162677 2aeb57c 39 API calls 2 library calls 162658->162677 162661 2aeb524 162660->162661 162662 2aeb541 162660->162662 162673 2aebc60 14 API calls __dosmaperr 162661->162673 162670 2aeb55f 162662->162670 162675 2aebc60 14 API calls __dosmaperr 162662->162675 162663 2aeb534 162663->162648 162665 2aeb529 162674 2ae31c0 39 API calls _strftime 162665->162674 162668 2aeb550 162676 2ae31c0 39 API calls _strftime 162668->162676 162670->162648 162671->162645 162672->162643 162673->162665 162674->162663 162675->162668 162676->162663 162677->162663 162680 2aecbc8 __FrameHandler3::FrameUnwindToState 162678->162680 162679 2aecbcf 162698 2aebc60 14 API calls __dosmaperr 162679->162698 162680->162679 162682 2aecbfa 162680->162682 162689 2aed1a6 162682->162689 162683 2aecbd4 162699 2ae31c0 39 API calls _strftime 162683->162699 162688 2aecbde 162688->162634 162701 2ae7707 162689->162701 162695 2aecc1e 162700 2aecc51 LeaveCriticalSection __wsopen_s 162695->162700 162696 2aed1dc 162696->162695 162697 2af57d3 std::locale::_Locimp::~_Locimp 14 API calls 162696->162697 162697->162695 162698->162683 162699->162688 162700->162688 162757 2ae3b0e 162701->162757 162704 2ae772b 162706 2ae76ea 162704->162706 162819 2ae7638 162706->162819 162709 2aed234 162710 2aed251 162709->162710 162711 2aed27f 162710->162711 162712 2aed266 162710->162712 162844 2af8f5a 162711->162844 162858 2aebc4d 14 API calls __dosmaperr 162712->162858 162716 2aed28d 162860 2aebc4d 14 API calls __dosmaperr 162716->162860 162717 2aed2a4 162857 2aeceed CreateFileW 162717->162857 162721 2aed292 162861 2aebc60 14 API calls __dosmaperr 162721->162861 162723 2aed35a GetFileType 162725 2aed365 GetLastError 162723->162725 162730 2aed3ac 162723->162730 162724 2aed32f GetLastError 162863 2aebc06 14 API calls __dosmaperr 162724->162863 162864 2aebc06 14 API calls __dosmaperr 162725->162864 162727 2aed2dd 162727->162723 162727->162724 162862 2aeceed CreateFileW 162727->162862 162729 2aed373 CloseHandle 162732 2aed26b 162729->162732 162733 2aed39c 162729->162733 162866 2af8ea5 15 API calls 2 library calls 162730->162866 162859 2aebc60 14 API calls __dosmaperr 162732->162859 162865 2aebc60 14 API calls __dosmaperr 162733->162865 162735 2aed322 162735->162723 162735->162724 162737 2aed3cd 162739 2aed42f 162737->162739 162867 2aed0fc 73 API calls 3 library calls 162737->162867 162738 2aed3a1 162738->162732 162869 2aecc97 74 API calls 4 library calls 162739->162869 162742 2aed44e 162744 2aed45c 162742->162744 162745 2aed459 162742->162745 162743 2aed419 162743->162739 162746 2aed420 162743->162746 162748 2aed539 162744->162748 162750 2aed4d8 CloseHandle 162744->162750 162745->162746 162868 2af3503 42 API calls 2 library calls 162746->162868 162749 2aed278 162748->162749 162749->162696 162870 2aeceed CreateFileW 162750->162870 162758 2ae3b2c 162757->162758 162759 2ae3b25 162757->162759 162758->162759 162766 2af45fb GetLastError 162758->162766 162759->162704 162765 2af5cc7 5 API calls std::_Lockit::_Lockit 162759->162765 162765->162704 162767 2af4617 162766->162767 162768 2af4611 162766->162768 162772 2af461b SetLastError 162767->162772 162799 2af5e54 6 API calls _unexpected 162767->162799 162798 2af5e15 6 API calls _unexpected 162768->162798 162771 2af4633 162771->162772 162774 2af4e13 _unexpected 14 API calls 162771->162774 162776 2ae3b4d 162772->162776 162777 2af46b0 162772->162777 162775 2af4648 162774->162775 162779 2af4661 162775->162779 162780 2af4650 162775->162780 162793 2af48e6 162776->162793 162804 2aeec79 162777->162804 162801 2af5e54 6 API calls _unexpected 162779->162801 162800 2af5e54 6 API calls _unexpected 162780->162800 162784 2af466d 162786 2af4688 162784->162786 162787 2af4671 162784->162787 162785 2af465e 162789 2af57d3 std::locale::_Locimp::~_Locimp 14 API calls 162785->162789 162803 2af4429 14 API calls _unexpected 162786->162803 162802 2af5e54 6 API calls _unexpected 162787->162802 162789->162772 162791 2af4693 162792 2af57d3 std::locale::_Locimp::~_Locimp 14 API calls 162791->162792 162792->162772 162794 2af48f9 162793->162794 162795 2ae3b63 162793->162795 162794->162795 162818 2afdf13 39 API calls 4 library calls 162794->162818 162797 2af4944 39 API calls _strftime 162795->162797 162797->162759 162798->162767 162799->162771 162800->162785 162801->162784 162802->162785 162803->162791 162815 2afb1a1 EnterCriticalSection LeaveCriticalSection std::locale::_Setgloballocale 162804->162815 162806 2aeec7e 162807 2aeec89 162806->162807 162816 2afb1e6 39 API calls 7 library calls 162806->162816 162808 2aeec93 IsProcessorFeaturePresent 162807->162808 162814 2aeecb2 162807->162814 162810 2aeec9f 162808->162810 162812 2ae2fc4 std::locale::_Setgloballocale 8 API calls 162810->162812 162812->162814 162813 2aeecbc 162817 2aedc43 21 API calls std::locale::_Setgloballocale 162814->162817 162815->162806 162816->162807 162817->162813 162818->162795 162820 2ae7646 162819->162820 162821 2ae7660 162819->162821 162837 2ae7746 14 API calls std::locale::_Locimp::~_Locimp 162820->162837 162823 2ae7686 162821->162823 162824 2ae7667 162821->162824 162839 2af5933 MultiByteToWideChar _strftime 162823->162839 162836 2ae7650 162824->162836 162838 2ae7760 15 API calls _strftime 162824->162838 162827 2ae7695 162828 2ae769c GetLastError 162827->162828 162835 2ae76c2 162827->162835 162842 2ae7760 15 API calls _strftime 162827->162842 162840 2aebc06 14 API calls __dosmaperr 162828->162840 162831 2ae76a8 162841 2aebc60 14 API calls __dosmaperr 162831->162841 162833 2ae76d9 162833->162828 162833->162836 162835->162836 162843 2af5933 MultiByteToWideChar _strftime 162835->162843 162836->162696 162836->162709 162837->162836 162838->162836 162839->162827 162840->162831 162841->162836 162842->162835 162843->162833 162845 2af8f66 __FrameHandler3::FrameUnwindToState 162844->162845 162873 2aee728 EnterCriticalSection 162845->162873 162847 2af8fb4 162874 2af9064 162847->162874 162849 2af8f6d 162849->162847 162850 2af8f92 162849->162850 162854 2af9001 EnterCriticalSection 162849->162854 162877 2af8d34 162850->162877 162854->162847 162855 2af900e LeaveCriticalSection 162854->162855 162855->162849 162857->162727 162858->162732 162859->162749 162860->162721 162861->162732 162862->162735 162863->162732 162864->162729 162865->162738 162866->162737 162867->162743 162868->162749 162869->162742 162873->162849 162885 2aee770 LeaveCriticalSection 162874->162885 162876 2aed284 162876->162716 162876->162717 162878 2af4e13 _unexpected 14 API calls 162877->162878 162882 2af8d46 162878->162882 162879 2af57d3 std::locale::_Locimp::~_Locimp 14 API calls 162881 2af8da8 162879->162881 162880 2af5fad _unexpected 6 API calls 162880->162882 162881->162847 162884 2af8e82 EnterCriticalSection 162881->162884 162882->162880 162883 2af8d53 162882->162883 162883->162879 162884->162847 162885->162876 162886 2a20cc3 162887 2a20ccc 162886->162887 162888 2a70a10 40 API calls 162887->162888 162889 2a20ce2 FindFirstFileA 162888->162889 162905 2a20d13 std::ios_base::_Ios_base_dtor 162889->162905 162891 2a21012 162893 2ae31d0 39 API calls 162891->162893 162892 2a20f37 FindNextFileA 162894 2a20f4d GetLastError 162892->162894 162892->162905 162895 2a20d55 162893->162895 162896 2a20f5c FindClose 162894->162896 162894->162905 162897 2ae31d0 39 API calls 162895->162897 162899 2a20d7f std::ios_base::_Ios_base_dtor 162895->162899 162896->162895 162896->162899 162898 2a2101c 162897->162898 162900 2a02ae0 40 API calls 162900->162905 162901 2a68050 40 API calls 162901->162905 162902 2a2100d 162907 2a02270 40 API calls 162902->162907 162904 2a70a10 40 API calls 162904->162905 162905->162891 162905->162892 162905->162895 162905->162900 162905->162901 162905->162902 162905->162904 162906 2a68ea0 40 API calls 162905->162906 162906->162905 162908 2a1e000 WSAStartup 162909 2a1e117 162908->162909 162910 2a1e038 162908->162910 162910->162909 162911 2a1e06e getaddrinfo 162910->162911 162912 2a1e111 WSACleanup 162911->162912 162913 2a1e0c7 162911->162913 162912->162909 162914 2a1e125 freeaddrinfo 162913->162914 162915 2a1e0d5 socket 162913->162915 162914->162912 162916 2a1e131 162914->162916 162915->162912 162917 2a1e0eb connect 162915->162917 162918 2a1e121 162917->162918 162919 2a1e0fd closesocket 162917->162919 162918->162914 162919->162915 162920 2a1e107 freeaddrinfo 162919->162920 162920->162912 162921 2af714d 162922 2af715a 162921->162922 162926 2af7172 162921->162926 162971 2aebc60 14 API calls __dosmaperr 162922->162971 162924 2af715f 162972 2ae31c0 39 API calls _strftime 162924->162972 162927 2af71d1 162926->162927 162935 2af716a 162926->162935 162973 2af7e43 14 API calls 2 library calls 162926->162973 162929 2af49a2 __fread_nolock 39 API calls 162927->162929 162930 2af71ea 162929->162930 162941 2af2f2b 162930->162941 162933 2af49a2 __fread_nolock 39 API calls 162934 2af7223 162933->162934 162934->162935 162936 2af49a2 __fread_nolock 39 API calls 162934->162936 162937 2af7231 162936->162937 162937->162935 162938 2af49a2 __fread_nolock 39 API calls 162937->162938 162939 2af723f 162938->162939 162940 2af49a2 __fread_nolock 39 API calls 162939->162940 162940->162935 162942 2af2f37 __FrameHandler3::FrameUnwindToState 162941->162942 162943 2af2f3f 162942->162943 162947 2af2f5a 162942->162947 162975 2aebc4d 14 API calls __dosmaperr 162943->162975 162945 2af2f44 162976 2aebc60 14 API calls __dosmaperr 162945->162976 162948 2af2f71 162947->162948 162949 2af2fac 162947->162949 162977 2aebc4d 14 API calls __dosmaperr 162948->162977 162951 2af2fca 162949->162951 162952 2af2fb5 162949->162952 162974 2af8e82 EnterCriticalSection 162951->162974 162980 2aebc4d 14 API calls __dosmaperr 162952->162980 162953 2af2f76 162978 2aebc60 14 API calls __dosmaperr 162953->162978 162954 2af2f4c 162954->162933 162954->162935 162958 2af2fba 162981 2aebc60 14 API calls __dosmaperr 162958->162981 162959 2af2fd0 162962 2af2fef 162959->162962 162963 2af3004 162959->162963 162960 2af2f7e 162979 2ae31c0 39 API calls _strftime 162960->162979 162982 2aebc60 14 API calls __dosmaperr 162962->162982 162965 2af3044 __fread_nolock 51 API calls 162963->162965 162967 2af2fff 162965->162967 162984 2af303c LeaveCriticalSection __wsopen_s 162967->162984 162968 2af2ff4 162983 2aebc4d 14 API calls __dosmaperr 162968->162983 162971->162924 162972->162935 162973->162927 162974->162959 162975->162945 162976->162954 162977->162953 162978->162960 162979->162954 162980->162958 162981->162960 162982->162968 162983->162967 162984->162954 162985 2af49c9 GetStartupInfoW 162986 2af4a7a 162985->162986 162987 2af49e6 162985->162987 162987->162986 162991 2af8de4 162987->162991 162989 2af4a0e 162989->162986 162990 2af4a3e GetFileType 162989->162990 162990->162989 162992 2af8df0 __FrameHandler3::FrameUnwindToState 162991->162992 162993 2af8e1a 162992->162993 162994 2af8df9 162992->162994 163004 2aee728 EnterCriticalSection 162993->163004 163005 2aebc60 14 API calls __dosmaperr 162994->163005 162997 2af8dfe 163006 2ae31c0 39 API calls _strftime 162997->163006 162999 2af8e52 163007 2af8e79 LeaveCriticalSection std::_Lockit::~_Lockit 162999->163007 163000 2af8e08 163000->162989 163001 2af8e26 163001->162999 163003 2af8d34 __wsopen_s 15 API calls 163001->163003 163003->163001 163004->163001 163005->162997 163006->163000 163007->163000 163008 2a72b8d 163010 2a72ea3 163008->163010 163011 2a728a3 163008->163011 163011->163008 163011->163010 163013 2a733b0 40 API calls 163011->163013 163014 2a02d00 163011->163014 163028 2a73620 40 API calls 163011->163028 163013->163011 163015 2a02e33 163014->163015 163016 2a02d25 163014->163016 163029 2a02e40 40 API calls 163015->163029 163017 2a02d3f 163016->163017 163020 2a02d85 163016->163020 163019 2a02e38 163017->163019 163021 2addcb0 std::_Facet_Register 40 API calls 163017->163021 163030 2a021d0 40 API calls 2 library calls 163019->163030 163024 2addcb0 std::_Facet_Register 40 API calls 163020->163024 163026 2a02d4f __Strxfrm 163020->163026 163021->163026 163023 2a02e3d 163024->163026 163025 2ae31d0 39 API calls 163025->163015 163026->163025 163027 2a02e04 std::ios_base::_Ios_base_dtor 163026->163027 163027->163011 163028->163011 163030->163023 163031 2ab5680 163032 2ab5699 163031->163032 163035 2ab59ff 163032->163035 163037 2ab5738 163032->163037 163038 2ab5a37 163032->163038 163064 2a9eed0 163032->163064 163035->163035 163035->163038 163057 2a91e60 163035->163057 163036 2ab57c3 163068 2acc4a0 163036->163068 163037->163036 163039 2a9eed0 14 API calls 163037->163039 163048 2ab58db 163037->163048 163039->163036 163042 2ab5846 163044 2ab585b 163042->163044 163046 2a9eed0 14 API calls 163042->163046 163043 2ab5945 163045 2a8eb50 14 API calls 163043->163045 163047 2ab595f 163043->163047 163044->163048 163257 2ac6750 56 API calls __fread_nolock 163044->163257 163045->163047 163046->163044 163260 2ab5260 14 API calls 163047->163260 163259 2ab34d0 14 API calls __fread_nolock 163048->163259 163050 2ab58ad 163050->163038 163258 2ab3c70 14 API calls 163050->163258 163053 2ab5988 163054 2ab59b1 163053->163054 163055 2a9eed0 14 API calls 163053->163055 163261 2a9f530 14 API calls __Strxfrm 163054->163261 163055->163054 163058 2a91e7b 163057->163058 163059 2a8eb50 14 API calls 163058->163059 163063 2a91f3a 163058->163063 163060 2a91f21 163059->163060 163060->163063 163262 2a91b20 163060->163262 163063->163038 163063->163063 163065 2a9eedc 163064->163065 163265 2a8ed90 163065->163265 163067 2a9eef4 163067->163037 163069 2ace113 163068->163069 163070 2acc4ce __fread_nolock 163068->163070 163069->163042 163070->163069 163287 2acbdf0 163070->163287 163072 2acc790 163074 2a8eb50 14 API calls 163072->163074 163083 2ace0aa 163072->163083 163073 2acc6df 163075 2acc70d 163073->163075 163076 2acc76f 163073->163076 163074->163083 163078 2acc759 163075->163078 163091 2acc73f 163075->163091 163077 2acc79d 163076->163077 163080 2acc785 163076->163080 163081 2acc7b3 163077->163081 163299 2aabb40 14 API calls 163077->163299 163297 2ac6ee0 56 API calls __fread_nolock 163078->163297 163298 2a90e80 14 API calls 163080->163298 163092 2acc877 163081->163092 163300 2ac5730 14 API calls __fread_nolock 163081->163300 163082 2acc765 163082->163042 163085 2a8eb50 14 API calls 163083->163085 163088 2ace0ec 163083->163088 163085->163069 163088->163042 163089 2acc7e7 163094 2acc81b 163089->163094 163099 2a9eed0 14 API calls 163089->163099 163090 2acc8b6 163302 2a9f030 14 API calls 163090->163302 163296 2a90e80 14 API calls 163091->163296 163092->163090 163097 2a9eed0 14 API calls 163092->163097 163301 2a9f530 14 API calls __Strxfrm 163094->163301 163097->163090 163098 2acc74a 163098->163042 163099->163094 163100 2acc8fd 163303 2ac6ab0 14 API calls 163100->163303 163103 2acc4a0 56 API calls 163105 2acc523 163103->163105 163104 2acc90e 163120 2acc95d 163104->163120 163304 2ac5730 14 API calls __fread_nolock 163104->163304 163105->163072 163105->163073 163105->163103 163295 2acac50 14 API calls __fread_nolock 163105->163295 163107 2acc930 163110 2acc962 163107->163110 163114 2a9eed0 14 API calls 163107->163114 163108 2acca8a 163311 2a9f030 14 API calls 163108->163311 163109 2acc9d2 163307 2ad5390 56 API calls __fread_nolock 163109->163307 163306 2a9f530 14 API calls __Strxfrm 163110->163306 163115 2acc947 163114->163115 163115->163110 163116 2acc94b 163115->163116 163305 2a9f530 14 API calls __Strxfrm 163116->163305 163118 2acc9e8 163118->163072 163119 2acca29 163118->163119 163308 2a9f1d0 14 API calls 163118->163308 163309 2ac4e60 14 API calls 163119->163309 163120->163108 163120->163109 163122 2acca72 163310 2ad5d90 14 API calls 163122->163310 163123 2accc1a 163127 2aa8e70 56 API calls 163123->163127 163139 2accc60 163123->163139 163127->163139 163128 2accd09 163128->163072 163132 2accd2f 163128->163132 163133 2acdac7 163128->163133 163129 2accad5 163130 2accbba 163129->163130 163312 2aa8e70 163129->163312 163130->163123 163131 2aa8e70 56 API calls 163130->163131 163131->163130 163324 2ac5730 14 API calls __fread_nolock 163132->163324 163155 2acdd50 163133->163155 163160 2acdb38 163133->163160 163134 2ace01f 163134->163072 163355 2ac6020 14 API calls 163134->163355 163137 2accd46 163140 2accd75 163137->163140 163144 2a9eed0 14 API calls 163137->163144 163138 2acde87 163347 2acbea0 14 API calls 163138->163347 163139->163128 163142 2aa8e70 56 API calls 163139->163142 163325 2a9f530 14 API calls __Strxfrm 163140->163325 163142->163139 163144->163140 163145 2acdecd 163348 2ad5390 56 API calls __fread_nolock 163145->163348 163148 2accdd5 163326 2a9f030 14 API calls 163148->163326 163149 2acdee7 163149->163072 163349 2acc150 14 API calls 163149->163349 163151 2accded 163327 2a9f030 14 API calls 163151->163327 163154 2acce02 163157 2acce3f 163154->163157 163161 2a9eed0 14 API calls 163154->163161 163155->163138 163346 2aabb40 14 API calls 163155->163346 163165 2acce9d 163157->163165 163170 2a9eed0 14 API calls 163157->163170 163159 2acdf43 163350 2ad5d90 14 API calls 163159->163350 163342 2ab8330 14 API calls 163160->163342 163161->163157 163162 2acdbe3 163171 2a9eed0 14 API calls 163162->163171 163176 2acdbfc 163162->163176 163164 2acdf8c 163351 2acc080 14 API calls 163164->163351 163174 2accef4 163165->163174 163179 2a9eed0 14 API calls 163165->163179 163166 2acdf17 163166->163159 163167 2a9eed0 14 API calls 163166->163167 163167->163159 163168 2acdba1 163168->163162 163343 2ab8490 14 API calls __fread_nolock 163168->163343 163170->163165 163171->163176 163172 2acdc6e 163178 2acdcb0 163172->163178 163184 2a9eed0 14 API calls 163172->163184 163173 2acdd07 163352 2ab0a90 14 API calls 163173->163352 163328 2ad5390 56 API calls __fread_nolock 163174->163328 163175 2acdc7f 163345 2a9f1d0 14 API calls 163175->163345 163176->163172 163176->163175 163181 2acdc57 163176->163181 163178->163173 163187 2a9eed0 14 API calls 163178->163187 163179->163174 163344 2a9f1d0 14 API calls 163181->163344 163183 2acdfb3 163353 2ac4e60 14 API calls 163183->163353 163184->163178 163187->163173 163189 2accf4a 163189->163072 163201 2accf65 163189->163201 163329 2ab0520 14 API calls 163189->163329 163255 2acca7e 163255->163134 163354 2ac5840 14 API calls 163255->163354 163257->163050 163258->163048 163259->163043 163260->163053 163261->163035 163263 2a8eb50 14 API calls 163262->163263 163264 2a91b36 163263->163264 163264->163038 163266 2a8eda5 163265->163266 163274 2a8ee2b 163265->163274 163267 2a8ee8e 163266->163267 163270 2a8eda9 163266->163270 163273 2a8ee1d __Strxfrm 163266->163273 163277 2ada640 163267->163277 163269 2a8ee93 163271 2a8ee97 163269->163271 163286 2a8ec20 14 API calls 163269->163286 163270->163067 163271->163067 163273->163274 163275 2a8eb50 14 API calls 163273->163275 163274->163067 163276 2a8ee84 163275->163276 163276->163067 163278 2ada653 163277->163278 163279 2ada65c __fread_nolock 163277->163279 163278->163269 163280 2ada640 14 API calls 163279->163280 163285 2ada9d9 163279->163285 163281 2ada9b1 163280->163281 163282 2a8eb50 14 API calls 163281->163282 163281->163285 163283 2ada9d1 163282->163283 163284 2ada640 14 API calls 163283->163284 163284->163285 163285->163269 163286->163274 163288 2acbe08 163287->163288 163289 2acbe8a 163287->163289 163288->163289 163356 2aa8f30 163288->163356 163289->163105 163292 2aa8f30 56 API calls 163293 2acbe5f 163292->163293 163293->163289 163294 2aa8f30 56 API calls 163293->163294 163294->163289 163295->163105 163296->163098 163297->163082 163298->163072 163299->163081 163300->163089 163301->163092 163302->163100 163303->163104 163304->163107 163305->163120 163306->163120 163307->163118 163308->163119 163309->163122 163310->163255 163311->163129 163313 2aa8e7e 163312->163313 163314 2aa8e86 163312->163314 163313->163129 163315 2aa8e70 56 API calls 163314->163315 163323 2aa8ed5 163314->163323 163316 2aa8eac 163315->163316 163317 2aa8e70 56 API calls 163316->163317 163316->163323 163318 2aa8eba 163317->163318 163319 2aa8ecc 163318->163319 163322 2aa8ee6 163318->163322 163318->163323 163320 2aa8f30 56 API calls 163319->163320 163320->163323 163321 2aa8e70 56 API calls 163321->163322 163322->163321 163322->163323 163323->163129 163324->163137 163325->163148 163326->163151 163327->163154 163328->163189 163342->163168 163343->163162 163344->163172 163345->163172 163346->163138 163347->163145 163348->163149 163349->163166 163350->163164 163351->163173 163352->163183 163353->163255 163354->163134 163355->163072 163357 2aa905d 163356->163357 163359 2aa8f47 163356->163359 163357->163289 163357->163292 163358 2aa8e70 56 API calls 163358->163359 163359->163357 163359->163358 163360 2aa8f30 56 API calls 163359->163360 163362 2acb430 163359->163362 163360->163359 163368 2acb78d 163362->163368 163378 2acb456 __fread_nolock 163362->163378 163363 2acb621 163363->163368 163396 2ac4550 14 API calls 163363->163396 163365 2aa8f30 56 API calls 163365->163378 163367 2acb73e 163369 2acb76d 163367->163369 163397 2a90e80 14 API calls 163367->163397 163368->163359 163369->163359 163370 2a90e80 14 API calls 163370->163378 163372 2acbd3b 163374 2acbd53 163372->163374 163399 2a90e80 14 API calls 163372->163399 163400 2a90e80 14 API calls 163374->163400 163375 2acb84a 163375->163368 163398 2aac130 14 API calls 163375->163398 163378->163363 163378->163365 163378->163368 163378->163370 163378->163375 163388 2ac38c0 163378->163388 163394 2ac6240 14 API calls __fread_nolock 163378->163394 163395 2acb370 14 API calls 163378->163395 163380 2acb868 163382 2aa8f30 56 API calls 163380->163382 163383 2acb87a 163382->163383 163383->163359 163384 2aac2d0 14 API calls 163385 2acb63d __Strxfrm 163384->163385 163385->163367 163385->163368 163385->163372 163385->163384 163386 2a8eb50 14 API calls 163385->163386 163387 2aab620 14 API calls 163385->163387 163386->163385 163387->163385 163391 2ac38f0 163388->163391 163389 2ac392b 163389->163378 163391->163389 163392 2ac3945 163391->163392 163401 2ac3500 163391->163401 163424 2ab38e0 163392->163424 163394->163378 163395->163378 163396->163385 163397->163369 163398->163380 163399->163374 163400->163368 163434 2ac3270 163401->163434 163403 2ac35a7 163403->163391 163404 2ac35f2 163411 2ac36f3 163404->163411 163475 2ab88a0 163404->163475 163405 2ac3566 163405->163403 163405->163404 163406 2a996a0 27 API calls 163405->163406 163407 2ac35bd 163406->163407 163407->163404 163409 2ac35c3 163407->163409 163408 2ac3709 163481 2a8ef90 14 API calls 163408->163481 163474 2a8ef90 14 API calls 163409->163474 163411->163408 163414 2ac37b1 163411->163414 163459 2abfd60 163414->163459 163416 2ac388d 163416->163403 163483 2a997f0 18 API calls 163416->163483 163417 2ac3717 163417->163403 163417->163416 163482 2a980d0 18 API calls 163417->163482 163420 2ac37f7 163421 2a8eb50 14 API calls 163420->163421 163422 2ac381c 163420->163422 163421->163422 163422->163417 163423 2ab38e0 14 API calls 163422->163423 163423->163417 163425 2ab392d 163424->163425 163426 2ab38fe 163424->163426 163531 2acf880 14 API calls 163425->163531 163426->163425 163433 2ab3a59 163426->163433 163530 2ab8da0 14 API calls 163426->163530 163429 2ab3a0b __fread_nolock 163432 2a8eb50 14 API calls 163429->163432 163429->163433 163430 2ab393d 163430->163429 163431 2a8eb50 14 API calls 163430->163431 163431->163430 163432->163433 163433->163389 163435 2ac32e7 163434->163435 163438 2ac3299 163434->163438 163437 2ac3333 163435->163437 163441 2ac32f8 163435->163441 163456 2ac332b 163435->163456 163436 2ac32c7 163436->163405 163439 2ac3347 163437->163439 163444 2ac3450 163437->163444 163438->163436 163490 2a8ef90 14 API calls 163438->163490 163484 2aeb818 163439->163484 163441->163456 163491 2a8ef90 14 API calls 163441->163491 163444->163456 163494 2a8ef90 14 API calls 163444->163494 163446 2abfd60 43 API calls 163447 2ac336e 163446->163447 163448 2ac3395 163447->163448 163447->163456 163492 2a8ef90 14 API calls 163447->163492 163449 2a8eb50 14 API calls 163448->163449 163450 2ac3423 163448->163450 163451 2ac3445 163449->163451 163450->163405 163451->163405 163453 2ac34c2 163495 2a903a0 14 API calls 163453->163495 163456->163405 163457 2ac33d6 163457->163448 163493 2a903a0 14 API calls 163457->163493 163466 2abfd8a __fread_nolock __Strxfrm 163459->163466 163460 2ac032b 163462 2ac03a9 163460->163462 163528 2aa0800 14 API calls 163460->163528 163463 2a8eb50 14 API calls 163462->163463 163472 2ac03c4 __Strxfrm 163462->163472 163463->163472 163464 2addcb0 std::_Facet_Register 40 API calls 163464->163466 163466->163464 163471 2abfea3 __fread_nolock 163466->163471 163468 2ac0345 163468->163460 163527 2aa0800 14 API calls 163468->163527 163469 2a8eb50 14 API calls 163469->163471 163471->163460 163471->163468 163471->163469 163473 2ac3270 43 API calls 163471->163473 163522 2ac3f50 163471->163522 163526 2aa0800 14 API calls 163471->163526 163472->163420 163473->163471 163474->163403 163476 2ab88b6 __fread_nolock __Strxfrm 163475->163476 163477 2a91e60 14 API calls 163476->163477 163479 2ab89c4 163476->163479 163478 2ab89a7 163477->163478 163478->163479 163480 2a8eb50 14 API calls 163478->163480 163479->163411 163480->163479 163481->163417 163482->163416 163483->163403 163485 2aeb82b _strftime 163484->163485 163496 2ae7c05 163485->163496 163487 2aeb845 163488 2ae2efc _strftime 39 API calls 163487->163488 163489 2ac3352 163488->163489 163489->163446 163490->163436 163491->163456 163492->163457 163493->163448 163494->163453 163495->163456 163510 2ae73d9 163496->163510 163498 2ae7c17 163499 2ae7c5f 163498->163499 163500 2ae7c2c 163498->163500 163509 2ae7c47 _strftime 163498->163509 163503 2ae7c83 163499->163503 163518 2ae8730 39 API calls 2 library calls 163499->163518 163517 2ae3143 39 API calls 2 library calls 163500->163517 163506 2ae7ca7 163503->163506 163519 2ae73f4 42 API calls 2 library calls 163503->163519 163505 2ae7d2f 163521 2ae7382 39 API calls 2 library calls 163505->163521 163506->163505 163520 2ae7382 39 API calls 2 library calls 163506->163520 163509->163487 163511 2ae73de 163510->163511 163512 2ae73f1 163510->163512 163513 2aebc60 __dosmaperr 14 API calls 163511->163513 163512->163498 163514 2ae73e3 163513->163514 163515 2ae31c0 _strftime 39 API calls 163514->163515 163516 2ae73ee 163515->163516 163516->163498 163517->163509 163518->163503 163519->163503 163520->163505 163521->163509 163523 2ac3f75 163522->163523 163525 2ac3ffc 163522->163525 163523->163525 163529 2aa0800 14 API calls 163523->163529 163525->163471 163526->163471 163527->163460 163528->163462 163529->163525 163530->163426 163531->163430 163532 2ab4c40 163533 2ab4c62 163532->163533 163550 2ab4cac __Strxfrm 163532->163550 163534 2aa8e70 56 API calls 163533->163534 163536 2ab4c98 163534->163536 163537 2ab4cb8 163536->163537 163538 2ab4c9f 163536->163538 163540 2ab4ce3 163537->163540 163570 2aab620 14 API calls 163537->163570 163569 2a90e80 14 API calls 163538->163569 163551 2aab830 163540->163551 163543 2ab4d13 163548 2a8eb50 14 API calls 163543->163548 163543->163550 163544 2ab4e0d 163545 2a8eb50 14 API calls 163544->163545 163547 2ab4e28 163544->163547 163545->163547 163546 2ab4cc8 163546->163540 163549 2a8eb50 14 API calls 163546->163549 163548->163550 163549->163540 163550->163547 163571 2aab620 14 API calls 163550->163571 163552 2aabb12 163551->163552 163554 2aab845 __fread_nolock __Strxfrm 163551->163554 163552->163543 163553 2aababb 163553->163543 163554->163553 163555 2aaba63 163554->163555 163556 2aaba5e 163554->163556 163557 2aaba65 163554->163557 163558 2aabad6 163555->163558 163563 2aaba7b 163555->163563 163572 2aac130 14 API calls 163556->163572 163573 2aabb40 14 API calls 163557->163573 163558->163553 163574 2aabb20 14 API calls 163558->163574 163562 2aabaf1 163575 2aabb20 14 API calls 163562->163575 163563->163553 163564 2aab830 14 API calls 163563->163564 163566 2aabaa8 163564->163566 163568 2aab830 14 API calls 163566->163568 163567 2aabb03 163567->163543 163568->163553 163569->163550 163570->163546 163571->163544 163572->163555 163573->163555 163574->163562 163575->163567 163576 2ab4940 163577 2ab4962 163576->163577 163588 2ab4ada 163576->163588 163578 2ab496b 163577->163578 163585 2ab4983 __Strxfrm 163577->163585 163590 2a90e80 14 API calls 163578->163590 163580 2ab4979 163581 2ab4ab8 163582 2a8ed90 14 API calls 163581->163582 163581->163588 163583 2ab4ad3 163582->163583 163587 2a8eb50 14 API calls 163583->163587 163583->163588 163584 2ab4b2a 163591 2a90e80 14 API calls 163584->163591 163585->163581 163585->163584 163585->163588 163589 2ab4b6c 163587->163589 163590->163580 163591->163583 163592 2aa6a07 163593 2aa6a39 163592->163593 163594 2aa6a23 163592->163594 163595 2a99fb0 18 API calls 163594->163595 163596 2aa6a2a 163595->163596 163596->163593 163597 2a9a100 18 API calls 163596->163597 163597->163593 163598 2ad9980 163599 2ad9993 163598->163599 163600 2ad9a42 163599->163600 163601 2ad99f6 163599->163601 163602 2ad99fd 163599->163602 163612 2ad6810 163599->163612 163600->163601 163606 2ad9a7a 163600->163606 163630 2ad6580 14 API calls 163600->163630 163628 2a90e80 14 API calls 163602->163628 163605 2ad9a21 163629 2ad6580 14 API calls 163605->163629 163631 2a90e80 14 API calls 163606->163631 163610 2ad9a38 163611 2ad9a85 163613 2ad6879 163612->163613 163614 2ad686b 163612->163614 163615 2ad9571 163613->163615 163616 2ad9522 163613->163616 163614->163613 163617 2ad68bb 163614->163617 163626 2ad68c7 163614->163626 163619 2ad959e 163615->163619 163646 2ad6580 14 API calls 163615->163646 163620 2ad9526 163616->163620 163645 2ad6790 14 API calls 163616->163645 163632 2ab3170 163617->163632 163619->163599 163620->163599 163623 2ad699f 163623->163613 163625 2a9eed0 14 API calls 163623->163625 163624 2ad9567 163624->163599 163625->163613 163626->163613 163626->163623 163627 2a9eed0 14 API calls 163626->163627 163627->163626 163628->163605 163629->163610 163630->163600 163631->163611 163633 2ab318a 163632->163633 163635 2ab3477 163632->163635 163633->163635 163647 2a9ef50 14 API calls 163633->163647 163635->163613 163636 2ab33b6 163637 2a9eed0 14 API calls 163636->163637 163638 2ab33da 163636->163638 163637->163638 163638->163635 163649 2a9f800 14 API calls __fread_nolock 163638->163649 163640 2a9eed0 14 API calls 163641 2ab330a 163640->163641 163641->163636 163641->163640 163648 2a9f530 14 API calls __Strxfrm 163641->163648 163643 2a9eed0 14 API calls 163644 2ab31c5 163643->163644 163644->163638 163644->163641 163644->163643 163645->163624 163646->163615 163647->163644 163648->163641 163649->163635 163650 2a62f97 163651 2a62fb2 163650->163651 163652 2a02980 40 API calls 163651->163652 163653 2a62fc3 163652->163653 163654 2a69190 40 API calls 163653->163654 163655 2a62fd2 163654->163655 164079 2a0aaa0 163655->164079 163657 2a62fdd 163658 2a63022 163657->163658 163659 2a68fe0 40 API calls 163657->163659 164100 2a6b280 163658->164100 163662 2a63012 163659->163662 163661 2a6302d CreateThread FindCloseChangeNotification 163663 2a63107 163661->163663 163669 2a63056 163661->163669 163664 2a68fe0 40 API calls 163662->163664 163666 2a02980 40 API calls 163663->163666 163664->163658 163665 2a63060 GetPEB 163665->163669 163667 2a6312e GetTempPathA 163666->163667 164107 2a0ae10 163667->164107 163669->163665 163669->163669 163672 2a630dd Sleep 163669->163672 163671 2a6316d 163673 2a02980 40 API calls 163671->163673 163672->163663 163672->163665 163674 2a631ab 163673->163674 164113 2a6cf80 163674->164113 163678 2a631db 163679 2a028d0 39 API calls 163678->163679 163680 2a631e6 163679->163680 163681 2a028d0 39 API calls 163680->163681 163682 2a631f1 163681->163682 163683 2a028d0 39 API calls 163682->163683 163684 2a631fc 163683->163684 163685 2a02980 40 API calls 163684->163685 163686 2a6323a 163685->163686 163687 2a6cf80 40 API calls 163686->163687 163688 2a6325c 163687->163688 163689 2a028d0 39 API calls 163688->163689 164080 2a0aafc std::ios_base::_Ios_base_dtor 164079->164080 164083 2a0ada2 164080->164083 164091 2a02ae0 40 API calls 164080->164091 164098 2a0acc0 std::ios_base::_Ios_base_dtor 164080->164098 164099 2a0ac51 164080->164099 165504 2a75cf0 164080->165504 164081 2a0acf6 164085 2a0ad13 164081->164085 164086 2a0ad06 164081->164086 164081->164098 164082 2a0ac6d 164082->164083 164088 2a0ac8c 164082->164088 165523 2a6c680 40 API calls 164083->165523 165522 2a75e20 40 API calls 164085->165522 164087 2a69190 40 API calls 164086->164087 164087->164098 164093 2a02ae0 40 API calls 164088->164093 164090 2ae31d0 39 API calls 164094 2a0adac 164090->164094 164091->164080 164092 2a0ad85 std::ios_base::_Ios_base_dtor 164092->163657 164095 2a0acad 164093->164095 165517 2a68050 164095->165517 164098->164090 164098->164092 164099->164081 164099->164082 164101 2a6b289 164100->164101 164104 2a6b2cc std::ios_base::_Ios_base_dtor 164100->164104 164102 2a6e370 39 API calls 164101->164102 164103 2a6b293 164102->164103 164103->164104 164105 2ae31d0 39 API calls 164103->164105 164104->163661 164106 2a6b2f4 164105->164106 165557 2a690a0 164107->165557 164109 2a0ae79 164109->163671 164111 2a0ae27 164111->164109 164112 2a0ae6f 164111->164112 165573 2ae3adb 164111->165573 164112->163671 164114 2a68f10 40 API calls 164113->164114 164115 2a631cd 164114->164115 164116 2a69010 164115->164116 164117 2a6901e 164116->164117 164119 2a69041 std::ios_base::_Ios_base_dtor 164116->164119 164118 2ae31d0 39 API calls 164117->164118 164117->164119 164120 2a6909e 164118->164120 164119->163678 165505 2a75e11 165504->165505 165506 2a75d38 165504->165506 165550 2a02e40 40 API calls 165505->165550 165524 2a71da0 165506->165524 165510 2a75d76 165511 2a75ddf 165510->165511 165512 2a7af70 39 API calls 165510->165512 165539 2a7af70 165511->165539 165512->165511 165516 2a75e06 165516->164080 165518 2a680b0 165517->165518 165519 2a6805e 165517->165519 165520 2a75cf0 40 API calls 165518->165520 165519->164098 165521 2a680b9 165520->165521 165521->164098 165522->164098 165525 2a71df4 165524->165525 165526 2a71dad 165524->165526 165551 2a021d0 40 API calls 2 library calls 165525->165551 165528 2a71dba 165526->165528 165530 2a71ddd 165526->165530 165528->165525 165529 2a71dc1 165528->165529 165533 2addcb0 std::_Facet_Register 40 API calls 165529->165533 165531 2a71dee 165530->165531 165534 2addcb0 std::_Facet_Register 40 API calls 165530->165534 165531->165510 165532 2ae31d0 39 API calls 165536 2a71dfe 165532->165536 165537 2a71dc7 165533->165537 165535 2a71de7 165534->165535 165535->165510 165537->165532 165538 2a71dd0 165537->165538 165538->165510 165541 2a7af7b 165539->165541 165541->165541 165552 2a6e370 165541->165552 165543 2a798f0 165544 2a798fc 165543->165544 165546 2a7993f std::ios_base::_Ios_base_dtor 165543->165546 165545 2a6e370 39 API calls 165544->165545 165547 2a79906 165545->165547 165546->165516 165547->165546 165548 2ae31d0 39 API calls 165547->165548 165549 2a79973 165548->165549 165551->165537 165553 2a6e3c7 165552->165553 165554 2a6e37a std::ios_base::_Ios_base_dtor 165552->165554 165553->165543 165554->165553 165555 2ae31d0 39 API calls 165554->165555 165556 2a6e3cf 165555->165556 165558 2a69180 165557->165558 165563 2a690c9 165557->165563 165576 2a02270 40 API calls 165558->165576 165560 2a690d5 __fread_nolock 165560->164111 165561 2a69185 165577 2a021d0 40 API calls 2 library calls 165561->165577 165562 2a69101 165565 2addcb0 std::_Facet_Register 40 API calls 165562->165565 165563->165560 165563->165562 165567 2a69143 165563->165567 165568 2a6913a 165563->165568 165566 2a69114 165565->165566 165569 2ae31d0 39 API calls 165566->165569 165572 2a6911b __fread_nolock 165566->165572 165571 2addcb0 std::_Facet_Register 40 API calls 165567->165571 165567->165572 165568->165561 165568->165562 165570 2a6918f 165569->165570 165571->165572 165572->164111 165574 2af45fb _unexpected 39 API calls 165573->165574 165575 2ae3ae0 165574->165575 165575->164111 165577->165566 171601 508d03e 171602 508d04c 171601->171602 171603 508d047 171601->171603 171607 508cf08 171602->171607 171622 508d672 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 171603->171622 171609 508cf14 __FrameHandler3::FrameUnwindToState 171607->171609 171608 508cf3d dllmain_raw 171610 508cf23 171608->171610 171611 508cf57 dllmain_crt_dispatch 171608->171611 171609->171608 171609->171610 171612 508cf38 171609->171612 171611->171610 171611->171612 171623 507a340 171612->171623 171622->171602 171624 507a4a0 __DllMainCRTStartup@12 171623->171624 171642 507fe20 171624->171642 171626 507a505 __DllMainCRTStartup@12 171626->171626 171627 507fe20 __DllMainCRTStartup@12 38 API calls 171626->171627 171628 507a59c 171627->171628 171649 50575e0 171628->171649 171630 507a5b9 __DllMainCRTStartup@12 171631 507a93a 171630->171631 171668 507b8b0 171630->171668 171678 5079c00 SetThreadExecutionState 171631->171678 171637 507a85c 171638 50575e0 __DllMainCRTStartup@12 38 API calls 171637->171638 171640 507a891 __DllMainCRTStartup@12 171638->171640 171672 507c050 171640->171672 171643 507fe37 __DllMainCRTStartup@12 171642->171643 171644 507fef7 171643->171644 171645 507fee6 171643->171645 171648 507fe5a _Yarn 171643->171648 171644->171648 171706 508c97a 11 API calls 4 library calls 171644->171706 171705 5083190 38 API calls 3 library calls 171645->171705 171648->171626 171650 5057621 __DllMainCRTStartup@12 std::exception::exception 171649->171650 171651 50576c4 171650->171651 171665 507c450 std::ios_base::clear 36 API calls 171650->171665 171711 507cd60 38 API calls __DllMainCRTStartup@12 171650->171711 171712 507f310 38 API calls __DllMainCRTStartup@12 171650->171712 171652 50576e6 171651->171652 171653 505772f 171651->171653 171713 507cd60 38 API calls __DllMainCRTStartup@12 171652->171713 171656 505772d 171653->171656 171715 507f380 38 API calls __DllMainCRTStartup@12 171653->171715 171707 507c450 171656->171707 171657 50576fc 171714 507f310 38 API calls __DllMainCRTStartup@12 171657->171714 171662 5057753 171663 507c450 std::ios_base::clear 36 API calls 171662->171663 171666 505775f 171663->171666 171664 5057721 171667 507c450 std::ios_base::clear 36 API calls 171664->171667 171665->171650 171666->171630 171667->171656 171669 507b91a 171668->171669 171670 507fe20 __DllMainCRTStartup@12 38 API calls 171669->171670 171671 507b951 171670->171671 171671->171637 171674 507c133 error_info_injector 171672->171674 171677 507c0a4 error_info_injector 171672->171677 171673 507c0ec 171673->171674 171717 50519a0 36 API calls std::ios_base::clear 171673->171717 171674->171631 171675 507c450 std::ios_base::clear 36 API calls 171675->171677 171677->171673 171677->171675 171679 5079c35 SetThreadExecutionState 171678->171679 171680 5079c40 171678->171680 171679->171680 171718 5096914 GetSystemTimeAsFileTime 171680->171718 171682 5079c47 171720 5091c56 171682->171720 171685 5079c82 171760 505b2e0 ConvertStringSecurityDescriptorToSecurityDescriptorA 171685->171760 171686 5079c6e 171723 505b2e0 ConvertStringSecurityDescriptorToSecurityDescriptorA 171686->171723 171689 5079c7d GetCurrentThreadId GetThreadDesktop 171724 5057080 171689->171724 171705->171648 171706->171648 171708 507c47d 171707->171708 171710 507c4e4 error_info_injector 171708->171710 171716 50519a0 36 API calls std::ios_base::clear 171708->171716 171710->171662 171711->171650 171712->171650 171713->171657 171714->171664 171715->171656 171716->171710 171717->171674 171719 509694d __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 171718->171719 171719->171682 171761 509b533 GetLastError 171720->171761 171723->171689 171800 507b820 171724->171800 171760->171689 171762 509b549 171761->171762 171763 509b54f 171761->171763 171790 509bd16 TlsGetValue 171762->171790 171767 509b553 171763->171767 171791 509bd55 TlsSetValue 171763->171791 171766 509b56b 171766->171767 171768 509b573 171766->171768 171769 509b5d8 SetLastError 171767->171769 171792 509b132 9 API calls 3 library calls 171768->171792 171772 509b5e8 171769->171772 171773 5079c50 GetVersion 171769->171773 171771 509b580 171774 509b599 171771->171774 171775 509b588 171771->171775 171799 509918d 36 API calls std::locale::_Setgloballocale 171772->171799 171773->171685 171773->171686 171794 509bd55 TlsSetValue 171774->171794 171793 509bd55 TlsSetValue 171775->171793 171780 509b5a5 171782 509b5a9 171780->171782 171783 509b5c0 171780->171783 171781 509b596 171796 509b18f 9 API calls __dosmaperr 171781->171796 171790->171763 171791->171766 171792->171771 171793->171781 171794->171780 171807 507fcb0 171800->171807 172431 2a0e217 172470 2a0e220 std::ios_base::_Ios_base_dtor __Mtx_unlock 172431->172470 172432 2a0e55c FindNextFileA 172433 2a0e573 FindClose GetLastError 172432->172433 172432->172470 172434 2a0e583 172433->172434 172442 2a0e598 std::ios_base::_Ios_base_dtor 172433->172442 172434->172442 172435 2a0e6ef 172658 2a02270 40 API calls 172435->172658 172437 2a0e6f4 172659 2adcedb 71 API calls std::locale::_Setgloballocale 172437->172659 172439 2ae31d0 39 API calls 172441 2a0e6ff __fread_nolock 172439->172441 172440 2a0e6d2 std::ios_base::_Ios_base_dtor 172444 2a0e73e SHGetFolderPathA 172441->172444 172442->172439 172442->172440 172443 2a69010 39 API calls 172443->172470 172445 2a0e774 172444->172445 172446 2a02ae0 40 API calls 172445->172446 172449 2a0e7b6 172446->172449 172447 2a70a10 40 API calls 172447->172470 172448 2a68ea0 40 API calls 172448->172470 172450 2a0e7fd std::ios_base::_Ios_base_dtor 172449->172450 172451 2a0f553 172449->172451 172452 2add232 13 API calls 172450->172452 172453 2ae31d0 39 API calls 172451->172453 172454 2a0e82f 172452->172454 172455 2a0f558 172453->172455 172454->172455 172456 2a0e83a 172454->172456 172663 2adcedb 71 API calls std::locale::_Setgloballocale 172455->172663 172463 2a0e856 GetFileAttributesA 172456->172463 172469 2a0f4af std::ios_base::_Ios_base_dtor __Mtx_unlock 172456->172469 172458 2a0e54c CopyFileA 172461 2a0e590 GetLastError 172458->172461 172489 2a0e4ae __Mtx_unlock 172458->172489 172459 2a0f55e 172664 2a02270 40 API calls 172459->172664 172460 2add232 13 API calls 172460->172470 172461->172442 172465 2a0e86a GetLastError 172463->172465 172481 2a0e871 __Mtx_unlock 172463->172481 172464 2a0f563 172665 2adcedb 71 API calls std::locale::_Setgloballocale 172464->172665 172465->172481 172467 2a0f569 172666 2a02270 40 API calls 172467->172666 172468 2a0f538 std::ios_base::_Ios_base_dtor 172469->172468 172472 2ae31d0 39 API calls 172469->172472 172470->172432 172470->172435 172470->172437 172470->172442 172470->172443 172470->172447 172470->172448 172470->172458 172470->172460 172473 2a0e49b GetFileAttributesA 172470->172473 172474 2a0e4e5 CreateDirectoryA 172470->172474 172470->172489 172477 2a0f5f1 172472->172477 172478 2a0e4a7 GetLastError 172473->172478 172473->172489 172474->172461 172474->172489 172475 2a0f56e 172667 2adcedb 71 API calls std::locale::_Setgloballocale 172475->172667 172478->172489 172479 2a0f574 172480 2ae31d0 39 API calls 172479->172480 172483 2a0f579 172480->172483 172481->172459 172481->172469 172482 2a0e8d3 172481->172482 172486 2a70a10 40 API calls 172482->172486 172668 2a02270 40 API calls 172483->172668 172484 2a69190 40 API calls 172484->172489 172490 2a0e8f5 172486->172490 172487 2a0f57e 172669 2adcedb 71 API calls std::locale::_Setgloballocale 172487->172669 172489->172432 172489->172442 172489->172458 172489->172470 172489->172474 172489->172484 172657 2a0e0b0 120 API calls 3 library calls 172489->172657 172493 2add232 13 API calls 172490->172493 172495 2a0e915 172493->172495 172495->172464 172497 2a0e920 172495->172497 172499 2a0e968 __Mtx_unlock 172497->172499 172504 2a0e93b GetFileAttributesA 172497->172504 172503 2a0e987 CreateDirectoryA 172499->172503 172510 2a0e94a 172499->172510 172500 2a0f58e 172501 2ae31d0 39 API calls 172500->172501 172502 2a0f593 172501->172502 172671 2a02270 40 API calls 172502->172671 172512 2a0f478 std::ios_base::_Ios_base_dtor 172503->172512 172514 2a0e998 172503->172514 172506 2a0e943 GetLastError 172504->172506 172507 2a0e959 __Mtx_unlock 172504->172507 172506->172507 172506->172510 172507->172514 172508 2a0f598 172672 2adcedb 71 API calls std::locale::_Setgloballocale 172508->172672 172510->172499 172510->172503 172510->172507 172511 2a0f59e 172513 2ae31d0 39 API calls 172511->172513 172512->172469 172516 2ae31d0 39 API calls 172512->172516 172515 2a0f5a3 172513->172515 172514->172467 172514->172514 172518 2a0e9e2 172514->172518 172673 2a02270 40 API calls 172515->172673 172516->172469 172520 2a70a10 40 API calls 172518->172520 172522 2a0ea01 172520->172522 172525 2add232 13 API calls 172522->172525 172527 2a0ea1b 172525->172527 172527->172475 172529 2a0ea26 172527->172529 172534 2a0ea6a __Mtx_unlock 172529->172534 172535 2a0ea3b GetFileAttributesA 172529->172535 172532 2a0f5bd 172534->172479 172542 2a0eaa7 std::ios_base::_Ios_base_dtor 172534->172542 172538 2a0ea43 GetLastError 172535->172538 172539 2a0ea4a __Mtx_unlock 172535->172539 172538->172539 172539->172534 172542->172483 172546 2a0eb02 172542->172546 172577 2a0ed19 std::ios_base::_Ios_base_dtor 172542->172577 172550 2a70a10 40 API calls 172546->172550 172549 2a0ed82 172554 2a70a10 40 API calls 172549->172554 172552 2a0eb27 172550->172552 172557 2add232 13 API calls 172552->172557 172556 2a0eda1 172554->172556 172560 2add232 13 API calls 172556->172560 172558 2a0eb41 172557->172558 172558->172487 172561 2a0eb4c 172558->172561 172562 2a0edbb 172560->172562 172564 2a0eb60 GetFileAttributesA 172561->172564 172565 2a0eb93 __Mtx_unlock 172561->172565 172562->172508 172563 2a0edc6 172562->172563 172568 2a0eddb GetFileAttributesA 172563->172568 172570 2a0ee0a __Mtx_unlock 172563->172570 172566 2a0eb84 __Mtx_unlock 172564->172566 172567 2a0eb6e GetLastError 172564->172567 172569 2a0ebb2 CreateDirectoryA 172565->172569 172571 2a0eb75 172565->172571 172574 2a0ebc3 172566->172574 172567->172566 172567->172571 172572 2a0ede3 GetLastError 172568->172572 172573 2a0edea __Mtx_unlock 172568->172573 172569->172574 172575 2a0eceb 172569->172575 172570->172511 172578 2a0ee47 std::ios_base::_Ios_base_dtor 172570->172578 172571->172565 172571->172566 172571->172569 172572->172573 172573->172570 172576 2a69190 40 API calls 172574->172576 172575->172500 172575->172577 172579 2a0ebd8 172576->172579 172577->172502 172577->172549 172578->172515 172580 2a0eead 172578->172580 172614 2a0f0c9 std::ios_base::_Ios_base_dtor 172578->172614 172579->172579 172584 2a70a10 40 API calls 172580->172584 172582 2a0f12f 172614->172532 172614->172582 172657->172489 172681 2a83452 172682 2a83464 172681->172682 172683 2a69190 40 API calls 172682->172683 172684 2a83475 172683->172684 172685 2a69190 40 API calls 172684->172685 172686 2a83487 172685->172686 172687 2a68b50 40 API calls 172686->172687 172694 2a834dc std::ios_base::_Ios_base_dtor 172686->172694 172689 2a834ba 172687->172689 172688 2a6b4b0 39 API calls 172690 2a835b8 172688->172690 172695 2a82d90 172689->172695 172694->172688 172699 2a82dc6 172695->172699 172696 2a82eb8 172697 2a6b4b0 39 API calls 172696->172697 172698 2a82ec2 172697->172698 172712 2a82ff0 172698->172712 172699->172696 172700 2a68b50 40 API calls 172699->172700 172701 2a82ea5 172700->172701 172702 2a82eb0 172701->172702 172703 2a82ed7 172701->172703 172704 2a6b4b0 39 API calls 172702->172704 172705 2a68f10 40 API calls 172703->172705 172708 2a82f69 std::ios_base::_Ios_base_dtor 172703->172708 172704->172696 172707 2a82f0c 172705->172707 172706 2a6b4b0 39 API calls 172706->172696 172707->172708 172709 2a82fe4 172707->172709 172708->172706 172710 2ae31d0 39 API calls 172709->172710 172711 2a82fe9 172710->172711 172713 2a8301e GetLastError 172712->172713 172715 2a83156 172713->172715 172716 2a6e5a0 40 API calls 172715->172716 172717 2a83177 172716->172717 172718 2a6b4b0 39 API calls 172717->172718 172719 2a8319d 172718->172719 172727 2a73fb0 40 API calls 2 library calls 172719->172727 172721 2a83209 172722 2a6eff0 40 API calls 172721->172722 172724 2a8325d 172722->172724 172723 2a83398 std::ios_base::_Ios_base_dtor 172723->172694 172724->172723 172725 2ae31d0 39 API calls 172724->172725 172726 2a833bc 172725->172726 172727->172721 172728 2addd56 172729 2addd5f 172728->172729 172736 2ade2e6 IsProcessorFeaturePresent 172729->172736 172731 2addd6b 172737 2ae17ad 10 API calls 2 library calls 172731->172737 172733 2addd70 172735 2addd74 172733->172735 172738 2ae17cc 7 API calls 2 library calls 172733->172738 172736->172731 172737->172733 172738->172735 172739 2a63058 172740 2a63060 GetPEB 172739->172740 172741 2a63070 Sleep 172740->172741 172741->172740 172743 2a63107 172741->172743 172744 2a02980 40 API calls 172743->172744 172745 2a6312e 172744->172745 172745->172745 172746 2a6314b GetTempPathA 172745->172746 172747 2a0ae10 40 API calls 172746->172747 172748 2a6316d 172747->172748 172749 2a02980 40 API calls 172748->172749 172750 2a631ab 172749->172750 172751 2a6cf80 40 API calls 172750->172751 172752 2a631cd 172751->172752 172753 2a69010 39 API calls 172752->172753 172754 2a631db 172753->172754 172755 2a028d0 39 API calls 172754->172755 172756 2a631e6 172755->172756 172757 2a028d0 39 API calls 172756->172757 172758 2a631f1 172757->172758 172759 2a028d0 39 API calls 172758->172759 172760 2a631fc 172759->172760 172761 2a02980 40 API calls 172760->172761 172762 2a6323a 172761->172762 172763 2a6cf80 40 API calls 172762->172763 172764 2a6325c 172763->172764 172765 2a028d0 39 API calls 172764->172765 172766 2a6326a 172765->172766 172767 2a028d0 39 API calls 172766->172767 172768 2a63275 172767->172768 172769 2a0a5f0 81 API calls 172768->172769 172770 2a63286 172769->172770 172771 2a63298 172770->172771 172772 2a0a6b0 90 API calls 172770->172772 172773 2a0a5f0 81 API calls 172771->172773 172772->172771 172774 2a632ad 172773->172774 172775 2a632c0 172774->172775 172776 2a0a6b0 90 API calls 172774->172776 172777 2a632cd CreateDirectoryA 172775->172777 172776->172775 172778 2a632ee 172777->172778 172779 2a632dc 172777->172779 172782 2a632f9 CreateDirectoryA 172778->172782 173155 2a15970 101 API calls 4 library calls 172779->173155 172781 2a632e6 172781->172778 172783 2a65616 OutputDebugStringA 172781->172783 172784 2a63389 172782->172784 172797 2a63306 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 172782->172797 172785 2a6562e 172783->172785 172856 2a657c3 Sleep shutdown closesocket 172783->172856 172787 2a63394 GetPEB 172784->172787 172790 2a66ed0 40 API calls 172785->172790 172785->172856 172801 2a633a7 SetCurrentDirectoryA 172787->172801 172788 2a657fc 172789 2a6580b 172788->172789 172791 2a65802 Sleep 172788->172791 172792 2a028d0 39 API calls 172789->172792 172794 2a65647 172790->172794 172791->172791 172793 2a63366 173156 2a15970 101 API calls 4 library calls 172793->173156 172797->172793 172809 2a68fe0 40 API calls 172801->172809 172816 2a6343f 172809->172816 172856->172788 172856->172789 173155->172781 173156->172784 173170 2a20d9c 173186 2a20da0 std::ios_base::_Ios_base_dtor 173170->173186 173171 2a20f37 FindNextFileA 173172 2a20f4d GetLastError 173171->173172 173171->173186 173173 2a20f5c FindClose 173172->173173 173172->173186 173174 2a20f6f 173173->173174 173175 2a20d7f std::ios_base::_Ios_base_dtor 173173->173175 173174->173175 173176 2ae31d0 39 API calls 173174->173176 173178 2a2101c 173176->173178 173177 2a02ae0 40 API calls 173177->173186 173179 2a68050 40 API calls 173179->173186 173180 2a2100d 173187 2a02270 40 API calls 173180->173187 173182 2a21012 173184 2ae31d0 39 API calls 173182->173184 173183 2a70a10 40 API calls 173183->173186 173184->173174 173185 2a68ea0 40 API calls 173185->173186 173186->173171 173186->173174 173186->173177 173186->173179 173186->173180 173186->173182 173186->173183 173186->173185

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 2536 2a0c390-2a0c436 call 2adec90 call 2a664b0 call 2a6cd30 call 2a66580 2545 2a0c438 2536->2545 2546 2a0c43e-2a0c458 call 2ae3d80 2536->2546 2545->2546 2549 2a0dd72-2a0ddd3 call 2a69190 call 2a09eb0 call 2a0b600 call 2a66580 call 2a02a20 call 2ae3d80 2546->2549 2550 2a0c45e-2a0c476 call 2a0a3a0 2546->2550 2579 2a0de02-2a0de48 call 2a028d0 * 6 2549->2579 2580 2a0ddd5-2a0dde2 2549->2580 2555 2a0c480-2a0c48c 2550->2555 2556 2a0c478-2a0c47d 2550->2556 2558 2a0c494-2a0c4e1 call 2a66540 call 2a02e90 2555->2558 2559 2a0c48e 2555->2559 2556->2555 2569 2a0c4e3 2558->2569 2570 2a0c4e9-2a0c645 call 2a66480 call 2a02e90 call 2aebecc call 2aec3b4 call 2a66450 call 2a02e90 call 2a665b0 call 2a02980 call 2a66790 RegOpenKeyExA 2558->2570 2559->2558 2569->2570 2613 2a0c64b-2a0c6bb call 2a66540 RegQueryValueExA 2570->2613 2614 2a0c6ee-2a0c6fb 2570->2614 2583 2a0dde4 2580->2583 2584 2a0ddea-2a0ddfa call 2aebb89 call 2ae7608 2580->2584 2583->2584 2596 2a0ddff 2584->2596 2596->2579 2621 2a0c6e2-2a0c6e8 RegCloseKey 2613->2621 2622 2a0c6bd-2a0c6c3 2613->2622 2615 2a0c703-2a0c797 call 2a66480 call 2a02e90 call 2a665b0 call 2a02980 call 2adff10 GetCurrentHwProfileA 2614->2615 2616 2a0c6fd 2614->2616 2634 2a0c799-2a0c79f 2615->2634 2635 2a0c7be-2a0c7cb 2615->2635 2616->2615 2621->2614 2624 2a0c6c6-2a0c6cb 2622->2624 2624->2624 2626 2a0c6cd-2a0c6dd call 2a68d70 2624->2626 2626->2621 2638 2a0c7a2-2a0c7a7 2634->2638 2636 2a0c7d3-2a0c8bd call 2a66420 call 2a02e90 call 2a0b2c0 call 2a66570 call 2a0b260 call 2a66570 * 2 call 2a6cd30 call 2a6cf80 2635->2636 2637 2a0c7cd 2635->2637 2659 2a0c8c0-2a0c8c5 2636->2659 2637->2636 2638->2638 2640 2a0c7a9-2a0c7b9 call 2a68d70 2638->2640 2640->2635 2659->2659 2660 2a0c8c7-2a0c90b call 2a6b9e0 call 2a02920 call 2a70800 2659->2660 2667 2a0c910-2a0c915 2660->2667 2667->2667 2668 2a0c917-2a0c9f8 call 2a6b9e0 call 2a02920 call 2a70800 call 2a028d0 * 7 call 2a84510 2667->2668 2691 2a0ca00-2a0ca26 call 2a842e0 call 2a843b0 2668->2691 2692 2a0c9fa 2668->2692 2697 2a0ca28-2a0ca3b 2691->2697 2698 2a0ca3c-2a0cb06 call 2a66420 call 2a02e90 call 2adff10 GetModuleHandleExA GetModuleFileNameA call 2a663f0 call 2a02e90 2691->2698 2692->2691 2697->2698 2709 2a0cb08 2698->2709 2710 2a0cb0b-2a0cb5c call 2a664b0 call 2a02e90 2698->2710 2709->2710 2715 2a0cb6c 2710->2715 2716 2a0cb5e-2a0cb65 2710->2716 2717 2a0cb71-2a0cb9f call 2a66450 call 2a02e90 2715->2717 2716->2717 2718 2a0cb67-2a0cb6a 2716->2718 2723 2a0cba1-2a0cba8 2717->2723 2724 2a0cbaf 2717->2724 2718->2717 2725 2a0cbb4-2a0cbb8 2723->2725 2726 2a0cbaa-2a0cbad 2723->2726 2724->2725 2727 2a0cbc8 2725->2727 2728 2a0cbba-2a0cbc1 2725->2728 2726->2725 2730 2a0cbcd-2a0cc39 call 2a663c0 call 2a02e90 call 2a66380 2727->2730 2729 2a0cbc3-2a0cbc6 2728->2729 2728->2730 2729->2730 2737 2a0cc56-2a0cc7e call 2a02980 2730->2737 2738 2a0cc3b 2730->2738 2744 2a0cc80-2a0cc86 2737->2744 2745 2a0ccae-2a0ccb5 2737->2745 2739 2a0cc40-2a0cc54 call 2a66290 2738->2739 2739->2737 2748 2a0cc97-2a0ccac call 2a6a500 2744->2748 2749 2a0cc88-2a0cc94 call 2a68fe0 2744->2749 2746 2a0ccb7-2a0ccdb call 2a66570 2745->2746 2747 2a0ccfc-2a0ce13 call 2a02a20 call 2a666a0 call 2a02e90 call 2a66260 RegOpenKeyExA 2745->2747 2758 2a0cce0-2a0cce5 2746->2758 2767 2a0ce19-2a0ce77 call 2a66540 RegQueryValueExA 2747->2767 2768 2a0cf1d-2a0d106 call 2adff10 GetComputerNameA call 2a0c0f0 call 2a02a20 call 2a66700 call 2a02e90 call 2a028d0 call 2adff10 GetUserNameA call 2a66480 call 2a02e90 GetDesktopWindow GetWindowRect call 2a66230 call 2a02e90 call 2adff10 GetUserDefaultLocaleName 2747->2768 2748->2744 2748->2745 2749->2748 2758->2758 2760 2a0cce7-2a0ccf7 call 2a68d70 2758->2760 2760->2747 2774 2a0cf11-2a0cf17 RegCloseKey 2767->2774 2775 2a0ce7d-2a0ce83 2767->2775 2806 2a0d108-2a0d15c call 2a66200 2768->2806 2807 2a0d15e-2a0d1c5 call 2a66230 call 2a66580 2768->2807 2774->2768 2777 2a0ce85-2a0ce9c 2775->2777 2778 2a0ce9e-2a0ceae 2775->2778 2780 2a0ceb5-2a0cf0e call 2a667f0 call 2a663c0 call 2a02e90 2777->2780 2778->2780 2780->2774 2812 2a0d1c8-2a0d274 call 2a02e90 call 2a661d0 call 2a66580 call 2a02e90 call 2adff10 GetKeyboardLayoutList LocalAlloc 2806->2812 2807->2812 2825 2a0d27a-2a0d287 GetKeyboardLayoutList 2812->2825 2826 2a0d31c-2a0d5e5 GetLocalTime call 2a661a0 call 2a02e90 GetSystemTime call 2adff10 GetTimeZoneInformation TzSpecificLocalTimeToSystemTime call 2a66670 call 2b035e0 call 2a02e90 call 2a66170 call 2a66580 call 2a02e90 call 2a66760 RegOpenKeyExA 2812->2826 2828 2a0d315-2a0d316 LocalFree 2825->2828 2829 2a0d28d 2825->2829 2861 2a0d6b3-2a0d74c GetSystemInfo call 2a66480 call 2a02e90 GlobalMemoryStatusEx 2826->2861 2862 2a0d5eb-2a0d669 call 2a66140 RegQueryValueExA 2826->2862 2828->2826 2831 2a0d290-2a0d2ab GetLocaleInfoA 2829->2831 2833 2a0d2c8-2a0d2e8 call 2a667c0 2831->2833 2834 2a0d2ad-2a0d2c6 call 2a66580 2831->2834 2842 2a0d2eb-2a0d30f call 2a02e90 call 2adff10 2833->2842 2834->2842 2842->2828 2842->2831 2873 2a0d793-2a0d7ec call 2a706d0 call 2a68030 call 2adff10 EnumDisplayDevicesA 2861->2873 2874 2a0d74e-2a0d790 call 2a663f0 call 2a02e90 2861->2874 2867 2a0d6a7-2a0d6ad RegCloseKey 2862->2867 2868 2a0d66b-2a0d6a4 call 2a66480 call 2a02e90 2862->2868 2867->2861 2868->2867 2887 2a0d7f2-2a0d813 2873->2887 2888 2a0d97b-2a0d9ea call 2a66480 call 2a66580 call 2a02e90 CreateToolhelp32Snapshot 2873->2888 2874->2873 2890 2a0d815-2a0d817 2887->2890 2891 2a0d87c-2a0d92c call 2a66140 call 2a02e90 call 2a02980 call 2a6e3d0 call 2a028d0 2887->2891 2908 2a0d9f0-2a0da00 Process32First 2888->2908 2909 2a0da65-2a0db7b call 2a66170 call 2a66580 call 2a02e90 call 2a66110 RegOpenKeyExA 2888->2909 2894 2a0d820-2a0d84f call 2a02980 call 2a707d0 call 2a028d0 2890->2894 2924 2a0d934-2a0d975 call 2adff10 EnumDisplayDevicesA 2891->2924 2916 2a0d855-2a0d87a 2894->2916 2917 2a0d92e 2894->2917 2913 2a0da02-2a0da14 Process32Next 2908->2913 2914 2a0da5e-2a0da5f CloseHandle 2908->2914 2936 2a0db81 2909->2936 2937 2a0dd23-2a0dd24 call 2ae7608 2909->2937 2913->2914 2919 2a0da16-2a0da48 call 2a66730 call 2a02e90 2913->2919 2914->2909 2916->2891 2916->2894 2917->2924 2933 2a0da4d-2a0da5c Process32Next 2919->2933 2924->2887 2924->2888 2933->2914 2933->2919 2938 2a0db83-2a0dbae RegEnumKeyExA 2936->2938 2942 2a0dd29-2a0dd6d call 2a6b280 call 2a028d0 call 2a0e090 call 2a028d0 * 3 2937->2942 2940 2a0dbb4-2a0dc10 call 2a667c0 wsprintfA RegOpenKeyExA 2938->2940 2941 2a0dd0e-2a0dd11 2938->2941 2940->2941 2949 2a0dc16-2a0dc6a call 2a66540 RegQueryValueExA 2940->2949 2941->2938 2944 2a0dd17-2a0dd1d RegCloseKey 2941->2944 2942->2549 2944->2937 2954 2a0dc70-2a0dcc8 call 2a66170 RegQueryValueExA 2949->2954 2955 2a0dd05-2a0dd08 RegCloseKey 2949->2955 2954->2955 2961 2a0dcca-2a0dd02 call 2a66730 call 2a02e90 2954->2961 2955->2941 2961->2955
                                                                                            APIs
                                                                                            • RegOpenKeyExA.KERNELBASE(80000002,B6A7AF8C,00000000,00020019,00000000), ref: 02A0C63D
                                                                                            • RegQueryValueExA.KERNELBASE(00000000,8A828192,00000000,00020019,?,00000400), ref: 02A0C6B3
                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 02A0C6E8
                                                                                            • GetCurrentHwProfileA.ADVAPI32(?), ref: 02A0C78F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CloseCurrentOpenProfileQueryValue
                                                                                            • String ID: 1.7$?$@$W<$bb~z$default$iT\d$n|}$qkfc$qwli$t{fx
                                                                                            • API String ID: 1240309278-3835243323
                                                                                            • Opcode ID: b4714488c6441582af84570f93b940c8a2156c14fcb865fd150062367bc2f414
                                                                                            • Instruction ID: 493583ebac19ca0e260bf1746ecd3cdb537b11a0ab5c552804345e512e65bd0f
                                                                                            • Opcode Fuzzy Hash: b4714488c6441582af84570f93b940c8a2156c14fcb865fd150062367bc2f414
                                                                                            • Instruction Fuzzy Hash: 39E227B1C402289EDB21DF90DD88BEEBBB9EF14304F4444D9D509A7281EB745B89CFA5
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 02A43120
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A4317C
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A43A39
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A43BC1
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02A431AD
                                                                                              • Part of subcall function 02A0A5F0: GetFileAttributesA.KERNELBASE ref: 02A0A61E
                                                                                              • Part of subcall function 02A0A5F0: GetLastError.KERNEL32 ref: 02A0A629
                                                                                              • Part of subcall function 02A0A5F0: __Mtx_unlock.LIBCPMT ref: 02A0A64E
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A432E8
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02A43317
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A43416
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A434ED
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A4354B
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A43686
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A43714
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A4388B
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateDirectoryFile$Copy$FolderPath$AttributesErrorLastMtx_unlock
                                                                                            • String ID: -flh$1$Xx{e$`l`t$`m$l$meak$p*q~$s$wkwg$|>{a$|z
                                                                                            • API String ID: 3083152970-1050508948
                                                                                            • Opcode ID: 2e197690c0c2cc039398f62be8d137837ee3349a14440e165fee2f0aa49b2aef
                                                                                            • Instruction ID: 387e4c7fc433f2538e039292883f1a79691018ee929a8f16ffecb3e15f6bdb38
                                                                                            • Opcode Fuzzy Hash: 2e197690c0c2cc039398f62be8d137837ee3349a14440e165fee2f0aa49b2aef
                                                                                            • Instruction Fuzzy Hash: C44381B0C442589ADF25EB64DE98BDEBB76AF25304F0440D9C84967281EF745B8CCF92
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • FindFirstFileA.KERNEL32(?,74DF3100,00000000,C8CFCA83,02A46009,00000000,C8CFCA83,C8CFCA84,74DF3100,?,00000000), ref: 02A0E1FB
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: FileFindFirst
                                                                                            • String ID: .$\$y
                                                                                            • API String ID: 1974802433-705995259
                                                                                            • Opcode ID: 748cc823b659c78458c5be25257c283dd24f7a41ab80e3d7c7e51d18d88ed392
                                                                                            • Instruction ID: 33150300379af39e6ede4e0f1b75d296ccac4c58fa6aae48a3f52a9947b5b9e8
                                                                                            • Opcode Fuzzy Hash: 748cc823b659c78458c5be25257c283dd24f7a41ab80e3d7c7e51d18d88ed392
                                                                                            • Instruction Fuzzy Hash: 3CD20171D002089FDF18DFA8EAC4BADBB76AF09304F144A59E416A76C1DF31AA45CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                              • Part of subcall function 02A43090: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 02A43120
                                                                                              • Part of subcall function 02A43090: CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A4317C
                                                                                              • Part of subcall function 02A43090: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 02A431AD
                                                                                            • CreateDirectoryA.KERNELBASE(?,00000000,?,978DB083,02B32D14,00000033,978DB083,978DB084), ref: 02A604E5
                                                                                            • GetFileAttributesA.KERNEL32(00000000,?,-00000034,0000004C,?,0000004C), ref: 02A606DF
                                                                                            • GetLastError.KERNEL32(?,-00000034,0000004C,?,0000004C), ref: 02A606EA
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A60709
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A60718
                                                                                            • CreateDirectoryA.KERNEL32(?,00000000,?,0000004C), ref: 02A6072F
                                                                                            • GetFileAttributesA.KERNEL32(00000000,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60910
                                                                                            • GetLastError.KERNEL32(?,?,-00000034,0000004C,?,0000004C), ref: 02A6091B
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A6093A
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A6094F
                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A6096C
                                                                                            • GetFileAttributesA.KERNEL32(?,?,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60B4C
                                                                                            • GetLastError.KERNEL32(?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60B57
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A60B76
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A60B85
                                                                                            • CreateDirectoryA.KERNEL32(?,00000000,?,?,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60BA2
                                                                                            • GetFileAttributesA.KERNEL32(00000000,83828F94,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60E5C
                                                                                            • GetLastError.KERNEL32(?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60E67
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A60E86
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A60E95
                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,83828F94,?,?,?,?,-00000034,0000004C,?,0000004C), ref: 02A60EAC
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Mtx_unlock$CreateDirectory$AttributesErrorFileLast$FolderPath
                                                                                            • String ID: \$\$\$\
                                                                                            • API String ID: 2196497886-3238275731
                                                                                            • Opcode ID: 2d44e2d7b885e57f20b955ee3639ef403e736d6196ce94a178c9793c531639cf
                                                                                            • Instruction ID: 58459115171681664478fef97da830cb79ebb99ddd809404e0ab416ccd322773
                                                                                            • Opcode Fuzzy Hash: 2d44e2d7b885e57f20b955ee3639ef403e736d6196ce94a178c9793c531639cf
                                                                                            • Instruction Fuzzy Hash: 1903D371D002588FEF18CB68CD88BFDBBB6AF09308F548599D40AA7791DB319A85CF51
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Mtx_unlock$AttributesCreateDirectoryErrorFileLast
                                                                                            • String ID: \$\$\$\$_
                                                                                            • API String ID: 2839272865-3392302647
                                                                                            • Opcode ID: 26e5845d09027ef3ce89a667e0608f67a0653276a96a98ce2004fbaca75f7d31
                                                                                            • Instruction ID: d18f59e7c8a7e37ebda1caf137fb348d8eaa1feab3082926f15855b268233fa7
                                                                                            • Opcode Fuzzy Hash: 26e5845d09027ef3ce89a667e0608f67a0653276a96a98ce2004fbaca75f7d31
                                                                                            • Instruction Fuzzy Hash: BA430570D002688FDB29CF68C988BEEBBB6EF05318F1445D9D84AA7255DF309A85CF51
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesErrorFileLastMtx_unlock
                                                                                            • String ID: $-$-$..$:S,($\$\$\$\$\$_$_$few<$ho'>$k*17
                                                                                            • API String ID: 441747541-4163213437
                                                                                            • Opcode ID: 4b009007d9f3a4e52b28ff4e5fa79d6c8ca02b94c015515b53155c987276cea6
                                                                                            • Instruction ID: ffeb2f8675fd3ad3f94aef06134878b07c411636c7a0a05cc253250834139729
                                                                                            • Opcode Fuzzy Hash: 4b009007d9f3a4e52b28ff4e5fa79d6c8ca02b94c015515b53155c987276cea6
                                                                                            • Instruction Fuzzy Hash: 9C43C0709002688FDB29CF28CD887EEBBB5AF05304F1441DDD84AA7692DB759B89CF51
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • GetFileAttributesA.KERNELBASE(?,?,02A49A2E,00000000), ref: 02A4953D
                                                                                            • GetLastError.KERNEL32(?,02A49A2E,00000000), ref: 02A49548
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A49571
                                                                                            • CreateDirectoryA.KERNELBASE(?,00000000), ref: 02A496B0
                                                                                            • CreateDirectoryA.KERNELBASE(?,00000000,?,?,0000005C,?,?,0000005C,?), ref: 02A497C0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateDirectory$AttributesErrorFileLastMtx_unlock
                                                                                            • String ID: $*$:$\$\$jgt`$n$nmgi$pXFn$ugdc$we$z${t`t$~a[g
                                                                                            • API String ID: 611283054-3053135953
                                                                                            • Opcode ID: 26cb5db44c4dbd0a751f77ce265fee895f758c87c8bb38fb45d900c4ba25d9bf
                                                                                            • Instruction ID: f9f2d9967217884c5f29d52f808d581ffa498ab4d175e92e3301a77e9fa3353f
                                                                                            • Opcode Fuzzy Hash: 26cb5db44c4dbd0a751f77ce265fee895f758c87c8bb38fb45d900c4ba25d9bf
                                                                                            • Instruction Fuzzy Hash: B8B3CCB1D002189EDF24DF68C9987EEBBB6AF45304F1482C9C45967281DF719B89CFA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,00000033,00A2A384,00000033), ref: 02A3E257
                                                                                            • GetFileAttributesA.KERNELBASE(?,?,?,8E84B483,8E84B484), ref: 02A3E379
                                                                                            • GetLastError.KERNEL32(?,?,8E84B483,8E84B484), ref: 02A3E386
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A3E3A5
                                                                                            • GetFileAttributesA.KERNEL32(?,83859484,?,?,?,8E84B483,8E84B484), ref: 02A3E470
                                                                                            • GetLastError.KERNEL32(?,?,?,8E84B483,8E84B484), ref: 02A3E477
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A3E496
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesErrorFileLastMtx_unlock$FolderPath
                                                                                            • String ID: .$\$\$\$\$s$s
                                                                                            • API String ID: 3673586248-1144724142
                                                                                            • Opcode ID: b62174e4c52a65b61504693b30cc42d2faced2b0a081a12828d8c9eff2f62b7e
                                                                                            • Instruction ID: 5570648254980d966aaedd3a2347049f4be98786f4f6bb2a28bbbb855c4dab1b
                                                                                            • Opcode Fuzzy Hash: b62174e4c52a65b61504693b30cc42d2faced2b0a081a12828d8c9eff2f62b7e
                                                                                            • Instruction Fuzzy Hash: 65F2AF70D102598FEB29CF68CD84BEDBBB6AF09304F1482D9E449E7691DB709A85CF50
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A444AD
                                                                                            • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 02A4458A
                                                                                            • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 02A447E7
                                                                                            • CreateDirectoryA.KERNEL32(00000000,00000000,?,?,00000000), ref: 02A448F7
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CopyCreateDirectoryFile
                                                                                            • String ID: 1$`m$l$wkwg
                                                                                            • API String ID: 3761107634-2719960592
                                                                                            • Opcode ID: 657febb4ae42ef01369b52088c69bf29760d039c3d31526ecd38353fc04e820e
                                                                                            • Instruction ID: 4858e114d1d8626cace67b8597123ca05a52d0700cec47ca2f497f371796477a
                                                                                            • Opcode Fuzzy Hash: 657febb4ae42ef01369b52088c69bf29760d039c3d31526ecd38353fc04e820e
                                                                                            • Instruction Fuzzy Hash: 06F29270C442589ADF25EB60DE98BEEB776AF25304F4440D9C84967281EF745B8CCFA2
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,02A55F3B), ref: 02A3B4C6
                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 02A3B5E5
                                                                                            • GetPrivateProfileStringA.KERNEL32(?,8A95818F,00000000,?,00000104,?), ref: 02A3B69A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: PrivateProfile$FolderNamesPathSectionString
                                                                                            • String ID: #0g{$'$)$/$7<tz$?fsm$FGQ&$VFXA$XXB\$\$\$]wAC$`}aI$gd%;$nSdj$wdhi$z`a{
                                                                                            • API String ID: 1539182551-2698631267
                                                                                            • Opcode ID: 70999859abfcb53500e897f8e6632255523a40d544996ae336105a65c09d6fb2
                                                                                            • Instruction ID: e4448d65851d18b0499734211189efade0683692351fe8762a91fdf54ccaf2df
                                                                                            • Opcode Fuzzy Hash: 70999859abfcb53500e897f8e6632255523a40d544996ae336105a65c09d6fb2
                                                                                            • Instruction Fuzzy Hash: C9C2C170900258DFDB29CF68CC94BEEBBB6BF05308F1445D9E449AB281DB759A84CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 02A288B1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: FolderPath
                                                                                            • String ID: 0$1$1$3$JTnD$OQ@$P$P+('$RX@S$YU]Z$bk|x$cannot use operator[] with a string argument with $c{5:$jwZu$n -k$u}p{$vgJc$w`x`
                                                                                            • API String ID: 1514166925-2794068133
                                                                                            • Opcode ID: 2e3202cdafb962e6c52ae374a417305f60bfd76aac547e64c5dff19b389b7c1c
                                                                                            • Instruction ID: 55b34e2a4ef3fe55eb5c1ae01a39a5a47f353a891d27b28aab5a5efdcde7d2f0
                                                                                            • Opcode Fuzzy Hash: 2e3202cdafb962e6c52ae374a417305f60bfd76aac547e64c5dff19b389b7c1c
                                                                                            • Instruction Fuzzy Hash: 5C339D70D00269CFDB25DF68C998BEEBBB5AF14304F1441D9D849A7281EF749A88CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • GetPrivateProfileStringA.KERNEL32(?,8A95818F,00000000,?,00000104,?), ref: 02A3B69A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: PrivateProfileString
                                                                                            • String ID: #0g{$'$)$/$7<tz$?fsm$FGQ&$VFXA$XXB\$\$\$]wAC$`}aI$gd%;$nSdj$wdhi$z`a{
                                                                                            • API String ID: 1096422788-2698631267
                                                                                            • Opcode ID: bf6ae0ee46b1d27296fa89889e75e627263f8f73a9e1af07f146a4776552b224
                                                                                            • Instruction ID: a1cef66ecef832565c6cee5b3512b94819e3333f3635fbfaff506dc194abb828
                                                                                            • Opcode Fuzzy Hash: bf6ae0ee46b1d27296fa89889e75e627263f8f73a9e1af07f146a4776552b224
                                                                                            • Instruction Fuzzy Hash: 95A2B070904258DFDB29CF28CD94BEEBBB6BF05308F1445D9E449AB281DB719A84CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: "/& $+(ek$.=4r$3$3z|u$BWNC$CwJX$Drhs$FJFT$NHDZ$O$WG$]YV[$^X]O$`ec>$aOhw$jxda$k(%c$pSP@$rf96$tyk~$xxRh$zadt$|vxw$}ES}$~<[L
                                                                                            • API String ID: 0-424170321
                                                                                            • Opcode ID: 9b3a21257c8aa2f6c1e8859dd5c22ed511b6de96f22639c78a327f772490cb22
                                                                                            • Instruction ID: 64d60c7bc56255b419521e6eb794aaa34b9191f0e6b07260f367c3587b924c9b
                                                                                            • Opcode Fuzzy Hash: 9b3a21257c8aa2f6c1e8859dd5c22ed511b6de96f22639c78a327f772490cb22
                                                                                            • Instruction Fuzzy Hash: 2B13AA70D05268CFDB25DF68C9987EEBBB5AF14304F1441E9C849A7281EB749B88CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: %$+`l}$7<tz$?fsm$FGQ&$K[e$\$\$`}aI$k`sw$o95r$rze&$stlf$wupw$yhh|${Og{
                                                                                            • API String ID: 0-291594044
                                                                                            • Opcode ID: d0fb74eecde67f29226b15cf3293a43c7d94bb11ce35c32aa292ad6470403b32
                                                                                            • Instruction ID: 5125a0631e1a5d4535a72567ba82641b8a7a43365608e988a3ab86376d72c0bc
                                                                                            • Opcode Fuzzy Hash: d0fb74eecde67f29226b15cf3293a43c7d94bb11ce35c32aa292ad6470403b32
                                                                                            • Instruction Fuzzy Hash: 86A2A571D002688FDB29CF68CD947EDFBB2AF45308F148599D449AB381DB349A89CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 02A3588D
                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,00000000), ref: 02A3592E
                                                                                            • GetPrivateProfileStringA.KERNEL32(?,8A95818F,00000000,?,00000104,?), ref: 02A359DC
                                                                                            • lstrlenA.KERNEL32(?), ref: 02A374FA
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: PrivateProfile$FolderNamesPathSectionStringlstrlen
                                                                                            • String ID: +jb|$ET9\$ISP>$OKBO$bCdp$bwvq$cannot use operator[] with a string argument with $hzm&$rO[}$~}aC
                                                                                            • API String ID: 1311570089-3620833884
                                                                                            • Opcode ID: 39476980edfe64503d0deb5012a7c0fa631adfb7c7863db0b5f12016115dd3fc
                                                                                            • Instruction ID: a1545dc9e2d9eb6154cfe7c3e855268bc552c3e685812a8e5e869c27bb01f4ab
                                                                                            • Opcode Fuzzy Hash: 39476980edfe64503d0deb5012a7c0fa631adfb7c7863db0b5f12016115dd3fc
                                                                                            • Instruction Fuzzy Hash: 2F03CEB0D402588BDB2ADF64CD98BEEBBB6AF15304F0441D9D409A7281EF745B88CF95
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,00000000), ref: 02A2C48A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: FolderPath
                                                                                            • String ID: #pjm$A$\$\$\$\$\$\$\$bfVy$cannot use operator[] with a string argument with $lu$n~{g
                                                                                            • API String ID: 1514166925-2210393922
                                                                                            • Opcode ID: e88960063eeee01204425a03d1d9f40e3bce6c1a8d1740d399023488ff1a696d
                                                                                            • Instruction ID: beef63fcbdfd7005eddef9d5c8fd459cedb5c3143c392ca05a6422d07df1327d
                                                                                            • Opcode Fuzzy Hash: e88960063eeee01204425a03d1d9f40e3bce6c1a8d1740d399023488ff1a696d
                                                                                            • Instruction Fuzzy Hash: 0A338F71D002688FDB28DF68C9847EEBBB6EF05304F1481DDD449A7291DB74AA89CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 23371 2a41150-2a41206 call 2a67230 call 2a67200 call 2a0c360 call 2a6d040 call 2a66e90 23382 2a41210-2a41247 call 2a69190 call 2a02a20 RegOpenKeyExA 23371->23382 23387 2a41fc2-2a41fe6 call 2a028d0 23382->23387 23388 2a4124d-2a41285 call 2adff10 RegEnumKeyA 23382->23388 23387->23382 23395 2a41fec-2a42002 23387->23395 23393 2a41fbd-2a41fc0 RegCloseKey 23388->23393 23394 2a4128b 23388->23394 23393->23387 23396 2a41290-2a412ad RegOpenKeyExA 23394->23396 23397 2a412b3-2a41372 call 2adff10 * 5 23396->23397 23398 2a41f7f-2a41fb7 call 2adff10 RegEnumKeyA 23396->23398 23411 2a41376-2a41381 23397->23411 23398->23393 23398->23396 23411->23411 23412 2a41383-2a413a9 RegQueryValueExA 23411->23412 23413 2a413af-2a4143c 23412->23413 23414 2a41f7a-2a41f7d RegCloseKey 23412->23414 23415 2a41442-2a41447 23413->23415 23414->23398 23415->23415 23416 2a41449-2a414ba call 2a02ae0 call 2adff10 * 2 23415->23416 23423 2a414c0-2a414cb 23416->23423 23423->23423 23424 2a414cd-2a414f3 RegQueryValueExA 23423->23424 23425 2a414f5-2a41544 call 2a0c0c0 RegQueryValueExA 23424->23425 23426 2a41546-2a4154d 23424->23426 23425->23426 23432 2a4159d-2a415be 23425->23432 23428 2a4154f-2a41555 23426->23428 23429 2a4156b-2a41572 23426->23429 23433 2a41558-2a4155d 23428->23433 23431 2a41574-2a4157d 23429->23431 23429->23432 23434 2a41580-2a41585 23431->23434 23436 2a415c0-2a415cb 23432->23436 23433->23433 23435 2a4155f-2a41561 23433->23435 23434->23434 23437 2a41587-2a41589 23434->23437 23435->23429 23438 2a41563-2a41569 23435->23438 23436->23436 23439 2a415cd-2a415f0 RegQueryValueExA 23436->23439 23437->23432 23440 2a4158b 23437->23440 23441 2a41591-2a41598 call 2a68fb0 23438->23441 23442 2a415f6-2a4164b call 2a08c70 RegQueryValueExA 23439->23442 23443 2a41703-2a4170a 23439->23443 23440->23441 23441->23432 23442->23443 23452 2a41651-2a416a6 call 2a08c70 RegQueryValueExA 23442->23452 23444 2a4170c-2a41712 23443->23444 23445 2a4174d-2a41754 23443->23445 23449 2a41715-2a4171a 23444->23449 23450 2a41756-2a4175f 23445->23450 23451 2a41798-2a4179f 23445->23451 23449->23449 23455 2a4171c-2a4171e 23449->23455 23456 2a41760-2a41765 23450->23456 23453 2a417e5-2a417ec 23451->23453 23454 2a417a1-2a417aa 23451->23454 23452->23443 23472 2a416a8-2a416fd call 2a08c70 RegQueryValueExA 23452->23472 23457 2a4183e-2a418a0 call 2a68cc0 * 2 call 2a68ce0 call 2a6da30 call 2a68d00 23453->23457 23458 2a417ee-2a417f4 23453->23458 23461 2a417b0-2a417b5 23454->23461 23455->23445 23462 2a41720-2a41748 call 2a09e10 call 2a68fb0 23455->23462 23456->23456 23459 2a41767-2a41769 23456->23459 23490 2a418a5-2a4192c call 2a6aa50 call 2addcb0 call 2a69190 23457->23490 23463 2a417f7-2a417fc 23458->23463 23459->23451 23464 2a4176b-2a41793 call 2a09e10 call 2a68fb0 23459->23464 23461->23461 23467 2a417b7-2a417b9 23461->23467 23487 2a41830-2a4183b call 2a20460 23462->23487 23463->23463 23469 2a417fe-2a41800 23463->23469 23464->23487 23467->23453 23473 2a417bb-2a417e3 call 2a09e10 call 2a68fb0 23467->23473 23469->23457 23475 2a41802-2a4182a call 2a09e10 call 2a68fb0 23469->23475 23472->23443 23472->23490 23473->23487 23475->23487 23487->23457 23508 2a41930-2a4193b 23490->23508 23508->23508 23509 2a4193d-2a41949 23508->23509 23510 2a41979-2a4197b 23509->23510 23511 2a4194b-2a41977 call 2a6aa50 23509->23511 23512 2a41981 23510->23512 23513 2a42003-2a42056 call 2a6ad60 call 2a02980 call 2a6ce60 call 2a07780 call 2adf91b 23510->23513 23515 2a41987-2a419ad 23511->23515 23512->23515 23538 2a4205b-2a42060 call 2ae31d0 23513->23538 23519 2a419b3-2a419b8 23515->23519 23519->23519 23521 2a419ba-2a419ed call 2a02ae0 call 2a70330 23519->23521 23530 2a41a1e-2a41ad1 call 2a66e70 call 2addcb0 call 2a69190 23521->23530 23531 2a419ef-2a419fe 23521->23531 23547 2a41ad5-2a41ae0 23530->23547 23533 2a41a14-2a41a1b call 2addf31 23531->23533 23534 2a41a00-2a41a0e 23531->23534 23533->23530 23534->23533 23534->23538 23547->23547 23548 2a41ae2-2a41b0c 23547->23548 23549 2a41b12-2a41b17 23548->23549 23549->23549 23550 2a41b19-2a41b4c call 2a02ae0 call 2a70330 23549->23550 23555 2a41b7d-2a41c20 call 2a66e70 call 2addcb0 23550->23555 23556 2a41b4e-2a41b5d 23550->23556 23565 2a41c23-2a41c28 23555->23565 23557 2a41b73-2a41b7a call 2addf31 23556->23557 23558 2a41b5f-2a41b6d 23556->23558 23557->23555 23558->23538 23558->23557 23565->23565 23566 2a41c2a-2a41c5e call 2a02ae0 23565->23566 23569 2a41c62-2a41c6d 23566->23569 23569->23569 23570 2a41c6f-2a41c9f 23569->23570 23571 2a41ca0-2a41ca5 23570->23571 23571->23571 23572 2a41ca7-2a41cda call 2a02ae0 call 2a70330 23571->23572 23577 2a41cdc-2a41ceb 23572->23577 23578 2a41d0b-2a41dc9 call 2a66e70 call 2addcb0 call 2a69190 23572->23578 23580 2a41d01-2a41d08 call 2addf31 23577->23580 23581 2a41ced-2a41cfb 23577->23581 23589 2a41dd0-2a41ddb 23578->23589 23580->23578 23581->23538 23581->23580 23589->23589 23590 2a41ddd-2a41e0d 23589->23590 23591 2a41e10-2a41e15 23590->23591 23591->23591 23592 2a41e17-2a41e4a call 2a02ae0 call 2a70330 23591->23592 23597 2a41e4c-2a41e5b 23592->23597 23598 2a41e7b-2a41ede call 2a66e70 23592->23598 23600 2a41e71-2a41e78 call 2addf31 23597->23600 23601 2a41e5d-2a41e6b 23597->23601 23605 2a41ee0-2a41eeb 23598->23605 23600->23598 23601->23538 23601->23600 23605->23605 23606 2a41eed-2a41f22 call 2a6d040 call 2a66840 call 2a66e70 23605->23606 23613 2a41f24-2a41f32 call 2a02a50 23606->23613 23614 2a41f37-2a41f74 call 2a028d0 * 2 23606->23614 23613->23614 23614->23414
                                                                                            APIs
                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,02B35420,00000000), ref: 02A4123F
                                                                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 02A4127A
                                                                                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 02A412A5
                                                                                            • RegQueryValueExA.ADVAPI32(?,8B808D9A,00000000,00000001,?,00000104), ref: 02A413A5
                                                                                            • RegQueryValueExA.ADVAPI32(?,B2A0AD96,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 02A414EF
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 02A41540
                                                                                            • RegQueryValueExA.ADVAPI32(?,B2A0AD96,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A415EC
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A41647
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A416A2
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A416F9
                                                                                            • RegCloseKey.ADVAPI32(?), ref: 02A41F7D
                                                                                            • RegEnumKeyA.ADVAPI32(?,00000001,?,00000104), ref: 02A41FAC
                                                                                            • RegCloseKey.ADVAPI32(?), ref: 02A41FC0
                                                                                            Strings
                                                                                            • cannot use operator[] with a string argument with , xrefs: 02A4201B
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: QueryValue$CloseEnumOpen
                                                                                            • String ID: cannot use operator[] with a string argument with
                                                                                            • API String ID: 2041898428-2766135566
                                                                                            • Opcode ID: 9010a1a79b65d2d7e5d89a985878e2ff99a7425f5bc18e80a32690ee890c3d5f
                                                                                            • Instruction ID: d0668a0fb1a6516c89caf18b7b80f02d2c76b34c1266209343da7ac7d2b4075a
                                                                                            • Opcode Fuzzy Hash: 9010a1a79b65d2d7e5d89a985878e2ff99a7425f5bc18e80a32690ee890c3d5f
                                                                                            • Instruction Fuzzy Hash: 409288B0800258DEDB25DF64CD94BEEBBB9AF19304F1041DAD449A7281EF755B88CFA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 23632 2a0a6b0-2a0a6e9 call 2add232 23635 2a0aa8d-2a0aa8e call 2adcedb 23632->23635 23636 2a0a6ef-2a0a735 23632->23636 23638 2a0aa93 call 2a02270 23635->23638 23636->23638 23639 2a0a73b-2a0a7cf call 2a70a10 FindFirstFileA 23636->23639 23642 2a0aa98-2a0aa9f call 2ae31d0 23638->23642 23649 2a0a9e3 23639->23649 23650 2a0a7d5-2a0a7de 23639->23650 23652 2a0a9e5-2a0a9eb 23649->23652 23651 2a0a7e0-2a0a7e5 23650->23651 23651->23651 23653 2a0a7e7-2a0a836 23651->23653 23654 2a0aa19-2a0aa31 23652->23654 23655 2a0a9ed-2a0a9f9 23652->23655 23653->23638 23671 2a0a83c-2a0a923 call 2a70a10 call 2a68ea0 call 2a69010 23653->23671 23659 2a0aa33-2a0aa3f 23654->23659 23660 2a0aa5b-2a0aa8c call 2add243 23654->23660 23657 2a0a9fb-2a0aa09 23655->23657 23658 2a0aa0f-2a0aa16 call 2addf31 23655->23658 23657->23642 23657->23658 23658->23654 23664 2a0aa51-2a0aa58 call 2addf31 23659->23664 23665 2a0aa41-2a0aa4f 23659->23665 23664->23660 23665->23642 23665->23664 23681 2a0a940-2a0a947 23671->23681 23682 2a0a925-2a0a92c call 2a0a6b0 23671->23682 23684 2a0a949 23681->23684 23685 2a0a94c-2a0a95a SetFileAttributesA 23681->23685 23682->23681 23684->23685 23686 2a0a9d9-2a0a9e1 GetLastError 23685->23686 23687 2a0a95c-2a0a963 23685->23687 23686->23652 23688 2a0a965 23687->23688 23689 2a0a968-2a0a971 DeleteFileA 23687->23689 23688->23689 23689->23686 23690 2a0a973-2a0a984 FindNextFileA 23689->23690 23690->23650 23691 2a0a98a-2a0a99e FindClose GetLastError 23690->23691 23691->23652 23692 2a0a9a0-2a0a9a6 23691->23692 23693 2a0a9a8 23692->23693 23694 2a0a9aa-2a0a9b8 SetFileAttributesA 23692->23694 23693->23694 23695 2a0a9c0-2a0a9c4 23694->23695 23696 2a0a9ba-2a0a9be GetLastError 23694->23696 23697 2a0a9c6 23695->23697 23698 2a0a9c8-2a0a9d1 RemoveDirectoryA 23695->23698 23696->23652 23697->23698 23698->23649 23699 2a0a9d3-2a0a9d7 GetLastError 23698->23699 23699->23652
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: \*.*
                                                                                            • API String ID: 0-1173974218
                                                                                            • Opcode ID: 3fc21191a5858b859e94a2baecfabb1c0019c00fed862f5ddd2ff70d78c34ca6
                                                                                            • Instruction ID: 750f5eeb6380906ffadf0f8331284eaef2e827d6d0448674128434e4005da636
                                                                                            • Opcode Fuzzy Hash: 3fc21191a5858b859e94a2baecfabb1c0019c00fed862f5ddd2ff70d78c34ca6
                                                                                            • Instruction Fuzzy Hash: 8DA18D70E002099FDB28DFA8D9D4BAEBBB6FF08314F144519E116E72C2DB709985CB60
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,?,?,?,?,?,02A55CA7), ref: 02A37826
                                                                                            • GetPrivateProfileSectionNamesA.KERNEL32(?,00001000,?), ref: 02A37963
                                                                                            • GetPrivateProfileStringA.KERNEL32(?,8A95818F,00000000,?,00000104,?), ref: 02A37A1A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: PrivateProfile$FolderNamesPathSectionString
                                                                                            • String ID: $/$\$\$cannot use operator[] with a string argument with $nllu$sg{s0
                                                                                            • API String ID: 1539182551-113793748
                                                                                            • Opcode ID: 8e5c8bfd1128964cdfda16278cf881c9d909726baa36cfed7256a2e674c22b36
                                                                                            • Instruction ID: 6c25356893c3b2604aeeebc1e11eedc43aa2b6bff10af38e49df6fb2d92a4f95
                                                                                            • Opcode Fuzzy Hash: 8e5c8bfd1128964cdfda16278cf881c9d909726baa36cfed7256a2e674c22b36
                                                                                            • Instruction Fuzzy Hash: D9C2A170900258DFDB29CF64CD84BEDBBB5AF05304F1441EDE449AB281EB759A88CFA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 24761 2a41208-2a4120f 24762 2a41210-2a41247 call 2a69190 call 2a02a20 RegOpenKeyExA 24761->24762 24767 2a41fc2-2a41fe6 call 2a028d0 24762->24767 24768 2a4124d-2a41285 call 2adff10 RegEnumKeyA 24762->24768 24767->24762 24775 2a41fec-2a42002 24767->24775 24773 2a41fbd-2a41fc0 RegCloseKey 24768->24773 24774 2a4128b 24768->24774 24773->24767 24776 2a41290-2a412ad RegOpenKeyExA 24774->24776 24777 2a412b3-2a41372 call 2adff10 * 5 24776->24777 24778 2a41f7f-2a41fb7 call 2adff10 RegEnumKeyA 24776->24778 24791 2a41376-2a41381 24777->24791 24778->24773 24778->24776 24791->24791 24792 2a41383-2a413a9 RegQueryValueExA 24791->24792 24793 2a413af-2a4143c 24792->24793 24794 2a41f7a-2a41f7d RegCloseKey 24792->24794 24795 2a41442-2a41447 24793->24795 24794->24778 24795->24795 24796 2a41449-2a414ba call 2a02ae0 call 2adff10 * 2 24795->24796 24803 2a414c0-2a414cb 24796->24803 24803->24803 24804 2a414cd-2a414f3 RegQueryValueExA 24803->24804 24805 2a414f5-2a41544 call 2a0c0c0 RegQueryValueExA 24804->24805 24806 2a41546-2a4154d 24804->24806 24805->24806 24812 2a4159d-2a415be 24805->24812 24808 2a4154f-2a41555 24806->24808 24809 2a4156b-2a41572 24806->24809 24813 2a41558-2a4155d 24808->24813 24811 2a41574-2a4157d 24809->24811 24809->24812 24814 2a41580-2a41585 24811->24814 24816 2a415c0-2a415cb 24812->24816 24813->24813 24815 2a4155f-2a41561 24813->24815 24814->24814 24817 2a41587-2a41589 24814->24817 24815->24809 24818 2a41563-2a41569 24815->24818 24816->24816 24819 2a415cd-2a415f0 RegQueryValueExA 24816->24819 24817->24812 24820 2a4158b 24817->24820 24821 2a41591-2a41598 call 2a68fb0 24818->24821 24822 2a415f6-2a4164b call 2a08c70 RegQueryValueExA 24819->24822 24823 2a41703-2a4170a 24819->24823 24820->24821 24821->24812 24822->24823 24832 2a41651-2a416a6 call 2a08c70 RegQueryValueExA 24822->24832 24824 2a4170c-2a41712 24823->24824 24825 2a4174d-2a41754 24823->24825 24829 2a41715-2a4171a 24824->24829 24830 2a41756-2a4175f 24825->24830 24831 2a41798-2a4179f 24825->24831 24829->24829 24835 2a4171c-2a4171e 24829->24835 24836 2a41760-2a41765 24830->24836 24833 2a417e5-2a417ec 24831->24833 24834 2a417a1-2a417aa 24831->24834 24832->24823 24852 2a416a8-2a416fd call 2a08c70 RegQueryValueExA 24832->24852 24837 2a4183e-2a418a0 call 2a68cc0 * 2 call 2a68ce0 call 2a6da30 call 2a68d00 24833->24837 24838 2a417ee-2a417f4 24833->24838 24841 2a417b0-2a417b5 24834->24841 24835->24825 24842 2a41720-2a41748 call 2a09e10 call 2a68fb0 24835->24842 24836->24836 24839 2a41767-2a41769 24836->24839 24870 2a418a5-2a4192c call 2a6aa50 call 2addcb0 call 2a69190 24837->24870 24843 2a417f7-2a417fc 24838->24843 24839->24831 24844 2a4176b-2a41793 call 2a09e10 call 2a68fb0 24839->24844 24841->24841 24847 2a417b7-2a417b9 24841->24847 24867 2a41830-2a4183b call 2a20460 24842->24867 24843->24843 24849 2a417fe-2a41800 24843->24849 24844->24867 24847->24833 24853 2a417bb-2a417e3 call 2a09e10 call 2a68fb0 24847->24853 24849->24837 24855 2a41802-2a4182a call 2a09e10 call 2a68fb0 24849->24855 24852->24823 24852->24870 24853->24867 24855->24867 24867->24837 24888 2a41930-2a4193b 24870->24888 24888->24888 24889 2a4193d-2a41949 24888->24889 24890 2a41979-2a4197b 24889->24890 24891 2a4194b-2a41977 call 2a6aa50 24889->24891 24892 2a41981 24890->24892 24893 2a42003-2a42056 call 2a6ad60 call 2a02980 call 2a6ce60 call 2a07780 call 2adf91b 24890->24893 24895 2a41987-2a419ad 24891->24895 24892->24895 24918 2a4205b-2a42060 call 2ae31d0 24893->24918 24899 2a419b3-2a419b8 24895->24899 24899->24899 24901 2a419ba-2a419ed call 2a02ae0 call 2a70330 24899->24901 24910 2a41a1e-2a41ad1 call 2a66e70 call 2addcb0 call 2a69190 24901->24910 24911 2a419ef-2a419fe 24901->24911 24927 2a41ad5-2a41ae0 24910->24927 24913 2a41a14-2a41a1b call 2addf31 24911->24913 24914 2a41a00-2a41a0e 24911->24914 24913->24910 24914->24913 24914->24918 24927->24927 24928 2a41ae2-2a41b0c 24927->24928 24929 2a41b12-2a41b17 24928->24929 24929->24929 24930 2a41b19-2a41b4c call 2a02ae0 call 2a70330 24929->24930 24935 2a41b7d-2a41c20 call 2a66e70 call 2addcb0 24930->24935 24936 2a41b4e-2a41b5d 24930->24936 24945 2a41c23-2a41c28 24935->24945 24937 2a41b73-2a41b7a call 2addf31 24936->24937 24938 2a41b5f-2a41b6d 24936->24938 24937->24935 24938->24918 24938->24937 24945->24945 24946 2a41c2a-2a41c5e call 2a02ae0 24945->24946 24949 2a41c62-2a41c6d 24946->24949 24949->24949 24950 2a41c6f-2a41c9f 24949->24950 24951 2a41ca0-2a41ca5 24950->24951 24951->24951 24952 2a41ca7-2a41cda call 2a02ae0 call 2a70330 24951->24952 24957 2a41cdc-2a41ceb 24952->24957 24958 2a41d0b-2a41dc9 call 2a66e70 call 2addcb0 call 2a69190 24952->24958 24960 2a41d01-2a41d08 call 2addf31 24957->24960 24961 2a41ced-2a41cfb 24957->24961 24969 2a41dd0-2a41ddb 24958->24969 24960->24958 24961->24918 24961->24960 24969->24969 24970 2a41ddd-2a41e0d 24969->24970 24971 2a41e10-2a41e15 24970->24971 24971->24971 24972 2a41e17-2a41e4a call 2a02ae0 call 2a70330 24971->24972 24977 2a41e4c-2a41e5b 24972->24977 24978 2a41e7b-2a41ede call 2a66e70 24972->24978 24980 2a41e71-2a41e78 call 2addf31 24977->24980 24981 2a41e5d-2a41e6b 24977->24981 24985 2a41ee0-2a41eeb 24978->24985 24980->24978 24981->24918 24981->24980 24985->24985 24986 2a41eed-2a41f22 call 2a6d040 call 2a66840 call 2a66e70 24985->24986 24993 2a41f24-2a41f32 call 2a02a50 24986->24993 24994 2a41f37-2a41f74 call 2a028d0 * 2 24986->24994 24993->24994 24994->24794
                                                                                            APIs
                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,02B35420,00000000), ref: 02A4123F
                                                                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 02A4127A
                                                                                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 02A412A5
                                                                                            • RegQueryValueExA.ADVAPI32(?,8B808D9A,00000000,00000001,?,00000104), ref: 02A413A5
                                                                                            • RegQueryValueExA.ADVAPI32(?,B2A0AD96,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 02A414EF
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000001,?,00000104,?,?,?,?,0000002D,?), ref: 02A41540
                                                                                            • RegQueryValueExA.ADVAPI32(?,B2A0AD96,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A415EC
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A41647
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A416A2
                                                                                            • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000003,?,00000200,?,?,?,?,0000002D,?), ref: 02A416F9
                                                                                            • RegEnumKeyA.ADVAPI32(?,00000001,?,00000104), ref: 02A41FAC
                                                                                            • RegCloseKey.ADVAPI32(?), ref: 02A41FC0
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: QueryValue$EnumOpen$Close
                                                                                            • String ID:
                                                                                            • API String ID: 2931576859-0
                                                                                            • Opcode ID: aa072dc2ce34a842a3c977ea8b5ae53960a6ddff3dd403fed37af6d2b6e335d4
                                                                                            • Instruction ID: fac4c7b9eec51d6d56b31306873e2352546ba8abc57ab62b7055663b545b5a17
                                                                                            • Opcode Fuzzy Hash: aa072dc2ce34a842a3c977ea8b5ae53960a6ddff3dd403fed37af6d2b6e335d4
                                                                                            • Instruction Fuzzy Hash: 898269B0C002589EDB25CF64CD94BEEBBB9AF19304F1041DAD54DA7281EB755B88CFA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • LoadLibraryA.KERNELBASE(8E9481A9,?), ref: 02A3C766
                                                                                            • GetProcAddress.KERNEL32(00000000,8E948189), ref: 02A3C7C1
                                                                                            • GetProcAddress.KERNEL32(8E948189), ref: 02A3C80E
                                                                                            • GetProcAddress.KERNEL32(8E948189), ref: 02A3C84B
                                                                                            • GetProcAddress.KERNEL32(8E948189), ref: 02A3C88B
                                                                                            • GetProcAddress.KERNEL32(8E948189), ref: 02A3C8CF
                                                                                            • GetProcAddress.KERNEL32(8E948189), ref: 02A3C90E
                                                                                            • GetProcAddress.KERNEL32(8E948189), ref: 02A3C94D
                                                                                            • FreeLibrary.KERNEL32 ref: 02A3C9A2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressProc$Library$FreeLoad
                                                                                            • String ID:
                                                                                            • API String ID: 2449869053-0
                                                                                            • Opcode ID: 50109a3da9ab346bfead3beeddec2b8f8b8749861ec17641a88e0d7ffb721524
                                                                                            • Instruction ID: d89aa8d2e2b719eeee7f4e7d4f45c101c3ff2a4e70c97a8d608e4a0b78c93ba4
                                                                                            • Opcode Fuzzy Hash: 50109a3da9ab346bfead3beeddec2b8f8b8749861ec17641a88e0d7ffb721524
                                                                                            • Instruction Fuzzy Hash: 3B71DE70C54288EADB16CFA4E844BDDBFF5EF09348F50849FE401AB241E7B64259CBA5
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: \
                                                                                            • API String ID: 0-2967466578
                                                                                            • Opcode ID: bcddcd7dae99f47fc6576ace8473ef40d1892b831e1115b3e85459d7a7dbc102
                                                                                            • Instruction ID: 6341fd3cbd46bacdbdfe5e4801f3da081ce239cc841bcd2f46f457fa50c07521
                                                                                            • Opcode Fuzzy Hash: bcddcd7dae99f47fc6576ace8473ef40d1892b831e1115b3e85459d7a7dbc102
                                                                                            • Instruction Fuzzy Hash: A40201708042688FDB29CF68C9987EEBBB5AF15308F1441E9D80AA7241DF759B89CF51
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: #pjm$%$\$\$\$\$bfVy$lu$n~{g
                                                                                            • API String ID: 0-3135257148
                                                                                            • Opcode ID: 02993383a8e9881e477d7add9e469eaeba8a8107ce174b21e4c7999ce28cb53b
                                                                                            • Instruction ID: c91507f5adde21016c7908c72d98c331dbf611ad3a9eb33a444a70ba3790345d
                                                                                            • Opcode Fuzzy Hash: 02993383a8e9881e477d7add9e469eaeba8a8107ce174b21e4c7999ce28cb53b
                                                                                            • Instruction Fuzzy Hash: EBD29070D002688FDB29CF68CD987EEBBB5AF05304F1482DDD449A7292DB746A89CF51
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: #pjm$%$\$\$\$\$bfVy$lu$n~{g
                                                                                            • API String ID: 0-3135257148
                                                                                            • Opcode ID: 948e2dfce3397d9400b4ad342740490daf883c8277feac38f2129c51f23756ae
                                                                                            • Instruction ID: f1a8ebdbaf9225d7d090a307362070a72252d0a5ca4b64fbf178ca16c47cd9ca
                                                                                            • Opcode Fuzzy Hash: 948e2dfce3397d9400b4ad342740490daf883c8277feac38f2129c51f23756ae
                                                                                            • Instruction Fuzzy Hash: 3DD29070D002688FDB29CF68CD987EEBBB5AF05304F1482DDD449A7292DB746A89CF51
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,8C968FBB), ref: 02A24B5C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: FolderPath
                                                                                            • String ID: $\$\$c{$mhjg
                                                                                            • API String ID: 1514166925-1455636313
                                                                                            • Opcode ID: c86b812e61bf10497ea6dc32952577677e84cd85217b14ba1f450e7ba4e8e32f
                                                                                            • Instruction ID: 9ef82f033b1adb7423d7ee79b6953e7578577e98959c3217be3ab4523cb773b3
                                                                                            • Opcode Fuzzy Hash: c86b812e61bf10497ea6dc32952577677e84cd85217b14ba1f450e7ba4e8e32f
                                                                                            • Instruction Fuzzy Hash: D7D2C171D002688FDB28CF68C9947EDBBB2BF45304F54819DD459AB781DB709A89CF90
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: Pjm$/$1,(}$1,(}$Sevu$Sevu$bf3*$pg{n
                                                                                            • API String ID: 0-776177215
                                                                                            • Opcode ID: 1ec11515b9378ac5a25b2f3fecb5207fc4e0a3c024a3310c85ab0712a1cc7beb
                                                                                            • Instruction ID: a4b7b5a75b891d50ee763bf3f40587bb8d8772476bcdf7622ec480ace08b2784
                                                                                            • Opcode Fuzzy Hash: 1ec11515b9378ac5a25b2f3fecb5207fc4e0a3c024a3310c85ab0712a1cc7beb
                                                                                            • Instruction Fuzzy Hash: 09E25F70D402689ADF25EBA0DD98BEDBB7AAF14304F4040D9D84A77281EF745B89CF61
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • OutputDebugStringA.KERNEL32(45 hgfch rtdyt gfch,?,?,?), ref: 02A6478F
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000509A0,00000000,00000000,00000000), ref: 02A647BA
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00055B20,00000000,00000000,00000000), ref: 02A647D0
                                                                                              • Part of subcall function 02A3C720: LoadLibraryA.KERNELBASE(8E9481A9,?), ref: 02A3C766
                                                                                              • Part of subcall function 02A3C720: GetProcAddress.KERNEL32(00000000,8E948189), ref: 02A3C7C1
                                                                                              • Part of subcall function 02A3C720: GetProcAddress.KERNEL32(8E948189), ref: 02A3C80E
                                                                                              • Part of subcall function 02A3C720: GetProcAddress.KERNEL32(8E948189), ref: 02A3C84B
                                                                                              • Part of subcall function 02A3C720: GetProcAddress.KERNEL32(8E948189), ref: 02A3C88B
                                                                                            • FreeLibrary.KERNELBASE(6CFB0000,?,?,?,?,?,?), ref: 02A6488D
                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 02A6494C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressProc$CreateLibraryThread$DebugFreeLoadObjectOutputSingleStringWait
                                                                                            • String ID: 45 hgfch rtdyt gfch
                                                                                            • API String ID: 2649782214-2270278793
                                                                                            • Opcode ID: 385d1ea5193128cc873e52f42b23f80570f0bb6c1cc619d0ef44056741adac2d
                                                                                            • Instruction ID: 7b1f45e46cdb3e4d411f53253f0b232b34a1b3fe2bb45ead76cdf2a7871f9bae
                                                                                            • Opcode Fuzzy Hash: 385d1ea5193128cc873e52f42b23f80570f0bb6c1cc619d0ef44056741adac2d
                                                                                            • Instruction Fuzzy Hash: E1225A759402288BDF25EF60DD98BEDB77AAF58304F0001D9D44A67290EF306B89CFA5
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • OutputDebugStringA.KERNEL32(45 hgfch rtdyt gfch,?,?,?), ref: 02A6478F
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000509A0,00000000,00000000,00000000), ref: 02A647BA
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00055B20,00000000,00000000,00000000), ref: 02A647D0
                                                                                            • FreeLibrary.KERNELBASE(6CFB0000,?,?,?,?,?,?), ref: 02A6488D
                                                                                            • WaitForSingleObject.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 02A6494C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateThread$DebugFreeLibraryObjectOutputSingleStringWait
                                                                                            • String ID: 45 hgfch rtdyt gfch
                                                                                            • API String ID: 3253439392-2270278793
                                                                                            • Opcode ID: 817d6128416651461b3970ec06840ef483eb2f9e200521d7d753672b88534311
                                                                                            • Instruction ID: c0699745a5e5fbf3f9e1455999a88f0ab040acd66bab43cdf49eb12faa78a63e
                                                                                            • Opcode Fuzzy Hash: 817d6128416651461b3970ec06840ef483eb2f9e200521d7d753672b88534311
                                                                                            • Instruction Fuzzy Hash: 11E16A719802288BDF25EF60DD98BEDB77AAF54344F0041D9D44A67290EF306B89CFA5
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?,8D9595BE), ref: 02A23393
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: FolderPath
                                                                                            • String ID: &$\$\$cannot use operator[] with a string argument with
                                                                                            • API String ID: 1514166925-52429261
                                                                                            • Opcode ID: 50b02ac0c55b192c67da80718f023bc2d22f646d1d7dbb58c662722a936fbcee
                                                                                            • Instruction ID: 2d7322b4033c181f0c1efecbb72367464b8e01634838c04fe2a66b15c48dd482
                                                                                            • Opcode Fuzzy Hash: 50b02ac0c55b192c67da80718f023bc2d22f646d1d7dbb58c662722a936fbcee
                                                                                            • Instruction Fuzzy Hash: 62E29071D002688FDF29CF68C9947EDBBB6AF09304F1481D9D449AB281DB749A89CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressConcurrency::cancel_current_taskHandleModuleProc
                                                                                            • String ID: 102.165.48.43$102.165.48.43$C$Content-Type: application/x-www-form-urlencoded$https://ipinfo.io/$https://www.maxmind.com/en/locate-my-ip-address
                                                                                            • API String ID: 2385143733-1064276941
                                                                                            • Opcode ID: 0f6a5654815b3b8955b39fdb634eba82f8ba8b92441d97a85a54f93c1d6b5817
                                                                                            • Instruction ID: 59a957c1b0c758e016e56c97099a594336304b8b9f3a950cc6208809843ed190
                                                                                            • Opcode Fuzzy Hash: 0f6a5654815b3b8955b39fdb634eba82f8ba8b92441d97a85a54f93c1d6b5817
                                                                                            • Instruction Fuzzy Hash: BCC27E70944268DADF25EB64CD98BEDBBBAAF14304F0400D9D54977280EF741B89CFA6
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • GetCursorPos.USER32(?), ref: 02A62473
                                                                                            • GetCursorPos.USER32(?), ref: 02A62479
                                                                                            • Sleep.KERNELBASE(000003E9,?,00000001,00000000,?,?,?,?,?,?,?,?,02A627D6), ref: 02A62528
                                                                                            • GetCursorPos.USER32(?), ref: 02A6252E
                                                                                            • Sleep.KERNELBASE(00000001,?,00000001,00000000,?,?,?,?,?,?,?,?,02A627D6), ref: 02A625DA
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Cursor$Sleep
                                                                                            • String ID:
                                                                                            • API String ID: 1847515627-0
                                                                                            • Opcode ID: 42681c3bc99496ca9676d9c9de64f952ee6e99d999f8a8b8b6ab83713f5aba98
                                                                                            • Instruction ID: cc1e986057f01bab9ecf93c88d5e7966fd4c4490e061d626ba7f25007c1aec39
                                                                                            • Opcode Fuzzy Hash: 42681c3bc99496ca9676d9c9de64f952ee6e99d999f8a8b8b6ab83713f5aba98
                                                                                            • Instruction Fuzzy Hash: C451CC35A402158FCB24CF58C8E8FB9B3B1FF88708B198099D945AB351DB35E905CB80
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            • too many terms in compound SELECT, xrefs: 02ACC73F
                                                                                            • max, xrefs: 02ACDE1E
                                                                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 02ACC785
                                                                                            • min, xrefs: 02ACDDAD
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: max$min$only a single result allowed for a SELECT that is part of an expression$too many terms in compound SELECT
                                                                                            • API String ID: 0-2877691265
                                                                                            • Opcode ID: 46fec27825c19a7bd3f68a17f3686951004cbb12658a3c6ec6929c16df787bfd
                                                                                            • Instruction ID: 46d09a12eac6af4d89712ac04a49f7c3f0573c0b4bc6202236154cb7e68aa92b
                                                                                            • Opcode Fuzzy Hash: 46fec27825c19a7bd3f68a17f3686951004cbb12658a3c6ec6929c16df787bfd
                                                                                            • Instruction Fuzzy Hash: 552326706047418FC724DF28C190B2ABBE2FF89314F15896DE99A8B352DB75E945CF82
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: !$\$\
                                                                                            • API String ID: 0-3812680301
                                                                                            • Opcode ID: f28d8819bf140d7093bba4b27c0b2d6994521b1c60a26ff9ea6082a0663ba887
                                                                                            • Instruction ID: 502e4d3ea9ebc6a6b8ea4784e54342da7e7bfa13f7a842f92788f72982868643
                                                                                            • Opcode Fuzzy Hash: f28d8819bf140d7093bba4b27c0b2d6994521b1c60a26ff9ea6082a0663ba887
                                                                                            • Instruction Fuzzy Hash: 4B828E70900268CFEF29CF68C9947EDBBB1AF19304F1481DDD449AB281DB759A89CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • FindClose.KERNEL32(000000FF,?,02A760C8,?,00000000), ref: 02ADC3C6
                                                                                            • FindFirstFileExW.KERNELBASE(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,02A760C8,?,00000000), ref: 02ADC3F5
                                                                                            • GetLastError.KERNEL32(?,02A760C8,?,00000000), ref: 02ADC407
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Find$CloseErrorFileFirstLast
                                                                                            • String ID:
                                                                                            • API String ID: 4020440971-0
                                                                                            • Opcode ID: f95964b93d9b899159b6b4b47387ea4dbedc9101222a674fb0764c1d69dacd44
                                                                                            • Instruction ID: e61baa9fda4b9afad77a524d4febe8bb36b43110a88dca3ec42dc0d3d7953c88
                                                                                            • Opcode Fuzzy Hash: f95964b93d9b899159b6b4b47387ea4dbedc9101222a674fb0764c1d69dacd44
                                                                                            • Instruction Fuzzy Hash: CBF0B471080109BFDB111FA4EC4897A7B5FEB143B0B504922FD1A814A0DB31D862DA64
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                              • Part of subcall function 02A829B0: GetModuleHandleA.KERNEL32(AAAFA988,Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36,0000006F,00000000,00000000,?,?,?,?,?,?,?,?,00000000,02B0BA0C,000000FF), ref: 02A82AB5
                                                                                              • Part of subcall function 02A829B0: GetProcAddress.KERNEL32(00000000,AA8F8988), ref: 02A82AFC
                                                                                            • std::locale::_Init.LIBCPMT ref: 02A317AB
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressHandleInitModuleProcstd::locale::_
                                                                                            • String ID: authorization:
                                                                                            • API String ID: 2315660321-4237435816
                                                                                            • Opcode ID: d0606e9f4e61091f90d95e5e3d924c07c371c34f1131786d740daa00c7b4ff92
                                                                                            • Instruction ID: bd8390a3b7e7a6905a573c79f2b39d28b7b38a363161c8b205cbea719f2688c2
                                                                                            • Opcode Fuzzy Hash: d0606e9f4e61091f90d95e5e3d924c07c371c34f1131786d740daa00c7b4ff92
                                                                                            • Instruction Fuzzy Hash: 5B82B171D002488FDB19DFA8C9887EEBBB6BF09304F14419DE44AAB781DB749A45CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,02A4183B), ref: 02A20495
                                                                                            • LocalFree.KERNEL32(?,00000000), ref: 02A204C4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CryptDataFreeLocalUnprotect
                                                                                            • String ID:
                                                                                            • API String ID: 1561624719-0
                                                                                            • Opcode ID: 5c94ef291ac1f4b38a392bf09ed8001babd1944572f95a737335d29222535cc9
                                                                                            • Instruction ID: fd2872ec9b51947048e4c6448c8c48129bce2f1eb3312175b9d93fdb28ad8e9f
                                                                                            • Opcode Fuzzy Hash: 5c94ef291ac1f4b38a392bf09ed8001babd1944572f95a737335d29222535cc9
                                                                                            • Instruction Fuzzy Hash: 8E3168329006204FE73C8B6CDD8876FB7A6EF11314F048A6DE48697E81DB34A9894BD1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: "
                                                                                            • API String ID: 0-123907689
                                                                                            • Opcode ID: af0572300db005428b0cb64674ad6b8752fbbc53c224f1d0d8a294e4da192d5f
                                                                                            • Instruction ID: c2e76ec687563e9145644161519b6ce2da3759499ab586f37753b5f17d34361a
                                                                                            • Opcode Fuzzy Hash: af0572300db005428b0cb64674ad6b8752fbbc53c224f1d0d8a294e4da192d5f
                                                                                            • Instruction Fuzzy Hash: 6C127DB0904268CEDB69CB28CC987DEBBB5AF55304F1441EDC54EA7242DB341AC5CFA9
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Mtx_unlock
                                                                                            • String ID:
                                                                                            • API String ID: 1418687624-0
                                                                                            • Opcode ID: 4160dec7efadafc20987e4564db61d771c60f4deda4845375c29347c012cfaeb
                                                                                            • Instruction ID: ab1c37549ef37c671a33326d3bc7be5f3375cf75551d692fa2c9eb613a083b3d
                                                                                            • Opcode Fuzzy Hash: 4160dec7efadafc20987e4564db61d771c60f4deda4845375c29347c012cfaeb
                                                                                            • Instruction Fuzzy Hash: 3E416A719001889FDF08DF68CD84BFE7B6AEF05320F10825CE816E7A90DF3096498BA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 0
                                                                                            • API String ID: 0-4108050209
                                                                                            • Opcode ID: 7283ae75dac4470c97ea88c9d7027bf6a9a6095baf6011560a1c04ac0acd6412
                                                                                            • Instruction ID: 61e500b307a028179dec44f61c1c2d863c3337d1cee8dd2e7f5a434803c32c36
                                                                                            • Opcode Fuzzy Hash: 7283ae75dac4470c97ea88c9d7027bf6a9a6095baf6011560a1c04ac0acd6412
                                                                                            • Instruction Fuzzy Hash: 9EB1C3B59006068BCF24CF68C5E56BEBBB6AF05308F144619D463D7792DF309A43CB91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6c228caf2b453b4befd0a688ad199cc352f6de812f939187fe4a6cb46fd7d8ca
                                                                                            • Instruction ID: f7bdf5168de824bad693a78df91ed5a6e04594dd10ebe594f8b49e83d7672cca
                                                                                            • Opcode Fuzzy Hash: 6c228caf2b453b4befd0a688ad199cc352f6de812f939187fe4a6cb46fd7d8ca
                                                                                            • Instruction Fuzzy Hash: 4C82AC71D042588FDF1ACF68CD987EDBBB2AF45304F1482D9E449AB292DB705A85CF90
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 54930d3bcabcc7dbf0ed4e08a0d8295aef3d58c2e4fcaaf39135af7e966691e9
                                                                                            • Instruction ID: 8aa7d6fb354bbf3655d4dafb090826c99fdbee6645a9cd5c3d63007fae89673d
                                                                                            • Opcode Fuzzy Hash: 54930d3bcabcc7dbf0ed4e08a0d8295aef3d58c2e4fcaaf39135af7e966691e9
                                                                                            • Instruction Fuzzy Hash: 0F42BE71A10B498ADB24EF79C8807ADFBB1EF41210F1486ACD4A5D77C1DB74E54ACBA0
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 94c72a6b2b269a250812854598287c22e396fe59c4b44ff40d7d00dd49f0ad9a
                                                                                            • Instruction ID: 449624a7cb10593e36a421c5e1fc8a4ff3d7b52d7c5495809574b94ea6c41ba3
                                                                                            • Opcode Fuzzy Hash: 94c72a6b2b269a250812854598287c22e396fe59c4b44ff40d7d00dd49f0ad9a
                                                                                            • Instruction Fuzzy Hash: 4CB1B271604701DFD720EF64C980A5BB7E5EF88314F044E2DF9AA83650EB74E949CB52
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 854d7f0168f0dc93b040c5b83782ce3004fb363419dbd7899f20dfa3d1eb45b6
                                                                                            • Instruction ID: 2e6cf08e0ce5b734dc7e986f85c85bce631385a787c75a55414695087787785f
                                                                                            • Opcode Fuzzy Hash: 854d7f0168f0dc93b040c5b83782ce3004fb363419dbd7899f20dfa3d1eb45b6
                                                                                            • Instruction Fuzzy Hash: 81316F71600B058FC365CFB9C8817A3B7E5FB49214F150A6ED6EAC7280C7B4B985CB60
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: %$+`l}$7<tz$?fsm$FGQ&$K[e$\$\$`}aI$k`sw$o95r$rze&$stlf$wupw$yhh|${Og{
                                                                                            • API String ID: 0-291594044
                                                                                            • Opcode ID: 0835f4373b4307aeb3a1bb3be607099e224e7bcbb06201a58e589604340ae1d2
                                                                                            • Instruction ID: 75b6e6712efbb2fc615110b8dc63c621fa8db5d3d798ed844a23d768729a97b1
                                                                                            • Opcode Fuzzy Hash: 0835f4373b4307aeb3a1bb3be607099e224e7bcbb06201a58e589604340ae1d2
                                                                                            • Instruction Fuzzy Hash: 7F82A170D00268CFDB29CF68CD947EDBBB2AF45308F1445D9D449AB281DB749A89CFA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 22019 2a77a9b-2a77ab4 call 2a71e00 22021 2a77ab9-2a77abb call 2a71990 22019->22021 22023 2a77ac0-2a77ac9 22021->22023 22025 2a78cbf-2a78d53 call 2a70ce0 call 2a06ea0 call 2a713b0 call 2a78ea0 22023->22025 22026 2a77a1c 22023->22026 22071 2a78d55-2a78d61 22025->22071 22072 2a78d81-2a78dcb call 2adf0d4 * 2 22025->22072 22026->22019 22028 2a77c73-2a77c7e call 2a79210 22026->22028 22029 2a77d8d-2a77d98 call 2a79210 22026->22029 22030 2a77c8b-2a77c91 22026->22030 22047 2a78025-2a78027 22028->22047 22048 2a77c84-2a77c86 22028->22048 22029->22048 22049 2a77d9e 22029->22049 22034 2a77c93-2a77ce8 call 2a6aa50 22030->22034 22035 2a77ced-2a77cf3 22030->22035 22050 2a78017-2a78022 call 2a66e70 22034->22050 22036 2a77cf5-2a77d01 22035->22036 22037 2a77d32-2a77d88 call 2a6aa50 22035->22037 22043 2a77d24-2a77d2d call 2a80630 22036->22043 22044 2a77d03-2a77d1f call 2a6aa50 22036->22044 22037->22050 22043->22047 22044->22047 22052 2a78b63-2a78b65 22047->22052 22053 2a7802d-2a7807f call 2a73980 * 2 22047->22053 22057 2a78e1a-2a78e37 call 2a66610 22048->22057 22049->22047 22050->22047 22052->22057 22074 2a78085-2a78090 call 2a71990 22053->22074 22075 2a781f3-2a781fe call 2a71990 22053->22075 22076 2a78d77-2a78d7e call 2addf31 22071->22076 22077 2a78d63-2a78d71 22071->22077 22094 2a786b1-2a786c3 22072->22094 22095 2a78dd1-2a78ddd 22072->22095 22074->22021 22092 2a78096-2a78099 22074->22092 22090 2a78200-2a78203 22075->22090 22091 2a7821d-2a7822a call 2a71990 22075->22091 22076->22072 22077->22076 22082 2a78e3a-2a78e57 call 2ae31d0 call 2a79df0 call 2adf91b 22077->22082 22096 2a788b2-2a78947 call 2a70ce0 call 2a06ea0 call 2a713b0 call 2a78ea0 22090->22096 22097 2a78209-2a78218 call 2a79980 22090->22097 22107 2a78230-2a78252 call 2a6ac60 call 2a71990 22091->22107 22108 2a78a08-2a78aa2 call 2a70ce0 call 2a06ea0 call 2a713b0 call 2a78ea0 22091->22108 22092->22097 22098 2a7809f-2a78132 call 2a70ce0 call 2a06ea0 call 2a713b0 call 2a78ea0 22092->22098 22102 2a78def-2a78e07 call 2addf31 22095->22102 22103 2a78ddf-2a78ded 22095->22103 22146 2a78975-2a789bf call 2adf0d4 * 2 22096->22146 22147 2a78949-2a78955 22096->22147 22097->22091 22144 2a78134-2a78140 22098->22144 22145 2a78160-2a781aa call 2adf0d4 * 2 22098->22145 22123 2a78e10-2a78e17 call 2addf31 22102->22123 22103->22082 22103->22102 22107->22021 22135 2a78258-2a7830c call 2addcb0 call 2a70ce0 call 2a06ea0 call 2a713b0 call 2a78ea0 22107->22135 22157 2a78aa4-2a78ab0 22108->22157 22158 2a78ad0-2a78b1a call 2adf0d4 * 2 22108->22158 22123->22057 22197 2a7830e-2a7831a 22135->22197 22198 2a7833a-2a78384 call 2adf0d4 * 2 22135->22198 22150 2a78156-2a7815d call 2addf31 22144->22150 22151 2a78142-2a78150 22144->22151 22145->22094 22176 2a781b0-2a781bc 22145->22176 22146->22094 22177 2a789c5-2a789d1 22146->22177 22153 2a78957-2a78965 22147->22153 22154 2a7896b-2a78972 call 2addf31 22147->22154 22150->22145 22151->22082 22151->22150 22153->22082 22153->22154 22154->22146 22164 2a78ac6-2a78acd call 2addf31 22157->22164 22165 2a78ab2-2a78ac0 22157->22165 22158->22094 22189 2a78b20-2a78b2c 22158->22189 22164->22158 22165->22082 22165->22164 22181 2a781d2-2a781ee call 2addf31 22176->22181 22182 2a781be-2a781cc 22176->22182 22183 2a789e7-2a78a03 call 2addf31 22177->22183 22184 2a789d3-2a789e1 22177->22184 22199 2a78539-2a7853f 22181->22199 22182->22082 22182->22181 22183->22199 22184->22082 22184->22183 22193 2a78b42-2a78b5e call 2addf31 22189->22193 22194 2a78b2e-2a78b3c 22189->22194 22194->22082 22194->22193 22200 2a78330-2a78337 call 2addf31 22197->22200 22201 2a7831c-2a7832a 22197->22201 22198->22094 22212 2a7838a-2a78396 22198->22212 22199->22057 22202 2a78545-2a78551 22199->22202 22200->22198 22201->22082 22201->22200 22202->22123 22205 2a78557-2a78565 22202->22205 22205->22082 22209 2a7856b 22205->22209 22209->22123 22213 2a783ac-2a783c8 call 2addf31 22212->22213 22214 2a78398-2a783a6 22212->22214 22213->22199 22214->22082 22214->22213
                                                                                            APIs
                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 02A78183
                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 02A7819C
                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 02A78DA4
                                                                                            • ___std_exception_destroy.LIBVCRUNTIME ref: 02A78DBD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ___std_exception_destroy
                                                                                            • String ID: $$array$object$object key$object separator$value
                                                                                            • API String ID: 4194217158-1912492727
                                                                                            • Opcode ID: 5b9ca06b5726e97ef985bfe410df878b225cb979fc3247734d4c4432f8410e5a
                                                                                            • Instruction ID: 1321df96d4a56c9d4647b288f2c4767279c11c0cd5563cc07e18c2e4e9014330
                                                                                            • Opcode Fuzzy Hash: 5b9ca06b5726e97ef985bfe410df878b225cb979fc3247734d4c4432f8410e5a
                                                                                            • Instruction Fuzzy Hash: C252E671D00248CFDB18DFA4CD887EEBBB6AF09304F144599D44AAB781DB789A84CF55
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 25055 2a0c0f0-2a0c16a call 2adff10 25058 2a0c171-2a0c17c 25055->25058 25058->25058 25059 2a0c17e-2a0c1df 25058->25059 25060 2a0c1e0-2a0c1eb 25059->25060 25060->25060 25061 2a0c1ed-2a0c21a RegGetValueA 25060->25061 25062 2a0c248-2a0c24c 25061->25062 25063 2a0c21c-2a0c22b 25061->25063 25065 2a0c252-2a0c284 call 2adff10 GetComputerNameExA 25062->25065 25066 2a0c34a-2a0c35a 25062->25066 25064 2a0c230-2a0c235 25063->25064 25064->25064 25067 2a0c237-2a0c243 call 2a68d70 25064->25067 25071 2a0c286-2a0c28f 25065->25071 25072 2a0c2a8-2a0c2ac 25065->25072 25067->25062 25073 2a0c290-2a0c295 25071->25073 25072->25066 25074 2a0c2b2-2a0c2dd call 2adff10 LsaOpenPolicy 25072->25074 25073->25073 25075 2a0c297-2a0c2a3 call 2a68d70 25073->25075 25079 2a0c325-2a0c32f 25074->25079 25080 2a0c2df-2a0c2f0 LsaQueryInformationPolicy 25074->25080 25075->25072 25083 2a0c332-2a0c337 25079->25083 25081 2a0c2f2-2a0c2f9 25080->25081 25082 2a0c31c-2a0c31f LsaClose 25080->25082 25085 2a0c2fb 25081->25085 25086 2a0c2fe-2a0c316 call 2a02f70 LsaFreeMemory 25081->25086 25082->25079 25083->25083 25084 2a0c339-2a0c345 call 2a68d70 25083->25084 25084->25066 25085->25086 25086->25082
                                                                                            APIs
                                                                                            • RegGetValueA.KERNELBASE(80000002,9692998C,838C8F9B,0001FFFF,00000001,?,00000104), ref: 02A0C212
                                                                                            • GetComputerNameExA.KERNELBASE(00000002,?,00000104), ref: 02A0C27C
                                                                                            • LsaOpenPolicy.ADVAPI32(00000000,02B336CC,00000001,00000000), ref: 02A0C2D5
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ComputerNameOpenPolicyValue
                                                                                            • String ID: %wZ$Wi{k$fiyk$smuZ$}c
                                                                                            • API String ID: 642710655-776724527
                                                                                            • Opcode ID: 4b3e42d62add1c169b43e61f87aae2867c07ee7186546d11b25f3da125299ef4
                                                                                            • Instruction ID: 67de5d2f74e96466ac364a3b6f323ffd9b04c3aec0c48b1e41395fd15c1737d6
                                                                                            • Opcode Fuzzy Hash: 4b3e42d62add1c169b43e61f87aae2867c07ee7186546d11b25f3da125299ef4
                                                                                            • Instruction Fuzzy Hash: 1371C2B09403089FDB15CFA4D888BEEBBB9EF08704F04465EE54AA7180EB755649CF50
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 25090 2aed234-2aed264 call 2aecf82 25093 2aed27f-2aed28b call 2af8f5a 25090->25093 25094 2aed266-2aed271 call 2aebc4d 25090->25094 25100 2aed28d-2aed2a2 call 2aebc4d call 2aebc60 25093->25100 25101 2aed2a4-2aed2ed call 2aeceed 25093->25101 25099 2aed273-2aed27a call 2aebc60 25094->25099 25111 2aed559-2aed55d 25099->25111 25100->25099 25109 2aed2ef-2aed2f8 25101->25109 25110 2aed35a-2aed363 GetFileType 25101->25110 25113 2aed32f-2aed355 GetLastError call 2aebc06 25109->25113 25114 2aed2fa-2aed2fe 25109->25114 25115 2aed3ac-2aed3af 25110->25115 25116 2aed365-2aed396 GetLastError call 2aebc06 CloseHandle 25110->25116 25113->25099 25114->25113 25120 2aed300-2aed32d call 2aeceed 25114->25120 25118 2aed3b8-2aed3be 25115->25118 25119 2aed3b1-2aed3b6 25115->25119 25116->25099 25127 2aed39c-2aed3a7 call 2aebc60 25116->25127 25123 2aed3c2-2aed410 call 2af8ea5 25118->25123 25125 2aed3c0 25118->25125 25119->25123 25120->25110 25120->25113 25133 2aed42f-2aed457 call 2aecc97 25123->25133 25134 2aed412-2aed41e call 2aed0fc 25123->25134 25125->25123 25127->25099 25139 2aed45c-2aed49d 25133->25139 25140 2aed459-2aed45a 25133->25140 25134->25133 25141 2aed420 25134->25141 25143 2aed4be-2aed4cc 25139->25143 25144 2aed49f-2aed4a3 25139->25144 25142 2aed422-2aed42a call 2af3503 25140->25142 25141->25142 25142->25111 25147 2aed557 25143->25147 25148 2aed4d2-2aed4d6 25143->25148 25144->25143 25146 2aed4a5-2aed4b9 25144->25146 25146->25143 25147->25111 25148->25147 25150 2aed4d8-2aed50b CloseHandle call 2aeceed 25148->25150 25153 2aed53f-2aed553 25150->25153 25154 2aed50d-2aed539 GetLastError call 2aebc06 call 2af906d 25150->25154 25153->25147 25154->25153
                                                                                            APIs
                                                                                              • Part of subcall function 02AECEED: CreateFileW.KERNELBASE(?,?,?,?,?,?,00000000), ref: 02AECF0A
                                                                                            • GetLastError.KERNEL32 ref: 02AED348
                                                                                            • __dosmaperr.LIBCMT ref: 02AED34F
                                                                                            • GetFileType.KERNELBASE(00000000), ref: 02AED35B
                                                                                            • GetLastError.KERNEL32 ref: 02AED365
                                                                                            • __dosmaperr.LIBCMT ref: 02AED36E
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 02AED38E
                                                                                            • CloseHandle.KERNEL32(?), ref: 02AED4DB
                                                                                            • GetLastError.KERNEL32 ref: 02AED50D
                                                                                            • __dosmaperr.LIBCMT ref: 02AED514
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                            • String ID: H
                                                                                            • API String ID: 4237864984-2852464175
                                                                                            • Opcode ID: 362c4e4763dacd4dc3298efc6df0081a70bd4fa126836dfa0aa9ead3c360596c
                                                                                            • Instruction ID: 909e822fcaf1c00a0ed160d4d0c63c9b80d3ddd2c4c970618a7c4c9d0173ed3e
                                                                                            • Opcode Fuzzy Hash: 362c4e4763dacd4dc3298efc6df0081a70bd4fa126836dfa0aa9ead3c360596c
                                                                                            • Instruction Fuzzy Hash: 6CA14332A145059FCF19AF68DC91BAE7BB6EB46324F180159E812EF390CF359913CB61
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 25159 2a0b790-2a0b7c3 call 2a0a3a0 25162 2a0b7c5 25159->25162 25163 2a0b7ca-2a0b7de 25159->25163 25162->25163 25164 2a0b7e0-2a0b7eb 25163->25164 25164->25164 25165 2a0b7ed-2a0b81d 25164->25165 25166 2a0b820-2a0b825 25165->25166 25166->25166 25167 2a0b827-2a0b881 call 2a02ae0 25166->25167 25170 2a0b885-2a0b890 25167->25170 25170->25170 25171 2a0b892-2a0b8ae RegOpenKeyExA 25170->25171 25172 2a0b8b4-2a0b8dd 25171->25172 25173 2a0b945-2a0b959 25171->25173 25175 2a0b8e0-2a0b8eb 25172->25175 25174 2a0b960-2a0b96b 25173->25174 25174->25174 25176 2a0b96d-2a0b99d 25174->25176 25175->25175 25177 2a0b8ed-2a0b911 RegQueryValueExA 25175->25177 25180 2a0b9a0-2a0b9a5 25176->25180 25178 2a0b913-2a0b91c 25177->25178 25179 2a0b93c-2a0b93f RegCloseKey 25177->25179 25181 2a0b920-2a0b925 25178->25181 25179->25173 25180->25180 25182 2a0b9a7-2a0b9df call 2a02ae0 call 2adff10 GetCurrentHwProfileA 25180->25182 25181->25181 25183 2a0b927-2a0b937 call 2a68d70 25181->25183 25189 2a0b9e1-2a0b9ea 25182->25189 25190 2a0ba0c-2a0ba39 call 2a0b2c0 SetupDiGetClassDevsA 25182->25190 25183->25179 25192 2a0b9f0-2a0b9f5 25189->25192 25196 2a0ba3b-2a0ba6b 25190->25196 25197 2a0ba6d-2a0ba7b call 2a0b100 25190->25197 25192->25192 25193 2a0b9f7-2a0ba07 call 2a68d70 25192->25193 25193->25190 25199 2a0ba7e-2a0ba9c 25196->25199 25197->25199 25201 2a0baa0-2a0baa5 25199->25201 25201->25201 25202 2a0baa7-2a0bab8 25201->25202 25203 2a0c0a1 call 2a02270 25202->25203 25204 2a0babe-2a0bacb 25202->25204 25208 2a0c0a6 call 2ae31d0 25203->25208 25206 2a0bad3-2a0bafa call 2a70a10 25204->25206 25207 2a0bacd 25204->25207 25212 2a0bb02-2a0bb1a 25206->25212 25213 2a0bafc 25206->25213 25207->25206 25214 2a0c0ab-2a0c0b0 call 2ae31d0 25208->25214 25215 2a0bb53-2a0bb68 call 2a6eff0 25212->25215 25216 2a0bb1c-2a0bb2e 25212->25216 25213->25212 25225 2a0bb6a-2a0bc99 call 2a68ea0 call 2a70800 call 2a68ea0 call 2a70800 25215->25225 25218 2a0bb30 25216->25218 25219 2a0bb36-2a0bb51 call 2adf990 25216->25219 25218->25219 25219->25225 25234 2a0bcca-2a0bcd7 25225->25234 25235 2a0bc9b-2a0bcaa 25225->25235 25238 2a0bd08-2a0bd2d 25234->25238 25239 2a0bcd9-2a0bce8 25234->25239 25236 2a0bcc0-2a0bcc7 call 2addf31 25235->25236 25237 2a0bcac-2a0bcba 25235->25237 25236->25234 25237->25208 25237->25236 25240 2a0bd5b-2a0bd65 25238->25240 25241 2a0bd2f-2a0bd3b 25238->25241 25243 2a0bcea-2a0bcf8 25239->25243 25244 2a0bcfe-2a0bd05 call 2addf31 25239->25244 25247 2a0bd93-2a0bdb2 25240->25247 25248 2a0bd67-2a0bd73 25240->25248 25245 2a0bd51-2a0bd58 call 2addf31 25241->25245 25246 2a0bd3d-2a0bd4b 25241->25246 25243->25208 25243->25244 25244->25238 25245->25240 25246->25208 25246->25245 25254 2a0bde3-2a0be0b 25247->25254 25255 2a0bdb4-2a0bdc3 25247->25255 25252 2a0bd75-2a0bd83 25248->25252 25253 2a0bd89-2a0bd90 call 2addf31 25248->25253 25252->25208 25252->25253 25253->25247 25257 2a0be3c-2a0be46 25254->25257 25258 2a0be0d-2a0be1c 25254->25258 25261 2a0bdc5-2a0bdd3 25255->25261 25262 2a0bdd9-2a0bde0 call 2addf31 25255->25262 25265 2a0be74-2a0befb 25257->25265 25266 2a0be48-2a0be54 25257->25266 25263 2a0be32-2a0be39 call 2addf31 25258->25263 25264 2a0be1e-2a0be2c 25258->25264 25261->25208 25261->25262 25262->25254 25263->25257 25264->25208 25264->25263 25273 2a0bf06-2a0bf0b 25265->25273 25274 2a0befd-2a0bf03 25265->25274 25271 2a0be56-2a0be64 25266->25271 25272 2a0be6a-2a0be71 call 2addf31 25266->25272 25271->25208 25271->25272 25272->25265 25275 2a0bf36-2a0bf38 25273->25275 25276 2a0bf0d 25273->25276 25274->25273 25280 2a0bf60 25275->25280 25281 2a0bf3a-2a0bf5e call 2adf990 25275->25281 25279 2a0bf12-2a0bf2e call 2a84550 25276->25279 25289 2a0bf30 25279->25289 25285 2a0bf6a-2a0bf7d call 2a843b0 25280->25285 25281->25285 25291 2a0bf90-2a0bfaf 25285->25291 25292 2a0bf7f-2a0bf8f 25285->25292 25289->25275 25293 2a0bfb0-2a0bfb5 25291->25293 25292->25291 25293->25293 25294 2a0bfb7-2a0bfce call 2a02ae0 25293->25294 25297 2a0bfd0-2a0bfdf 25294->25297 25298 2a0bfff-2a0c023 25294->25298 25299 2a0bfe1-2a0bfef 25297->25299 25300 2a0bff5-2a0bffc call 2addf31 25297->25300 25301 2a0c025-2a0c036 25298->25301 25302 2a0c058-2a0c061 25298->25302 25299->25214 25299->25300 25300->25298 25306 2a0c038-2a0c049 25301->25306 25307 2a0c04e-2a0c055 call 2addf31 25301->25307 25303 2a0c063-2a0c072 25302->25303 25304 2a0c08e-2a0c0a0 25302->25304 25308 2a0c084-2a0c08b call 2addf31 25303->25308 25309 2a0c074-2a0c082 25303->25309 25306->25214 25311 2a0c04b 25306->25311 25307->25302 25308->25304 25309->25214 25309->25308 25311->25307
                                                                                            APIs
                                                                                              • Part of subcall function 02A0A3A0: GetCurrentProcess.KERNEL32(?), ref: 02A0A3AF
                                                                                              • Part of subcall function 02A0A3A0: IsWow64Process.KERNEL32(00000000), ref: 02A0A3B6
                                                                                            • RegOpenKeyExA.KERNELBASE(80000002,B6A7AF8C,00000000,00020019,00000000,8C8A8E8A,8C8A8E8B), ref: 02A0B8A6
                                                                                            • RegQueryValueExA.KERNELBASE(00000000,8A828192,00000000,00020019,?,00000400), ref: 02A0B909
                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 02A0B93F
                                                                                            • GetCurrentHwProfileA.ADVAPI32(?), ref: 02A0B9D7
                                                                                            • SetupDiGetClassDevsA.SETUPAPI(02B0D540,00000000,00000000,00000012), ref: 02A0BA30
                                                                                              • Part of subcall function 02A0B100: LocalAlloc.KERNEL32(00000040,0000001C), ref: 02A0B150
                                                                                              • Part of subcall function 02A0B100: SetupDiEnumDeviceInfo.SETUPAPI(?,00000000,00000000), ref: 02A0B15F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CurrentProcessSetup$AllocClassCloseDeviceDevsEnumInfoLocalOpenProfileQueryValueWow64
                                                                                            • String ID: :$_$_$_
                                                                                            • API String ID: 2396838628-4119709311
                                                                                            • Opcode ID: 6d3dd403c2bedb83e559f4023fee391d9a4d759efdd8053a75f50c32b3bdbd93
                                                                                            • Instruction ID: f0a611fc43024337da79d1430bc1758b04fdbe82158759b4581e925ca53c477a
                                                                                            • Opcode Fuzzy Hash: 6d3dd403c2bedb83e559f4023fee391d9a4d759efdd8053a75f50c32b3bdbd93
                                                                                            • Instruction Fuzzy Hash: 54528E71D002588FDB18CF68DD94BEDBBB6EF09308F1486ADD409A7281DB719A85CF60
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • GetFileAttributesA.KERNELBASE(?,?), ref: 02A063BA
                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 02A06B07
                                                                                              • Part of subcall function 02A6B300: std::locale::_Init.LIBCPMT ref: 02A6B3B6
                                                                                              • Part of subcall function 02A6B150: std::locale::_Init.LIBCPMT ref: 02A6B18B
                                                                                            • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 02A06894
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: InitIos_base_dtorstd::ios_base::_std::locale::_$AttributesFile
                                                                                            • String ID: .zip$/$\$recursive_directory_iterator::recursive_directory_iterator$status
                                                                                            • API String ID: 4117240250-1247146089
                                                                                            • Opcode ID: faae4c32f6cfe7b67ff7c22d1d9eebab6908a1c0d27a63dc1e2ed1e0017ae23a
                                                                                            • Instruction ID: 15f95a748fb1acfa9a74f3c52792ce4232149ebac738406b60605ec9e8acda0b
                                                                                            • Opcode Fuzzy Hash: faae4c32f6cfe7b67ff7c22d1d9eebab6908a1c0d27a63dc1e2ed1e0017ae23a
                                                                                            • Instruction Fuzzy Hash: D962B071D002488FDB18DF68D9C8BEDBBB6AF45318F1481A9D419A7381DF30AA85CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • WSAStartup.WS2_32 ref: 02A1E02A
                                                                                            • getaddrinfo.WS2_32(?,?,?), ref: 02A1E0BD
                                                                                            • socket.WS2_32(00000000,00000000,?), ref: 02A1E0DE
                                                                                            • connect.WS2_32(00000000,010082A8,00000000), ref: 02A1E0F2
                                                                                            • closesocket.WS2_32(00000000), ref: 02A1E0FE
                                                                                            • freeaddrinfo.WS2_32(?,?,?,?,?,?,?,?,?,?,?), ref: 02A1E10B
                                                                                            • WSACleanup.WS2_32 ref: 02A1E111
                                                                                            • freeaddrinfo.WS2_32(?,?,?,?,?,?,?,?,?,?,?), ref: 02A1E126
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: freeaddrinfo$CleanupStartupclosesocketconnectgetaddrinfosocket
                                                                                            • String ID:
                                                                                            • API String ID: 58224237-0
                                                                                            • Opcode ID: 6a2e9d3d863363f12f2e8eed9156df5e50e7c3969cb330defb027f9f1d8cef83
                                                                                            • Instruction ID: 841b1dfe9e428f1ab41195cb2e06b3e175588248de020e45c11b2bed34343dcd
                                                                                            • Opcode Fuzzy Hash: 6a2e9d3d863363f12f2e8eed9156df5e50e7c3969cb330defb027f9f1d8cef83
                                                                                            • Instruction Fuzzy Hash: A1318B716447009FD7219F64D889B2ABBE4FB85778F048B19FDA4932D0D77198188B92
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 0343bee6c354faeba60a0e1fdb6e4b9d990e4a8c34b2dba90667d787e2af683c
                                                                                            • Instruction ID: 96fb423c092f66ee438a59270f04966e98b36efcc43765c9ffa1be88bb17ae51
                                                                                            • Opcode Fuzzy Hash: 0343bee6c354faeba60a0e1fdb6e4b9d990e4a8c34b2dba90667d787e2af683c
                                                                                            • Instruction Fuzzy Hash: 69B1B370E48285ABDF51DFE8D980BADBBB5BF89354F0441D9F60197281CF789942CBA0
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 02A056E4
                                                                                            • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 02A0571F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ___std_fs_directory_iterator_advance@8
                                                                                            • String ID: .
                                                                                            • API String ID: 2610647541-248832578
                                                                                            • Opcode ID: 2e511239cf902b4be0fa85a9186cacf994c646f7119983275450efe520c1e332
                                                                                            • Instruction ID: a90604b3473346cec7176be4af0e9d5b396ce30d032ce87a5d4fff35c63484f9
                                                                                            • Opcode Fuzzy Hash: 2e511239cf902b4be0fa85a9186cacf994c646f7119983275450efe520c1e332
                                                                                            • Instruction Fuzzy Hash: 33C1CD35E01626DBCB34CF68E4C47AAB3B6FF44324F9806A9D8059B290DB31AD45CF90
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,74DF3100,?,00000000), ref: 02A10515
                                                                                            • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 02A1053C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: FolderPath
                                                                                            • String ID: \$y
                                                                                            • API String ID: 1514166925-1121330936
                                                                                            • Opcode ID: fb616eea5961752dc73580060be6982249eb8795dd858f6d81600ad2d7e37fb7
                                                                                            • Instruction ID: a5a5a28260cdc7fd1bbd2f98f8b8ba39b4cdcda6b13ac5be8e0b15eb39348429
                                                                                            • Opcode Fuzzy Hash: fb616eea5961752dc73580060be6982249eb8795dd858f6d81600ad2d7e37fb7
                                                                                            • Instruction Fuzzy Hash: 98626A74C44268DADF25EB60CD98BEDBB76AF11304F0440D9C44A27281EF752B89CFA6
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • GetModuleHandleA.KERNEL32(Ws2_32.dll,?,?,?,?,?,?,?,?,?,?,00000000,Function_001202E8,00000000), ref: 02A1E4B7
                                                                                            • GetProcAddress.KERNEL32(00000000,B1A0B388), ref: 02A1E4C2
                                                                                            • WSASend.WS2_32(00000010,?,00000001,00000000,00000000,00000000,00000000), ref: 02A1E4DB
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AddressHandleModuleProcSend
                                                                                            • String ID: Ws2_32.dll
                                                                                            • API String ID: 2819740048-3093949381
                                                                                            • Opcode ID: aff714b80c4900bb8e91a72efd057d4e97caaf85d4792813b759e2760545b63b
                                                                                            • Instruction ID: 565fd82dc4c1bcd00605b88968a033978075e766ef76563e75cc5ecb23222321
                                                                                            • Opcode Fuzzy Hash: aff714b80c4900bb8e91a72efd057d4e97caaf85d4792813b759e2760545b63b
                                                                                            • Instruction Fuzzy Hash: 6FE1A070600211CFEB29CF58C994B6DB7B2FF46724F24495DE8A69B3C1DB71A842CB85
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 02A9222F
                                                                                            • GetLastError.KERNEL32 ref: 02A9223A
                                                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 02A92262
                                                                                            • GetLastError.KERNEL32 ref: 02A9226C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorFileLast$PointerRead
                                                                                            • String ID:
                                                                                            • API String ID: 2170121939-0
                                                                                            • Opcode ID: 48180cf278dbd3afe5835de51a2fa4e3160d0977fdce91fa7abfb7ebf94b4c45
                                                                                            • Instruction ID: 436761a0690ad79e8ae8a01a70987276b6c4c1cd7288a27c622c913406e952aa
                                                                                            • Opcode Fuzzy Hash: 48180cf278dbd3afe5835de51a2fa4e3160d0977fdce91fa7abfb7ebf94b4c45
                                                                                            • Instruction Fuzzy Hash: A9116D3264010AABDB108FA9EC45B9AFBA8EB55360F008262FD1CC7190EB71D9618BD0
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Strings
                                                                                            • abcdefghijklmnopqrstuvwxyz0123456789_ABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 02A13B1B
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: abcdefghijklmnopqrstuvwxyz0123456789_ABCDEFGHIJKLMNOPQRSTUVWXYZ
                                                                                            • API String ID: 0-4024179465
                                                                                            • Opcode ID: b85b5ac96fabf0e6d6926a3d489bb19235fff0eb1d6982185614da722d95fb9b
                                                                                            • Instruction ID: 5fec3dd26d5dfd65c573d39882161056519e2e5006b6b6c2c0f044210398b078
                                                                                            • Opcode Fuzzy Hash: b85b5ac96fabf0e6d6926a3d489bb19235fff0eb1d6982185614da722d95fb9b
                                                                                            • Instruction Fuzzy Hash: 9FE19071E002089FDF08CFA8C984BAEBBB6FF49314F14869DD415AB281DB759A45CF90
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: AttributesErrorFileLastMtx_unlock
                                                                                            • String ID:
                                                                                            • API String ID: 441747541-0
                                                                                            • Opcode ID: bfef6b4572192a9e41d44e8efd7097ccc4c6b66c15f0fb88c063c96f8c430aa1
                                                                                            • Instruction ID: ae67fb0555bee49818e767beea27e984711599e25545eee867d20b35e66f9ae8
                                                                                            • Opcode Fuzzy Hash: bfef6b4572192a9e41d44e8efd7097ccc4c6b66c15f0fb88c063c96f8c430aa1
                                                                                            • Instruction Fuzzy Hash: ECF028719C03000A593817F438D4ABA772A895377CF580661EA0A8A7C6FF03CA028991
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 02A921D4
                                                                                            • Sleep.KERNEL32(00000064), ref: 02A921E8
                                                                                            • CloseHandle.KERNEL32(?), ref: 02A921F1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Close$ChangeFindHandleNotificationSleep
                                                                                            • String ID:
                                                                                            • API String ID: 4133708355-0
                                                                                            • Opcode ID: 264c8de47d722b0cc070d3963058a1650f035fff6fb29ad1054f82afa704941b
                                                                                            • Instruction ID: c445ccbecf5e2b381aa7e9a1e5d0a88c43ce600a89147e562a8ac8aac821fb43
                                                                                            • Opcode Fuzzy Hash: 264c8de47d722b0cc070d3963058a1650f035fff6fb29ad1054f82afa704941b
                                                                                            • Instruction Fuzzy Hash: D2E09B32540A17BBDA1157BADCC1B96F7D9EF051B4F104220EE2C86090DF21D43685A4
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • DeleteFileW.KERNELBASE(02AE7811,?,02AE7811,?,?,?,00000000), ref: 02AF6191
                                                                                            • GetLastError.KERNEL32(?,02AE7811,?,?,?,00000000), ref: 02AF619B
                                                                                            • __dosmaperr.LIBCMT ref: 02AF61A2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: DeleteErrorFileLast__dosmaperr
                                                                                            • String ID:
                                                                                            • API String ID: 1545401867-0
                                                                                            • Opcode ID: d8f0c57e0e14dfbdf2a19ecf80e42f2fdfdb44255eff59344c2180a5ef56f665
                                                                                            • Instruction ID: eacd0f91b83629c5065c89526d7e8d56c8fef62390fde9b91e8691f9c9bd9930
                                                                                            • Opcode Fuzzy Hash: d8f0c57e0e14dfbdf2a19ecf80e42f2fdfdb44255eff59344c2180a5ef56f665
                                                                                            • Instruction Fuzzy Hash: 1FD0C932984509679E112EF5A9489167B5DEA846B43200A21F52DC61D0EE35C8629554
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: __fread_nolock
                                                                                            • String ID:
                                                                                            • API String ID: 2638373210-0
                                                                                            • Opcode ID: 9697adb7546b05a3c94f5a24a14b448b632f27652fccbdcd1a0461ba6f7bc3c3
                                                                                            • Instruction ID: a915de720be68c6873e0f0dd8bd6807416d7755e80e0ca4ce6c270d90a32da90
                                                                                            • Opcode Fuzzy Hash: 9697adb7546b05a3c94f5a24a14b448b632f27652fccbdcd1a0461ba6f7bc3c3
                                                                                            • Instruction Fuzzy Hash: 306136766146069FC714CF2DD888A6AF7A1FF88728F048629F869C7750DB70EC54CB91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 02A053DB
                                                                                            • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 02A053F6
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                                                                            • String ID:
                                                                                            • API String ID: 3016148460-0
                                                                                            • Opcode ID: f3815a8e5864301d134d156fdeda070d38c483a5221123fdb2e16d5b41cf1745
                                                                                            • Instruction ID: 1b01f4144ca6df39c302ec1342fa57e2f848aeb44c54eb91b269633a649c0e47
                                                                                            • Opcode Fuzzy Hash: f3815a8e5864301d134d156fdeda070d38c483a5221123fdb2e16d5b41cf1745
                                                                                            • Instruction Fuzzy Hash: BC318132E402049BCF24DF58E9C07EDB7B6FB48721F54056AD909B3680EB756901CFA5
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,02AF341A,00000000,CF830579,02B2F030,0000000C,02AF34D6,02AE75DD,?), ref: 02AF3589
                                                                                            • GetLastError.KERNEL32(?,02AF341A,00000000,CF830579,02B2F030,0000000C,02AF34D6,02AE75DD,?), ref: 02AF3593
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ChangeCloseErrorFindLastNotification
                                                                                            • String ID:
                                                                                            • API String ID: 1687624791-0
                                                                                            • Opcode ID: 5c8a30ef8d90248de1c8f16be726222700e5ef608c20d5d42ef7443cae2efb07
                                                                                            • Instruction ID: ca2f9bd158543fe6a90d11a0670ded00798b4409b7e72272a350abef79ec6cbf
                                                                                            • Opcode Fuzzy Hash: 5c8a30ef8d90248de1c8f16be726222700e5ef608c20d5d42ef7443cae2efb07
                                                                                            • Instruction Fuzzy Hash: 0D11AF33A481506EDFB563F8A9C4B3E6746CBC1778F140598FB08C71C0DF68C5418260
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00000065), ref: 02A1F833
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID: 120
                                                                                            • API String ID: 3472027048-289485416
                                                                                            • Opcode ID: 2c9d08b1e15f47edf35d6c74394fa3c7f3f1f9c9d865a75147c6fd3d134a4554
                                                                                            • Instruction ID: 775d5b72858ef4e825bb3baf81fed029b2c4e6360a53897ca02578b214ab34ac
                                                                                            • Opcode Fuzzy Hash: 2c9d08b1e15f47edf35d6c74394fa3c7f3f1f9c9d865a75147c6fd3d134a4554
                                                                                            • Instruction Fuzzy Hash: 14F02711FC43801BF635B26C2C0672D3B598389764F540485DD041B2C1DEA1186BC3E6
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00000065,?,?,?,?,?,?,?,?,?,?,?,?,74D723A0), ref: 02A1F7C3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID: 120
                                                                                            • API String ID: 3472027048-289485416
                                                                                            • Opcode ID: 0822df8966b6a762eb847cfba324289526a8475551fa61b09a85895c1d626368
                                                                                            • Instruction ID: 3f2fd9a6f16aac6590e3c851327126a0e3b1dd22f13936f4271c4f72253ff0a1
                                                                                            • Opcode Fuzzy Hash: 0822df8966b6a762eb847cfba324289526a8475551fa61b09a85895c1d626368
                                                                                            • Instruction Fuzzy Hash: 9AF02711E803915AF631F26C3C46B2E3F698749BA4F640886D9045B2C1DFA1186A83E2
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • CreateDirectoryA.KERNELBASE(?,00000000,00000000), ref: 02A0A686
                                                                                            • __Mtx_unlock.LIBCPMT ref: 02A0A693
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateDirectoryMtx_unlock
                                                                                            • String ID:
                                                                                            • API String ID: 3577089425-0
                                                                                            • Opcode ID: c72f52461c737f8a356555033c8ac2fdf995e226415c902edeabdbb5e6161ccd
                                                                                            • Instruction ID: 303b77e0d8af80e500373f36799987142b0d422d01b77f60c58a2cddd74c45ff
                                                                                            • Opcode Fuzzy Hash: c72f52461c737f8a356555033c8ac2fdf995e226415c902edeabdbb5e6161ccd
                                                                                            • Instruction Fuzzy Hash: 76D05EE2EC022023A56522B12D09A87251D4E545717894461F90AE2218FD18CD004BD1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • RtlFreeHeap.NTDLL(00000000,00000000,?,02AFD6C9,02AE73E3,00000000,02AE73E3,?,02AFD96A,02AE73E3,00000007,02AE73E3,?,02AFDE5E,02AE73E3,02AE73E3), ref: 02AF57E9
                                                                                            • GetLastError.KERNEL32(02AE73E3,?,02AFD6C9,02AE73E3,00000000,02AE73E3,?,02AFD96A,02AE73E3,00000007,02AE73E3,?,02AFDE5E,02AE73E3,02AE73E3), ref: 02AF57F4
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 485612231-0
                                                                                            • Opcode ID: 724553144108c423ac4b4e5f3cb38b2360d31da52929754d05dbc5bf054c8142
                                                                                            • Instruction ID: 002de22c0bc251e08b39ca0f564142b2b39054e5423ea8255159ac1768152d52
                                                                                            • Opcode Fuzzy Hash: 724553144108c423ac4b4e5f3cb38b2360d31da52929754d05dbc5bf054c8142
                                                                                            • Instruction Fuzzy Hash: 09E08631940205A7CB222FE0E94CF493B99EB44796F500820F70D9B0A1DF34C4528BD4
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                              • Part of subcall function 02A09EB0: __fread_nolock.LIBCMT ref: 02A09F90
                                                                                            • std::locale::_Init.LIBCPMT ref: 02A317AB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Init__fread_nolockstd::locale::_
                                                                                            • String ID:
                                                                                            • API String ID: 221842284-0
                                                                                            • Opcode ID: 75798409619249f8ab09100dcd4052e4db0793921c6c78cdd54c7ec1ba58103c
                                                                                            • Instruction ID: d3739d1cd851836e92541a337b004523b2ec70a0776bfa1d2db1313c5186d6ab
                                                                                            • Opcode Fuzzy Hash: 75798409619249f8ab09100dcd4052e4db0793921c6c78cdd54c7ec1ba58103c
                                                                                            • Instruction Fuzzy Hash: D122D271D002188FDB19DF68CD887EEBBB2AF45304F14829DE449AB781DB749A85CF91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c44682ff43840d9a146f3ea99c1481a13f820b9108829b8f2e5b3dc312372adb
                                                                                            • Instruction ID: 3eea2f859e311db263ba5ad5ee29cc7fc3ff6fbd8c29107d52e283f6234c6bbd
                                                                                            • Opcode Fuzzy Hash: c44682ff43840d9a146f3ea99c1481a13f820b9108829b8f2e5b3dc312372adb
                                                                                            • Instruction Fuzzy Hash: A0F158B06107418FDB60CF6ACC80B67F7E5AF88308F04496DE59ACB651EBB5E944CB61
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a88f68fb8ac377039f0517274018d89798d4b73b2f72865791a97165a0155798
                                                                                            • Instruction ID: b8412dc6df44a5f675ceb8ab21c97827dbb7cec86737f83c898f61d72e911196
                                                                                            • Opcode Fuzzy Hash: a88f68fb8ac377039f0517274018d89798d4b73b2f72865791a97165a0155798
                                                                                            • Instruction Fuzzy Hash: EF518570A00144AFDF15CF59C985EBD7BB2EF89364F188199E80A9B351DB719E42CB90
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: __fread_nolock
                                                                                            • String ID:
                                                                                            • API String ID: 2638373210-0
                                                                                            • Opcode ID: 2094b9842311838ccc39f966313a09eff140e9f67b4f95f737a35cd81ebd5c76
                                                                                            • Instruction ID: f80fa20444b6324e722e3ee10fb65908ffe3a49a90b80c684dc81284c21e3667
                                                                                            • Opcode Fuzzy Hash: 2094b9842311838ccc39f966313a09eff140e9f67b4f95f737a35cd81ebd5c76
                                                                                            • Instruction Fuzzy Hash: 734137B09003009FEB14DF68DD84B6EFBA5EF09704F20856DE5169B2D1DBB59941CBA1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 02A69276
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                            • String ID:
                                                                                            • API String ID: 118556049-0
                                                                                            • Opcode ID: 15e9204b5d4e751155b8beb7b1dff8f6fc0b73f5d88a3b1e01f69e4507e6232e
                                                                                            • Instruction ID: 87362ede2ad952ca03422e4892ec0d85afe59d90fb7ffffd9d4c62d84c0575a8
                                                                                            • Opcode Fuzzy Hash: 15e9204b5d4e751155b8beb7b1dff8f6fc0b73f5d88a3b1e01f69e4507e6232e
                                                                                            • Instruction Fuzzy Hash: A531A6B1A00202AFDB04DF35D888A7AF7A5FF45314F14467AE81ACB691EF31D954CB91
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 02A02BAA
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: Concurrency::cancel_current_task
                                                                                            • String ID:
                                                                                            • API String ID: 118556049-0
                                                                                            • Opcode ID: 8ebdc5d12f10c40644fd85f9aa08fd57ac7d3ff6eaed1630c01504853623d5de
                                                                                            • Instruction ID: f0500642bf445868ab728eee3f83a04877dcb39f0ca46f10ef5fbec7d425431e
                                                                                            • Opcode Fuzzy Hash: 8ebdc5d12f10c40644fd85f9aa08fd57ac7d3ff6eaed1630c01504853623d5de
                                                                                            • Instruction Fuzzy Hash: 99215B729003009FDB149F35E8C8B6B7BA99F86324F15027AED2A8B2D2DF31C914C791
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: __wsopen_s
                                                                                            • String ID:
                                                                                            • API String ID: 3347428461-0
                                                                                            • Opcode ID: 629ed2935e0cb49ae3c684801af4d6bd6558df5a086841812956461f62a9d3e9
                                                                                            • Instruction ID: 49754d437d5012a6ec859de5534e94343c81e23804e37a2f4ad1c45103438a22
                                                                                            • Opcode Fuzzy Hash: 629ed2935e0cb49ae3c684801af4d6bd6558df5a086841812956461f62a9d3e9
                                                                                            • Instruction Fuzzy Hash: D2111871A0410AAFCF05DF98E94099E7BF5EF48304F054059F909AB251DA34D911CB64
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%

                                                                                            APIs
                                                                                            • SetupDiGetClassDevsA.SETUPAPI(02B0D540,00000000,00000000,00000012), ref: 02A0B277
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000002.00000002.4067758538.0000000002A00000.00000040.00000400.00020000.00000000.sdmp, Offset: 02A00000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_2_2_2a00000_BitLockerToGo.jbxd
                                                                                            Similarity
                                                                                            • API ID: ClassDevsSetup
                                                                                            • String ID:
                                                                                            • API String ID: 2330331845-0
                                                                                            • Opcode ID: 3eab0928f73dac8c4af1e96d3385b98488fb3e7759d076c8f553d9b4b8b7ae94
                                                                                            • Instruction ID: acb662b0970f9c6a98ce70e91d210082a70957426876a7612930208d933a3cbc
                                                                                            • Opcode Fuzzy Hash: 3eab0928f73dac8c4af1e96d3385b98488fb3e7759d076c8f553d9b4b8b7ae94
                                                                                            • Instruction Fuzzy Hash: E4F090B0A407145FD360DF6C6901756BBE4DB08724F108A6EE59DC36C1E7B0991487C1
                                                                                            Uniqueness

                                                                                            Uniqueness Score: -1.00%