Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order For Linear Actuator.exe

Overview

General Information

Sample name:Purchase Order For Linear Actuator.exe
Analysis ID:1539654
MD5:d976a78b2d4808b87477685a86d5a876
SHA1:050837857db80be506f890bb82dfb4809436aff2
SHA256:ced54118236fb8dc881c3bd56f115cd557718c17cc585e859a725ccb4f3e6e60
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Disables UAC (registry)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order For Linear Actuator.exe (PID: 2276 cmdline: "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" MD5: D976A78B2D4808B87477685A86D5A876)
    • powershell.exe (PID: 6008 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 3648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • InstallUtil.exe (PID: 1132 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
    • WerFault.exe (PID: 5676 cmdline: C:\Windows\system32\WerFault.exe -u -p 2276 -s 1256 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "mail@iaa-airferight.com", "Password": "Asaprocky11"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4594266186.00000000031BC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316f7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31769:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317f3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31885:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318ef:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31961:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319f7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a87:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe", ParentImage: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe, ParentProcessId: 2276, ParentProcessName: Purchase Order For Linear Actuator.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, ProcessId: 6008, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe", ParentImage: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe, ParentProcessId: 2276, ParentProcessName: Purchase Order For Linear Actuator.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, ProcessId: 6008, ProcessName: powershell.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, Initiated: true, ProcessId: 1132, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49713
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe", ParentImage: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe, ParentProcessId: 2276, ParentProcessName: Purchase Order For Linear Actuator.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force, ProcessId: 6008, ProcessName: powershell.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Purchase Order For Linear Actuator.exeAvira: detected
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "mail@iaa-airferight.com", "Password": "Asaprocky11"}
                    Source: Purchase Order For Linear Actuator.exeReversingLabs: Detection: 50%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: Purchase Order For Linear Actuator.exeJoe Sandbox ML: detected

                    Exploits

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order For Linear Actuator.exe PID: 2276, type: MEMORYSTR
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49710 version: TLS 1.2
                    Source: Purchase Order For Linear Actuator.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb* source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB@^ source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbr\Ap`Rv a source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\mscorlib.pdb' source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb6R source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.pdbhT source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.pdb0 source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbd@ source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdbPV source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4C70000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbs source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: .pdbHJ source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191495229.00000250CAA3C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: pC:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp, WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbphic Provider source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Management.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Management.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe1629843\objr\x86\Microsoft.VisualBasic.pdb" source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbP source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191495229.00000250CAA90000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Management.pdbH source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdbard.}^!# source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4C70000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewASN Name: ASLAGIDKOM-NETUA ASLAGIDKOM-NETUA
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.6:49713 -> 46.175.148.58:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                    Source: InstallUtil.exe, 00000004.00000002.4594266186.00000000031BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                    Source: InstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: InstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: InstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49710 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, abAX9N.cs.Net Code: BFeixnEv
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.raw.unpack, abAX9N.cs.Net Code: BFeixnEv
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: Purchase Order For Linear Actuator.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344335F00_2_00007FFD344335F0
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344337400_2_00007FFD34433740
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34437EE80_2_00007FFD34437EE8
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344327180_2_00007FFD34432718
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3443A8580_2_00007FFD3443A858
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3443B0110_2_00007FFD3443B011
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344379600_2_00007FFD34437960
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34443B5C0_2_00007FFD34443B5C
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3443DB990_2_00007FFD3443DB99
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3443AC300_2_00007FFD3443AC30
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34430BE90_2_00007FFD34430BE9
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34431CC00_2_00007FFD34431CC0
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3443169D0_2_00007FFD3443169D
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34438EA90_2_00007FFD34438EA9
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344360C50_2_00007FFD344360C5
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344382600_2_00007FFD34438260
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34439A9C0_2_00007FFD34439A9C
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34443BA90_2_00007FFD34443BA9
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344393DC0_2_00007FFD344393DC
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344434390_2_00007FFD34443439
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD345011DB0_2_00007FFD345011DB
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3450026B0_2_00007FFD3450026B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_02F64A984_2_02F64A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_02F6A9684_2_02F6A968
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_02F63E804_2_02F63E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_02F641C84_2_02F641C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_02F6F8A54_2_02F6F8A5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05C4E0C84_2_05C4E0C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05C445A04_2_05C445A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05C43D704_2_05C43D70
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05C435784_2_05C43578
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05C456504_2_05C45650
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05C40AB84_2_05C40AB8
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2276 -s 1256
                    Source: Purchase Order For Linear Actuator.exeStatic PE information: No import functions for PE file found
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000000.2122514681.00000250CA732000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNewcastle.exe4 vs Purchase Order For Linear Actuator.exe
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191790746.00000250CAB20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUmofumoqeD vs Purchase Order For Linear Actuator.exe
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs Purchase Order For Linear Actuator.exe
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2192633166.00000250DC367000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUmofumoqeD vs Purchase Order For Linear Actuator.exe
                    Source: Purchase Order For Linear Actuator.exeBinary or memory string: OriginalFilenameNewcastle.exe4 vs Purchase Order For Linear Actuator.exe
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, RsYAkkzVoy.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, Kqqzixk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, xROdzGigX.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, ywes.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, iPVW0zV.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, 1Pi9sgbHwoV.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191495229.00000250CAA3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@7/10@2/2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3648:120:WilError_03
                    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2276
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnibpavs.41c.ps1Jump to behavior
                    Source: Purchase Order For Linear Actuator.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Purchase Order For Linear Actuator.exeReversingLabs: Detection: 50%
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeFile read: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe"
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2276 -s 1256
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Purchase Order For Linear Actuator.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Purchase Order For Linear Actuator.exeStatic file information: File size 3677748 > 1048576
                    Source: Purchase Order For Linear Actuator.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb* source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB@^ source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbr\Ap`Rv a source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\mscorlib.pdb' source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.VisualBasic.pdb6R source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.pdbhT source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Windows.Forms.pdb0 source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: mscorlib.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\mscorlib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdbd@ source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdbPV source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4C70000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbs source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4D03000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: .pdbHJ source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191495229.00000250CAA3C000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: pC:\Users\user\Desktop\Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdb source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp, WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdbphic Provider source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Management.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Drawing.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Management.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: Purchase Order For Linear Actuator.PDB source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191056508.000000BA60EF3000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe1629843\objr\x86\Microsoft.VisualBasic.pdb" source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4CE2000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbP source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191495229.00000250CAA90000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Management.pdbH source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdbard.}^!# source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2193967139.00000250E4C70000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WER86B7.tmp.dmp.7.dr
                    Source: Binary string: System.Core.ni.pdbRSDS source: WER86B7.tmp.dmp.7.dr
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD34437195 push edx; retf 0_2_00007FFD344372FB
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD344300BD pushad ; iretd 0_2_00007FFD344300C1
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeCode function: 0_2_00007FFD3450026B push esp; retf 4810h0_2_00007FFD34500312
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_02F60C45 push ebx; retf 4_2_02F60C52

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (31).png
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Purchase Order For Linear Actuator.exe PID: 2276, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeWMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmp, Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLP
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory allocated: 250CA9B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory allocated: 250E4360000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2F90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmmouse.sysJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\disk\Enum name: 0Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeFile opened / queried: C:\WINDOWS\system32\drivers\vmhgfs.sysJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeFile opened / queried: C:\WINDOWS\system32\drivers\VBoxMouse.sysJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7118Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2415Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3509Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 6349Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1408Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep count: 35 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -32281802128991695s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6548Thread sleep count: 3509 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99840s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99718s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99609s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99500s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6548Thread sleep count: 6349 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99390s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99281s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99170s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -99058s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98953s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98844s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98625s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98515s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98402s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98296s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98186s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -98078s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97968s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97857s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97746s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97641s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97531s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97422s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97313s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97203s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -97094s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96984s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96875s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96766s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96656s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96547s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96437s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96328s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96219s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96109s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -96000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95890s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95781s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95672s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95562s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95453s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95343s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95234s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95125s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -95016s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -94906s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -94797s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -94687s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5764Thread sleep time: -94578s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99840Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99170Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 99058Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98402Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98296Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98186Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 98078Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97857Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97746Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97641Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97422Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97313Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 97094Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96875Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96766Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96547Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96219Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 96000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95672Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95125Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 95016Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94797Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 94578Jump to behavior
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMUP
                    Source: Amcache.hve.7.drBinary or memory string: VMware
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware ToolsP
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sysP
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREP
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREPYN4
                    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareP
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sysP
                    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\P
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIP
                    Source: InstallUtil.exe, 00000004.00000002.4596639023.0000000006440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sysP
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Purchase Order For Linear Actuator.exe, 00000000.00000002.2191912651.00000250CC3A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Purchase Order For Linear Actuator.exe, ------------.csReference to suspicious API methods: GetProcAddress(_06E7, _FDFC)
                    Source: Purchase Order For Linear Actuator.exe, ------------.csReference to suspicious API methods: VirtualProtect(procAddress, (UIntPtr)(ulong)_FBB3_06D4.Length, 64u, out var __0606_FBB6_FDE3_FD44_06ED_FDFE_FDE6)
                    Source: Purchase Order For Linear Actuator.exe, ------------.csReference to suspicious API methods: LoadLibrary(_FBCC(0, ))
                    Source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, DWQSVyCYV.csReference to suspicious API methods: uJn9vmw.OpenProcess(_9bBuo4xIRNG.DuplicateHandle, bInheritHandle: true, (uint)lKyMoD2.ProcessID)
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: E1E008Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -ForceJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeQueries volume information: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Users\user\Desktop\Purchase Order For Linear Actuator.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior
                    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.4594266186.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.4594266186.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order For Linear Actuator.exe PID: 2276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1132, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.4594266186.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order For Linear Actuator.exe PID: 2276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1132, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc761f8.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order For Linear Actuator.exe.250ddc3b7b0.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.4594266186.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.4594266186.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order For Linear Actuator.exe PID: 2276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 1132, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    21
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    Boot or Logon Initialization Scripts211
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    341
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model21
                    Input Capture
                    23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Masquerading
                    LSA Secrets261
                    Virtualization/Sandbox Evasion
                    SSH1
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts261
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
                    Process Injection
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1539654 Sample: Purchase Order For Linear A... Startdate: 22/10/2024 Architecture: WINDOWS Score: 100 21 mail.iaa-airferight.com 2->21 23 api.ipify.org 2->23 29 Found malware configuration 2->29 31 Malicious sample detected (through community Yara rule) 2->31 33 Antivirus / Scanner detection for submitted sample 2->33 35 13 other signatures 2->35 8 Purchase Order For Linear Actuator.exe 1 3 2->8         started        signatures3 process4 signatures5 37 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->37 39 Writes to foreign memory regions 8->39 41 Adds a directory exclusion to Windows Defender 8->41 43 2 other signatures 8->43 11 InstallUtil.exe 15 2 8->11         started        15 powershell.exe 23 8->15         started        17 WerFault.exe 22 16 8->17         started        process6 dnsIp7 25 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 11->25 27 api.ipify.org 104.26.13.205, 443, 49710 CLOUDFLARENETUS United States 11->27 45 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->45 47 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->47 49 Tries to steal Mail credentials (via file / registry access) 11->49 53 3 other signatures 11->53 51 Loading BitLocker PowerShell Module 15->51 19 conhost.exe 15->19         started        signatures8 process9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Purchase Order For Linear Actuator.exe50%ReversingLabsByteCode-MSIL.Trojan.AntiSandbox
                    Purchase Order For Linear Actuator.exe100%AviraTR/AD.GenSteal.giydu
                    Purchase Order For Linear Actuator.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    http://upx.sf.net0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.iaa-airferight.com
                    46.175.148.58
                    truetrue
                      unknown
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.ipify.orgPurchase Order For Linear Actuator.exe, 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://upx.sf.netAmcache.hve.7.drfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/Purchase Order For Linear Actuator.exe, 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org/tInstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInstallUtil.exe, 00000004.00000002.4594266186.0000000003141000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.iaa-airferight.comInstallUtil.exe, 00000004.00000002.4594266186.00000000031BC000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          46.175.148.58
                          mail.iaa-airferight.comUkraine
                          56394ASLAGIDKOM-NETUAtrue
                          104.26.13.205
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1539654
                          Start date and time:2024-10-22 23:54:06 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 58s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:11
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Purchase Order For Linear Actuator.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.expl.evad.winEXE@7/10@2/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 86%
                          • Number of executed functions: 71
                          • Number of non-executed functions: 7
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.189.173.20
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Report size getting too big, too many NtSetInformationFile calls found.
                          • VT rate limit hit for: Purchase Order For Linear Actuator.exe
                          TimeTypeDescription
                          17:55:00API Interceptor19x Sleep call for process: powershell.exe modified
                          17:55:02API Interceptor12463193x Sleep call for process: InstallUtil.exe modified
                          17:55:04API Interceptor1x Sleep call for process: WerFault.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          46.175.148.58PO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                            New PO-Auras Demand.exeGet hashmaliciousAgentTeslaBrowse
                              SecuriteInfo.com.BackDoor.AgentTeslaNET.37.28277.26776.exeGet hashmaliciousAgentTeslaBrowse
                                New Purchase Order 568330.exeGet hashmaliciousAgentTeslaBrowse
                                  SecuriteInfo.com.Win32.PWSX-gen.20380.30925.exeGet hashmaliciousAgentTeslaBrowse
                                    rrpC2ZDgUd.exeGet hashmaliciousAgentTeslaBrowse
                                      92ZZIUHzPQ.exeGet hashmaliciousAgentTeslaBrowse
                                        BNF5Z6GuGw.exeGet hashmaliciousAgentTeslaBrowse
                                          cvRkgDx2mc.exeGet hashmaliciousAgentTeslaBrowse
                                            Iw7mPc6fCG.exeGet hashmaliciousAgentTeslaBrowse
                                              104.26.13.205file.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                                              • api.ipify.org/
                                              Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousUnknownBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                              • api.ipify.org/
                                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                              • api.ipify.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              mail.iaa-airferight.comPO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 46.175.148.58
                                              New PO-Auras Demand.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              SecuriteInfo.com.BackDoor.AgentTeslaNET.37.28277.26776.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              New Purchase Order 568330.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              SecuriteInfo.com.Win32.PWSX-gen.20380.30925.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              rrpC2ZDgUd.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              92ZZIUHzPQ.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              BNF5Z6GuGw.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              cvRkgDx2mc.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              Iw7mPc6fCG.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              api.ipify.orgPlay_VoiceMsg_mchee@eq3.com_{RANDOM_NUMBER5}CQDM.htmlGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                              • 104.26.13.205
                                              SecuriteInfo.com.Python.Stealer.1251.9496.6786.exeGet hashmaliciousPython Stealer, BLX Stealer, XLABB GrabberBrowse
                                              • 104.26.12.205
                                              SecuriteInfo.com.Python.Stealer.1251.9496.6786.exeGet hashmaliciousPython Stealer, BLX Stealer, XLABB GrabberBrowse
                                              • 172.67.74.152
                                              MlGBT3hUEG.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              FZCO - PO#12345.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              Ref#150689.vbeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              PO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 104.26.13.205
                                              PO 0039499059996600 dtated 10222024.exeGet hashmaliciousAgentTeslaBrowse
                                              • 104.26.13.205
                                              DHL.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                              • 172.67.74.152
                                              Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                              • 104.26.13.205
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ASLAGIDKOM-NETUAPO FOR CONNECTOR WITH TERMINAL.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 46.175.148.58
                                              New PO-Auras Demand.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              SecuriteInfo.com.BackDoor.AgentTeslaNET.37.28277.26776.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              New Purchase Order 568330.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              SecuriteInfo.com.Win32.PWSX-gen.20380.30925.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              rrpC2ZDgUd.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              92ZZIUHzPQ.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              BNF5Z6GuGw.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              cvRkgDx2mc.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              Iw7mPc6fCG.exeGet hashmaliciousAgentTeslaBrowse
                                              • 46.175.148.58
                                              CLOUDFLARENETUSPlay_VoiceMsg_mchee@eq3.com_{RANDOM_NUMBER5}CQDM.htmlGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                                              • 104.26.13.205
                                              SecuriteInfo.com.Python.Stealer.1251.9496.6786.exeGet hashmaliciousPython Stealer, BLX Stealer, XLABB GrabberBrowse
                                              • 104.26.12.205
                                              SecuriteInfo.com.Python.Stealer.1251.9496.6786.exeGet hashmaliciousPython Stealer, BLX Stealer, XLABB GrabberBrowse
                                              • 172.67.74.152
                                              Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                              • 188.114.96.3
                                              Iccusa_Receipt.zipGet hashmaliciousUnknownBrowse
                                              • 188.114.96.3
                                              FINAL SETTLEMENT DOCUMENT_ LIEN WAVER DURATION- 57185f7898fa8b51ebd3deed1492e65365186c19.emlGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              https://humorous-tiger-mdjc51.mystrikingly.com/shareGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              https://email.email.pandadoc.net/c/eJxUkMtu2zoQhp9G3NkQhxQlLbRIjo8QpKjRS5qi3QTD4TCmZYuyRNm1nr4w0PSyGwzmG3z_7xprlPWVcJHmI_fpJbjmguOnLn78cm0vTw-4fw8_dttdENzIEmoji9oYsWsAtST2VKmiVOSoJqdyVNYa9pUnKUIDOWiZA0hTgDZrUNoXnphIopaly3TORwyH9YC9Qxdp3XMSYXpJIxKjPXCTxpnFodmlNEyZusugzaDFYfiDUDxm0L7pZ9CeIVNtih33mdpIlF4hGzaGIM8ta2mV83UNlbFYlJCbQhsoM9WKPqbgA2EKsb_VACXX1jKtlM9hpQHcqiKvVsZXuvB16WTBIo6v2IflN7T_8Ly_7-p6G_bz4wbM8n1Sp6MYG7ePPU-Zzu186Pg0H4abuhj5HKZfrF4mPLvT5vndMpR0h183E0MpUvOW7q9xlXB85X820-3i3IC4xLGbBiS-Pf3v-o2eUuge_l-21bG_2vt-fvz8MwAA__9XraZ6Get hashmaliciousUnknownBrowse
                                              • 104.18.86.42
                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                              • 104.21.53.8
                                              https://u47466077.ct.sendgrid.net/ls/click?upn=u001.UMdxVMkb1VX-2BSXmtpMtK82JjAEsu0ALWxL56w0aqjY7gO2PQAp-2BHlpc2oHbxXqj96ytu9xZ3C-2Fcc7TYscckKittsHzuWk7oZ3yaOKtJMNc8-3DRsvZ_dbL1OaRcFhqC5DXhStX0pOfbUZAVayn7H9CSqXbkr4AEsrYhI8sxSoDstGnKE3nSaek5kwmHaFG3atrVJND0eFScLCv5QNKy0pTk284nu-2BxN1xL46pFdl1yW-2FGBCKHiHI0gjIrdVFOC2h7jkJO2cxfog84YKROP-2B-2BdA0OdnQh5hGxm6YRf05P7iW5UMx11N0ueP-2F2UiL6g2UC0lWPIMYJ182aZQJ-2Fm9GZ4c44stqB0DO8b-2FrPustgC-2Bh1gTE6-2FFNjzbLBZ0hYrZFIWaYHhsZOERflLIIJfjns6vznBL04sQ8kMuJWeeDmdiHffjbA78LTMXrOOTBnUAoQcgbX3o0ZtWjUtGmNb9u0iM25SXUz96JzBOXLTGWbmLHm73izq-2Bzm3dZ9Kvjve6nPZ60tYFPWo2cWQphx7VgLLG3ll4SLBhG0ZcCfFkVwc-2FaGk1f1iuKH-2B72D6eiAuGg1eCU6ru5F8i98Fg5H2jc-2FMmRZrSbwbeiZq6a-2BFuZLyQ0fAg94tZM61XKFFZZXXADlVrgbk2MpZ005zWxPadL7TkllIWWdASBZrc-2Fl67KTNAHqzHJQHKksVxPkpV-2FmYSLF6l3YkJ3VquJDXkKuGuNb9N0We4mGIxkvHU8m0L-2F5Q9xYL2gkjk6O3RjflxLNK0tJUOq6NRS1wUVMB0YNfkTFKZVNcjX8SF-2FJKqRMROsF93K-2BKBpcamWaR-2FMXpesIJiR1UxONob5nT0UhpWXavZ-2BD8eS6npJr3AFISjiypSnZtPUcbtuXDo-2BMWjE8H-2FZDFwMVLf9J0psBAe-2FndX9LVBZzEVTuz4yTF6SNg9wztt9z8C-2FgjqLM92b3dYtqP4rqn3iuwDWxbETM3Pdy5CqS9ymWqJJBtBJW7b7HkFr-2BjPkTcrmOtesM-2FiwGet hashmaliciousHTMLPhisherBrowse
                                              • 104.18.11.207
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              3b5074b1b5d032e5620f69f9f700ff0ehttps://www.figma.com/proto/9VPPM7CSCzCr9R0IyrbHb3/Continue-to-document?node-id=1-2&node-type=frame&t=TLXLjdBW9vQs7So6-1&scaling=min-zoom&content-scaling=fixed&page-id=0%3A1&starting-point-node-id=1%3A2&share=1Get hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              NEW ORDER QUOTATION REQUEST.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 104.26.13.205
                                              https://email.email.pandadoc.net/c/eJxUkMtu2zoQhp9G3NkQhxQlLbRIjo8QpKjRS5qi3QTD4TCmZYuyRNm1nr4w0PSyGwzmG3z_7xprlPWVcJHmI_fpJbjmguOnLn78cm0vTw-4fw8_dttdENzIEmoji9oYsWsAtST2VKmiVOSoJqdyVNYa9pUnKUIDOWiZA0hTgDZrUNoXnphIopaly3TORwyH9YC9Qxdp3XMSYXpJIxKjPXCTxpnFodmlNEyZusugzaDFYfiDUDxm0L7pZ9CeIVNtih33mdpIlF4hGzaGIM8ta2mV83UNlbFYlJCbQhsoM9WKPqbgA2EKsb_VACXX1jKtlM9hpQHcqiKvVsZXuvB16WTBIo6v2IflN7T_8Ly_7-p6G_bz4wbM8n1Sp6MYG7ePPU-Zzu186Pg0H4abuhj5HKZfrF4mPLvT5vndMpR0h183E0MpUvOW7q9xlXB85X820-3i3IC4xLGbBiS-Pf3v-o2eUuge_l-21bG_2vt-fvz8MwAA__9XraZ6Get hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              Q110450 SV51179-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 104.26.13.205
                                              https://t.ly/HTVUPGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                              • 104.26.13.205
                                              https://email.email.pandadoc.net/c/eJxUkMtu2zoQhp9G3NkQhxQlLbRIjo8QpKjRS5qi3QTD4TCmZYuyRNm1nr4w0PSyGwzmG3z_7xprlPWVcJHmI_fpJbjmguOnLn78cm0vTw-4fw8_dttdENzIEmoji9oYsWsAtST2VKmiVOSoJqdyVNYa9pUnKUIDOWiZA0hTgDZrUNoXnphIopaly3TORwyH9YC9Qxdp3XMSYXpJIxKjPXCTxpnFodmlNEyZusugzaDFYfiDUDxm0L7pZ9CeIVNtih33mdpIlF4hGzaGIM8ta2mV83UNlbFYlJCbQhsoM9WKPqbgA2EKsb_VACXX1jKtlM9hpQHcqiKvVsZXuvB16WTBIo6v2IflN7T_8Ly_7-p6G_bz4wbM8n1Sp6MYG7ePPU-Zzu186Pg0H4abuhj5HKZfrF4mPLvT5vndMpR0h183E0MpUvOW7q9xlXB85X820-3i3IC4xLGbBiS-Pf3v-o2eUuge_l-21bG_2vt-fvz8MwAA__9XraZ6Get hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              MlGBT3hUEG.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              cgqdM4IA7C.exeGet hashmaliciousXWormBrowse
                                              • 104.26.13.205
                                              NxR7UQaeKe.exeGet hashmaliciousXWormBrowse
                                              • 104.26.13.205
                                              https://www.instagram.com/reel/DBWVgoCoDqq/?igsh=aXdnZTl2NGIwdXN5Get hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              No context
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.2657491510900574
                                              Encrypted:false
                                              SSDEEP:192:vuj1nAsW2i0v5zXa+B2ptv4oWIzuiFYZ24lO83d:oCsvv5zXae2pd/zuiFYY4lO83d
                                              MD5:6AF0A2CE5334C3B18D4A5B7CFF36B51C
                                              SHA1:DACF9AFBA4A6BA1505DC815EFE81E9C09F3B076E
                                              SHA-256:215D77E0F1FBEF10CB01AE46DE59BFAB3A5B1AF9CAEC8837FFE127F9FB67443E
                                              SHA-512:D0AB9FA8AE40C2F96D8887BC37678EA3262FC3AB624F0FF3F0375F08202AC4122400E5F36CE08E1C69EB626F14DB61B3B62410C40459A9867680F01F132F3417
                                              Malicious:false
                                              Reputation:low
                                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.1.0.7.7.0.0.2.6.2.8.5.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.1.0.7.7.0.0.9.6.5.9.7.4.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.2.6.e.9.a.2.-.c.9.a.0.-.4.f.6.c.-.a.7.e.7.-.b.a.3.0.4.2.7.4.5.6.1.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.7.a.3.d.1.e.9.-.f.c.e.a.-.4.b.f.5.-.9.2.1.7.-.9.4.e.8.2.5.1.9.b.f.0.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.P.u.r.c.h.a.s.e. .O.r.d.e.r. .F.o.r. .L.i.n.e.a.r. .A.c.t.u.a.t.o.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.N.e.w.c.a.s.t.l.e...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.e.4.-.0.0.0.1.-.0.0.1.5.-.9.e.4.5.-.d.e.0.8.c.d.2.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.2.8.5.2.7.3.1.6.0.2.5.e.0.6.3.1.9.b.5.6.c.d.2.5.7.e.a.b.9.7.8.5.0.0.0.0.0.0.0.0.!.0.0.0.0.0.5.0.8.3.7.8.5.7.d.b.8.0.b.e.5.0.6.f.8.9.0.b.b.8.2.d.
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:Mini DuMP crash report, 16 streams, Tue Oct 22 21:55:00 2024, 0x1205a4 type
                                              Category:dropped
                                              Size (bytes):478800
                                              Entropy (8bit):3.2842666089030255
                                              Encrypted:false
                                              SSDEEP:3072:kZIRiqXDvjDbMCegFB3+v3uInw4LvBMRCpdxFGcSHAhfReSuG1CCqH:OIRnDorI3QejM7di4Zdpq
                                              MD5:EC95F9F71E95BC1BFE482269ECB83312
                                              SHA1:AA70306D745308CF94F2EEFC94A4CFE2F647F69E
                                              SHA-256:59F7FA8589B3CAB776B41FCD87F8C379F7603FFD0747F8D520FB9E1FF3D3AF0E
                                              SHA-512:0AC732C03DC249BDF70843F391BD0BE5C73026BDBD2F99EC5F582D154A3501DD2B1E100419CFB16ADEE02D475C3FA97285D93F9D4524C4F08D94F173319DD6B7
                                              Malicious:false
                                              Reputation:low
                                              Preview:MDMP..a..... .......4..g............t.......................$...<)....... ..`)......dT..............l.......8...........T...........(=..(............I...........K..............................................................................eJ......hL......Lw......................T...........1..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):8710
                                              Entropy (8bit):3.7127226564800244
                                              Encrypted:false
                                              SSDEEP:192:R6l7wVeJETu9r6Y2DOC9vgmfZnKyipr789bEXwfX0sm:R6lXJB9r6YjWvgmfQyrEAfG
                                              MD5:DA3F52078B5794C3E59F4ED28B17E522
                                              SHA1:CCA03B0320AC001C87BB2D268271256EB85DC199
                                              SHA-256:564B58F4B17B55BD4E8CE798C0919405A0ADD633753E67E969CE897263EB288D
                                              SHA-512:F0FDA70A6B930276D5D79810A6ADD423FEC0E24C0D07DC9A08E1E52959FA3CFDE31C663BCE72B4996ABE91972189898E7CAA6BE980CFB54ECAD4BDEF13B7F701
                                              Malicious:false
                                              Reputation:low
                                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.2.7.6.<./.P.i.
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):4925
                                              Entropy (8bit):4.568222027953601
                                              Encrypted:false
                                              SSDEEP:48:cvIwWl8zsZuJg771I9kPWpW8VY4Ym8M4JwNIE6FOoyq8v1EyxIbSChHWCJd:uIjfZkI7Le7VwJwrOWOy2hTJd
                                              MD5:436C3A413C6C79FFB288EBCDF3B1E605
                                              SHA1:431ED78128D8C158ED063CB99DEFCA34F8409E24
                                              SHA-256:E2B8B7A8268D796BA468CE1795C24B9EF9020BCB5FDB358935ACFA7BADE1C6D2
                                              SHA-512:C4FB218522196F6DA341F6914B7C013DE973955645D5794FADB2520982438ECF6CB9E387C8CCA2700FAE488E9028C4B7A260C412E631D0B98A9FC561C4F6A3DB
                                              Malicious:false
                                              Reputation:low
                                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="555177" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):64
                                              Entropy (8bit):1.1940658735648508
                                              Encrypted:false
                                              SSDEEP:3:Nlllulbnolz:NllUc
                                              MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                              SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                              SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                              SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:@...e................................................@..........
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WerFault.exe
                                              File Type:MS Windows registry file, NT/2000 or above
                                              Category:dropped
                                              Size (bytes):1835008
                                              Entropy (8bit):4.4689397892193075
                                              Encrypted:false
                                              SSDEEP:6144:IzZfpi6ceLPx9skLmb0fmZWSP3aJG8nAgeiJRMMhA2zX4WABluuNkjDH5S:eZHtmZWOKnMM6bFp+j4
                                              MD5:6CF0763F3454B75C8223D9B763E86A42
                                              SHA1:8E481A4B7398015C691191492475A7C0A37D09AA
                                              SHA-256:D5E1AC0DD1B4495C3CCCA4B78D2676E141DBD91C6B3493F1CECEDB6DA662A10E
                                              SHA-512:43910BBB00EF38B691E9233241AEB5DB20996DA11B8C842B1825D246F1F85B155A586D3C6EFBAA77FF050BD2FB9EF8E5131146F0D672BF1F67D3817EDA022BE4
                                              Malicious:false
                                              Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...$................................................................................................................................................................................................................................................................................................................................................>........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):4.510821484690367
                                              TrID:
                                              • Win64 Executable GUI (202006/5) 92.65%
                                              • Win64 Executable (generic) (12005/4) 5.51%
                                              • Generic Win/DOS Executable (2004/3) 0.92%
                                              • DOS Executable Generic (2002/1) 0.92%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:Purchase Order For Linear Actuator.exe
                                              File size:3'677'748 bytes
                                              MD5:d976a78b2d4808b87477685a86d5a876
                                              SHA1:050837857db80be506f890bb82dfb4809436aff2
                                              SHA256:ced54118236fb8dc881c3bd56f115cd557718c17cc585e859a725ccb4f3e6e60
                                              SHA512:ac901b9d5cf11561b84248b6568e0235ca2948112aa248516acd05a82d43b745ffce704b2fdea1a1c7b3273e4e7d3fc17cfd52723f175ddb20bbbfdba702b1ac
                                              SSDEEP:12288:lP7r9r/+ppppppppppppppppppppppppppppp0GZnIMJZs28K+nwZ1Kyo5vR3tyc:l1qZnTZs++nwZYtdyN7mQvSJ0bOSOV3P
                                              TLSH:AE06CF81B5471D93FC099630D5E6B9F142FE6DAB78F4541FDF893D262ABA2BE1021032
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.........."...0..7...N........... ....@...... ................................8...`................................
                                              Icon Hash:c5a684988c94a0c5
                                              Entrypoint:0x400000
                                              Entrypoint Section:
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x6715B9B6 [Mon Oct 21 02:17:26 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:
                                              Instruction
                                              dec ebp
                                              pop edx
                                              nop
                                              add byte ptr [ebx], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax+eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x34f16.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x37120x38001f6c1f98b3d5f442eabf4a8e3ffa3580False0.6359514508928571data6.281676514117558IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x60000x34f160x35000df65da1d42f50428dfb73c9bd6281d68False0.20986420253537735data4.437395896706229IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x64740x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.3225609756097561
                                              RT_ICON0x6adc0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.43951612903225806
                                              RT_ICON0x6dc40x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.4016393442622951
                                              RT_ICON0x6fac0x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.4831081081081081
                                              RT_ICON0x70d40x35e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9907192575406032
                                              RT_ICON0xa6b40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.4584221748400853
                                              RT_ICON0xb55c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.47382671480144406
                                              RT_ICON0xbe040x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.45564516129032256
                                              RT_ICON0xc4cc0x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3504335260115607
                                              RT_ICON0xca340x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.07868508221933042
                                              RT_ICON0x1d25c0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.15114568005045195
                                              RT_ICON0x267040x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 265600.1543233082706767
                                              RT_ICON0x2ceec0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.175184842883549
                                              RT_ICON0x323740x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.15948275862068967
                                              RT_ICON0x3659c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.24107883817427386
                                              RT_ICON0x38b440x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.2678236397748593
                                              RT_ICON0x39bec0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.37459016393442623
                                              RT_ICON0x3a5740x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.42819148936170215
                                              RT_GROUP_ICON0x3a9dc0x102data0.6046511627906976
                                              RT_VERSION0x3aae00x24cdata0.46598639455782315
                                              RT_MANIFEST0x3ad2c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 22, 2024 23:55:01.164896965 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.164956093 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:01.165018082 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.197916031 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.197952986 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:01.829332113 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:01.829515934 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.831832886 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.831847906 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:01.832272053 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:01.879082918 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.919369936 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:01.967336893 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:02.103161097 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:02.103363037 CEST44349710104.26.13.205192.168.2.6
                                              Oct 22, 2024 23:55:02.103435993 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:02.109734058 CEST49710443192.168.2.6104.26.13.205
                                              Oct 22, 2024 23:55:03.063517094 CEST4971325192.168.2.646.175.148.58
                                              Oct 22, 2024 23:55:04.156572104 CEST4971325192.168.2.646.175.148.58
                                              Oct 22, 2024 23:55:06.160341978 CEST4971325192.168.2.646.175.148.58
                                              Oct 22, 2024 23:55:10.176060915 CEST4971325192.168.2.646.175.148.58
                                              Oct 22, 2024 23:55:18.176177025 CEST4971325192.168.2.646.175.148.58
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 22, 2024 23:55:01.152333021 CEST6406153192.168.2.61.1.1.1
                                              Oct 22, 2024 23:55:01.160263062 CEST53640611.1.1.1192.168.2.6
                                              Oct 22, 2024 23:55:03.049778938 CEST5221853192.168.2.61.1.1.1
                                              Oct 22, 2024 23:55:03.062427998 CEST53522181.1.1.1192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Oct 22, 2024 23:55:01.152333021 CEST192.168.2.61.1.1.10x179cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                              Oct 22, 2024 23:55:03.049778938 CEST192.168.2.61.1.1.10x513cStandard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 22, 2024 23:55:01.160263062 CEST1.1.1.1192.168.2.60x179cNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                              Oct 22, 2024 23:55:01.160263062 CEST1.1.1.1192.168.2.60x179cNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                              Oct 22, 2024 23:55:01.160263062 CEST1.1.1.1192.168.2.60x179cNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                              Oct 22, 2024 23:55:03.062427998 CEST1.1.1.1192.168.2.60x513cNo error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false
                                              • api.ipify.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.649710104.26.13.2054431132C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-22 21:55:01 UTC155OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                              Host: api.ipify.org
                                              Connection: Keep-Alive
                                              2024-10-22 21:55:02 UTC211INHTTP/1.1 200 OK
                                              Date: Tue, 22 Oct 2024 21:55:02 GMT
                                              Content-Type: text/plain
                                              Content-Length: 14
                                              Connection: close
                                              Vary: Origin
                                              cf-cache-status: DYNAMIC
                                              Server: cloudflare
                                              CF-RAY: 8d6cbab16c3d466b-DFW
                                              2024-10-22 21:55:02 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 36
                                              Data Ascii: 173.254.250.76


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:17:54:57
                                              Start date:22/10/2024
                                              Path:C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe"
                                              Imagebase:0x250ca730000
                                              File size:3'677'748 bytes
                                              MD5 hash:D976A78B2D4808B87477685A86D5A876
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2191912651.00000250CC379000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2192633166.00000250DDC00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:17:54:59
                                              Start date:22/10/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order For Linear Actuator.exe" -Force
                                              Imagebase:0x7ff6e3d50000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:3
                                              Start time:17:54:59
                                              Start date:22/10/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff66e660000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:17:54:59
                                              Start date:22/10/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                              Imagebase:0xd40000
                                              File size:42'064 bytes
                                              MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4594266186.00000000031BC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4592709113.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4594266186.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.4594266186.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:7
                                              Start time:17:55:00
                                              Start date:22/10/2024
                                              Path:C:\Windows\System32\WerFault.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\WerFault.exe -u -p 2276 -s 1256
                                              Imagebase:0x7ff7b6b30000
                                              File size:570'736 bytes
                                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:11.5%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:9
                                                Total number of Limit Nodes:0
                                                execution_graph 14222 7ffd34431ca5 14224 7ffd34431cb5 LoadLibraryA 14222->14224 14225 7ffd34431f24 14224->14225 14226 7ffd344467da 14227 7ffd344486b0 GetFileAttributesA 14226->14227 14229 7ffd344487ef 14227->14229 14230 7ffd344322ca 14231 7ffd344322d9 VirtualProtect 14230->14231 14233 7ffd344323b2 14231->14233

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 229 7ffd34432718-7ffd34433cd0 231 7ffd34433cd2-7ffd34433cd7 call 7ffd34432710 229->231 232 7ffd34433cdc-7ffd34433d13 229->232 231->232 235 7ffd34433f0f-7ffd34433f79 232->235 236 7ffd34433d19-7ffd34433d24 232->236 268 7ffd34433f96-7ffd34433fc0 235->268 269 7ffd34433f7b-7ffd34433f81 235->269 237 7ffd34433d98-7ffd34433d9d 236->237 238 7ffd34433d26-7ffd34433d34 236->238 241 7ffd34433d9f-7ffd34433dab 237->241 242 7ffd34433e10-7ffd34433e1a 237->242 238->235 240 7ffd34433d3a-7ffd34433d49 238->240 245 7ffd34433d7d-7ffd34433d88 240->245 246 7ffd34433d4b-7ffd34433d7b 240->246 241->235 243 7ffd34433db1-7ffd34433dc4 241->243 247 7ffd34433e3c-7ffd34433e44 242->247 248 7ffd34433e1c-7ffd34433e29 call 7ffd34432730 242->248 249 7ffd34433e47-7ffd34433e52 243->249 245->235 251 7ffd34433d8e-7ffd34433d96 245->251 246->245 254 7ffd34433dc9-7ffd34433dcc 246->254 247->249 263 7ffd34433e2e-7ffd34433e3a 248->263 249->235 252 7ffd34433e58-7ffd34433e68 249->252 251->237 251->238 252->235 256 7ffd34433e6e-7ffd34433e7b 252->256 257 7ffd34433dce-7ffd34433dde 254->257 258 7ffd34433de2-7ffd34433dea 254->258 256->235 261 7ffd34433e81-7ffd34433ea1 256->261 257->258 258->235 262 7ffd34433df0-7ffd34433e0f 258->262 261->235 270 7ffd34433ea3-7ffd34433eb2 261->270 263->247 271 7ffd34433f83-7ffd34433f94 269->271 272 7ffd34433fc1-7ffd34434015 269->272 274 7ffd34433efd-7ffd34433f0e 270->274 275 7ffd34433eb4-7ffd34433ebf 270->275 271->268 271->269 284 7ffd34434017-7ffd34434027 272->284 285 7ffd34434029-7ffd34434061 272->285 275->274 282 7ffd34433ec1-7ffd34433ef8 call 7ffd34432730 275->282 282->274 284->284 284->285 292 7ffd34434063-7ffd34434069 285->292 293 7ffd344340b8-7ffd344340bf 285->293 292->293 294 7ffd3443406b-7ffd3443406c 292->294 295 7ffd344340c1-7ffd344340c2 293->295 296 7ffd34434102-7ffd3443412b 293->296 297 7ffd3443406f-7ffd34434072 294->297 298 7ffd344340c5-7ffd344340c8 295->298 300 7ffd34434078-7ffd34434085 297->300 301 7ffd3443412c-7ffd34434141 297->301 298->301 302 7ffd344340ca-7ffd344340db 298->302 303 7ffd344340b1-7ffd344340b6 300->303 304 7ffd34434087-7ffd344340ae 300->304 311 7ffd34434143-7ffd3443414a 301->311 312 7ffd3443414b-7ffd3443415d 301->312 305 7ffd344340dd-7ffd344340e3 302->305 306 7ffd344340f9-7ffd34434100 302->306 303->293 303->297 304->303 305->301 310 7ffd344340e5-7ffd344340f5 305->310 306->296 306->298 310->306 311->312 313 7ffd3443415f-7ffd344341d1 312->313 314 7ffd3443415e 312->314 314->313
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: HoL4$d$O_H
                                                • API String ID: 0-457694247
                                                • Opcode ID: 4d45c4b22d70ddaf66aa72fd1427ee54fb96dd32f205c727c02ecc3aeafdbdbb
                                                • Instruction ID: a6e18cc8ec545879922e7f3f0bf4d7a5173bd6b9ea2d9e7c43f22ba8000291ca
                                                • Opcode Fuzzy Hash: 4d45c4b22d70ddaf66aa72fd1427ee54fb96dd32f205c727c02ecc3aeafdbdbb
                                                • Instruction Fuzzy Hash: 13026431B1CA490FE758DB2894E25B177E0FF86310B1942B9D59EC719BEE28F8538781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 496 7ffd3450026b-7ffd3450026d 497 7ffd345003b1-7ffd345003b7 496->497 498 7ffd3450026e-7ffd3450027c 496->498 503 7ffd345003b9-7ffd345003c8 497->503 499 7ffd34500284-7ffd34500286 498->499 501 7ffd34500288-7ffd34500289 499->501 502 7ffd345002f7-7ffd34500306 499->502 504 7ffd3450028b 501->504 505 7ffd3450024f-7ffd3450026a 501->505 506 7ffd34500307-7ffd34500309 502->506 507 7ffd345003c9-7ffd34500427 503->507 504->506 509 7ffd3450028d 504->509 505->496 506->497 511 7ffd3450030a-7ffd34500348 506->511 520 7ffd3450045c-7ffd34500474 507->520 521 7ffd34500429-7ffd34500440 507->521 513 7ffd345002d4 509->513 514 7ffd3450028f-7ffd345002a0 509->514 511->503 532 7ffd3450034a-7ffd3450034d 511->532 513->497 519 7ffd345002da-7ffd345002f5 513->519 517 7ffd34500237-7ffd3450023b 514->517 518 7ffd345002a2-7ffd345002b8 514->518 517->497 524 7ffd34500241-7ffd3450024e 517->524 518->497 522 7ffd345002be-7ffd345002d1 518->522 519->502 526 7ffd34500442-7ffd3450045a 521->526 527 7ffd345004b1-7ffd345004d0 521->527 522->513 524->505 526->520 531 7ffd345004d1-7ffd34500500 526->531 527->531 540 7ffd34500502-7ffd34500534 531->540 541 7ffd34500571-7ffd34500590 531->541 532->507 536 7ffd3450034f 532->536 538 7ffd34500396-7ffd345003b0 536->538 539 7ffd34500351-7ffd3450035f 536->539 539->538 544 7ffd34500597-7ffd345005c0 541->544 545 7ffd34500592-7ffd34500595 541->545 551 7ffd345005c2-7ffd345005f4 544->551 552 7ffd34500631-7ffd3450067a 544->552 545->544 559 7ffd3450067c-7ffd3450067e 552->559 560 7ffd345006eb 552->560 561 7ffd345006fa-7ffd3450073c 559->561 562 7ffd34500680 559->562 560->561 568 7ffd34500786 561->568 569 7ffd3450073e-7ffd34500772 561->569 564 7ffd345006c6-7ffd345006c7 562->564 565 7ffd34500682-7ffd345006a8 562->565 573 7ffd345006bc-7ffd345006c5 565->573 574 7ffd345006aa-7ffd345006b9 565->574 575 7ffd34500787-7ffd3450078b 568->575 571 7ffd34500778-7ffd34500785 569->571 572 7ffd34500a42-7ffd34500a56 569->572 571->568 581 7ffd34500a57-7ffd34500a70 572->581 573->564 574->573 575->572 576 7ffd3450078c-7ffd3450079e 575->576 578 7ffd3450079f-7ffd345007bd 576->578 578->572 582 7ffd345007c3-7ffd345007d6 578->582 583 7ffd34500ae3-7ffd34500b04 581->583 584 7ffd34500a72 581->584 587 7ffd345007d8-7ffd345007d9 582->587 588 7ffd34500847-7ffd34500856 582->588 584->583 587->578 590 7ffd345007db 587->590 589 7ffd34500857-7ffd34500859 588->589 589->572 591 7ffd3450085a-7ffd34500872 589->591 590->589 592 7ffd345007dd 590->592 598 7ffd34500874-7ffd34500877 591->598 599 7ffd345008e3-7ffd345008f0 591->599 593 7ffd34500824 592->593 594 7ffd345007df-7ffd345007f0 592->594 593->572 597 7ffd3450082a-7ffd34500845 593->597 594->575 600 7ffd345007f2-7ffd34500808 594->600 597->588 602 7ffd34500879 598->602 603 7ffd345008f3 598->603 599->603 600->572 604 7ffd3450080e-7ffd34500821 600->604 607 7ffd3450087b-7ffd345008a2 602->607 608 7ffd345008c0 602->608 603->572 606 7ffd345008f9-7ffd3450090c 603->606 604->593 614 7ffd3450090e-7ffd34500912 606->614 615 7ffd3450097d-7ffd34500990 606->615 607->572 609 7ffd345008a8-7ffd345008be 607->609 610 7ffd345008c3-7ffd345008e1 608->610 611 7ffd345008c2 608->611 609->572 609->608 610->599 611->610 616 7ffd34500914 614->616 617 7ffd34500993 614->617 615->617 618 7ffd34500974-7ffd3450097b 616->618 617->572 619 7ffd34500999-7ffd345009b5 617->619 618->615 622 7ffd345009b7-7ffd345009cc 619->622 623 7ffd345009d2-7ffd345009e6 619->623 622->623 623->581 624 7ffd345009e8-7ffd345009ed 623->624 624->618 626 7ffd345009ef 624->626 626->572
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2195132122.00007FFD34500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34500000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: A$!N4
                                                • API String ID: 0-1471879849
                                                • Opcode ID: e9cf010b4a1812088d9051a41aa1e0f5260b4e8857499cecd8d4de70166f34e2
                                                • Instruction ID: 953804b47847989b3831b05ccd0fda35645b859ae3143de959e26d73c3216d49
                                                • Opcode Fuzzy Hash: e9cf010b4a1812088d9051a41aa1e0f5260b4e8857499cecd8d4de70166f34e2
                                                • Instruction Fuzzy Hash: 08425B3AE0DA894FEB56DB18D8A55E87BE0FF57300F1401BED18DCB19ADA2C6846C741

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 627 7ffd34437ee8-7ffd34442b2a 629 7ffd34442b74-7ffd34442ba7 627->629 630 7ffd34442b2c-7ffd34442b72 627->630 637 7ffd34442bac-7ffd34442bb1 629->637 630->629 639 7ffd34442bb3-7ffd34442c0f 637->639 642 7ffd34442c11-7ffd34442c14 639->642 643 7ffd34442c8b-7ffd34442c8c 639->643 645 7ffd34442c90-7ffd34442c9b 642->645 646 7ffd34442c16 642->646 644 7ffd34442c8d-7ffd34442c8f 643->644 644->645 654 7ffd34442c9d-7ffd34442ca6 645->654 647 7ffd34442c18-7ffd34442c1c 646->647 648 7ffd34442c5c-7ffd34442c5f 646->648 647->644 650 7ffd34442c1e-7ffd34442c21 647->650 651 7ffd34442c61 648->651 652 7ffd34442cdb-7ffd34442ce7 648->652 650->654 655 7ffd34442c23 650->655 656 7ffd34442c63-7ffd34442c67 651->656 657 7ffd34442ca7-7ffd34442cac 651->657 653 7ffd34442ce8-7ffd34442cf7 652->653 668 7ffd34442cf9-7ffd34442d02 653->668 654->657 658 7ffd34442c25-7ffd34442c5a 655->658 659 7ffd34442c69-7ffd34442c6c 655->659 656->659 662 7ffd34442cd8-7ffd34442cda 656->662 660 7ffd34442cad 657->660 661 7ffd34442d28-7ffd34442d29 657->661 658->648 676 7ffd34442cd6 658->676 659->653 666 7ffd34442c6e 659->666 664 7ffd34442d1e-7ffd34442d27 660->664 665 7ffd34442cae-7ffd34442cb3 660->665 667 7ffd34442d2a-7ffd34442d38 661->667 662->652 664->661 665->668 672 7ffd34442cb4-7ffd34442cb9 665->672 671 7ffd34442c70-7ffd34442c8a 666->671 666->672 678 7ffd34442d3a-7ffd34442d49 667->678 674 7ffd34442d7e 668->674 675 7ffd34442d04-7ffd34442d05 668->675 671->643 672->667 677 7ffd34442cbb-7ffd34442cbe 672->677 681 7ffd34442d80-7ffd34442d82 674->681 679 7ffd34442d06-7ffd34442d07 675->679 676->662 677->678 680 7ffd34442cc0 677->680 682 7ffd34442dc5 678->682 683 7ffd34442d4b-7ffd34442d4e 678->683 684 7ffd34442d83-7ffd34442d88 679->684 685 7ffd34442d08 679->685 680->679 686 7ffd34442cc2-7ffd34442cd4 680->686 681->684 691 7ffd34442dc7-7ffd34442dc9 682->691 688 7ffd34442d4f 683->688 689 7ffd34442dca-7ffd34442dcf 683->689 687 7ffd34442d89-7ffd34442d8e 684->687 685->687 690 7ffd34442d09 685->690 686->676 692 7ffd34442d8f 687->692 693 7ffd34442e0a-7ffd34442e0b 687->693 694 7ffd34442dd0-7ffd34442dd5 688->694 695 7ffd34442d50 688->695 689->694 690->688 696 7ffd34442d0a-7ffd34442d0f 690->696 691->689 697 7ffd34442d90-7ffd34442d93 692->697 700 7ffd34442e0c-7ffd34442e0e 693->700 702 7ffd34442e51 694->702 703 7ffd34442dd6 694->703 698 7ffd34442d51-7ffd34442d56 695->698 699 7ffd34442d96-7ffd34442d9b 695->699 696->681 701 7ffd34442d11-7ffd34442d14 696->701 704 7ffd34442e0f-7ffd34442e1b 697->704 705 7ffd34442d95 697->705 698->691 707 7ffd34442d58-7ffd34442d5b 698->707 699->700 706 7ffd34442d9d-7ffd34442da0 699->706 700->704 701->697 708 7ffd34442d16 701->708 716 7ffd34442e53-7ffd34442e55 702->716 709 7ffd34442e47-7ffd34442e50 703->709 710 7ffd34442dd7-7ffd34442dda 703->710 714 7ffd34442e1c 704->714 705->699 712 7ffd34442ddb 705->712 713 7ffd34442da2 706->713 706->714 707->710 715 7ffd34442d5c 707->715 708->715 717 7ffd34442d18-7ffd34442d1b 708->717 709->702 711 7ffd34442e56-7ffd34442e5a 710->711 710->712 718 7ffd34442e5c-7ffd34442e62 711->718 712->718 719 7ffd34442ddc 712->719 720 7ffd34442da3-7ffd34442dc4 713->720 721 7ffd34442de8 713->721 726 7ffd34442e1d 714->726 727 7ffd34442e98 714->727 723 7ffd34442ddd-7ffd34442de2 715->723 724 7ffd34442d5d 715->724 716->711 717->664 736 7ffd34442e63-7ffd34442e67 718->736 719->723 728 7ffd34442e22 719->728 720->682 730 7ffd34442e69-7ffd34442e72 721->730 731 7ffd34442de9 721->731 723->716 729 7ffd34442de4-7ffd34442de7 723->729 724->720 732 7ffd34442d5e-7ffd34442d7d 724->732 733 7ffd34442e8e-7ffd34442e96 726->733 734 7ffd34442e1e-7ffd34442e21 726->734 735 7ffd34442e9a 727->735 743 7ffd34442ea3-7ffd34442ea7 728->743 744 7ffd34442e23 728->744 729->721 729->736 737 7ffd34442e74-7ffd34442e75 730->737 738 7ffd34442e8b-7ffd34442e8c 730->738 739 7ffd34442e2f-7ffd34442e30 731->739 740 7ffd34442dea-7ffd34442e05 731->740 732->674 734->728 742 7ffd34442e9d-7ffd34442ea2 734->742 735->742 736->730 748 7ffd34442e76-7ffd34442e81 737->748 738->733 739->748 753 7ffd34442e31-7ffd34442e46 739->753 740->693 742->743 751 7ffd34442eaa-7ffd34442ef7 call 7ffd344302f8 743->751 744->730 746 7ffd34442e24-7ffd34442e29 744->746 746->735 752 7ffd34442e2b-7ffd34442e2e 746->752 748->738 759 7ffd34442e83-7ffd34442e89 748->759 761 7ffd34442efc-7ffd34442f1c 751->761 752->739 752->751 753->709 759->738 763 7ffd3444303f-7ffd34443092 call 7ffd34430348 call 7ffd34436028 761->763 764 7ffd34442f22-7ffd34442f57 761->764 773 7ffd34443097-7ffd344430a8 763->773 764->761
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: DN4$DN4
                                                • API String ID: 0-231519583
                                                • Opcode ID: f440bbf7ad435a0fc97a8a1615c2fd5f82bc291177152e5018ca01443125e6be
                                                • Instruction ID: 630ffc40b94b2e4b872c8599773bb3542af4b6afc7ecb24015d1bd79d2a6d747
                                                • Opcode Fuzzy Hash: f440bbf7ad435a0fc97a8a1615c2fd5f82bc291177152e5018ca01443125e6be
                                                • Instruction Fuzzy Hash: BE124A71B0C9864FF3A8D71C88A65B577D1FF8A360B1502BAD18DC73EADE9C68065381

                                                Control-flow Graph

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (E14$XF14
                                                • API String ID: 0-2258943805
                                                • Opcode ID: ba10e8d4617e9aee31329e377fceee52f6a99743c42b2c12437233a500949206
                                                • Instruction ID: 31c89d7983fd5078446a163aa750a01bad9623ee94e1ade669e5852926214971
                                                • Opcode Fuzzy Hash: ba10e8d4617e9aee31329e377fceee52f6a99743c42b2c12437233a500949206
                                                • Instruction Fuzzy Hash: FCE11661B0DA8D1FE795E77888757A97FE5EF5A210B0901FAD08DD72ABCD5CA842C300

                                                Control-flow Graph

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fish$hKL4
                                                • API String ID: 0-4103589924
                                                • Opcode ID: bf11d4517adc1035f3bb99edf6c6a6d936d920cfd3b8f7951feeaac49fe18b15
                                                • Instruction ID: 3ce67a5b7382650a31fbe443d07ac1765653ccbc93c7b34489d1ee66ad501280
                                                • Opcode Fuzzy Hash: bf11d4517adc1035f3bb99edf6c6a6d936d920cfd3b8f7951feeaac49fe18b15
                                                • Instruction Fuzzy Hash: 1E915A31B1CA4E0FE75CEA2898B51BA73D0FF96710B05023EE58BC3596EE58FC525681
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `}N4
                                                • API String ID: 0-151340322
                                                • Opcode ID: 3efa527d9580b72ce248fc68115f451438b1d6bfbe167dc9b102ec1dc1237422
                                                • Instruction ID: 03032144d80fe83c68e09af09c0a5a564e79f2a43eaae5145e28cd73745d41a0
                                                • Opcode Fuzzy Hash: 3efa527d9580b72ce248fc68115f451438b1d6bfbe167dc9b102ec1dc1237422
                                                • Instruction Fuzzy Hash: 6BA2583060CB8A4FE759DB28C4A45B5B7E1FF96301B1545BED18AC72ABDE38E852C740
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PYN4
                                                • API String ID: 0-3328857023
                                                • Opcode ID: bbc48ce06d4709f8d9bff8790310395ad67c8c908a1c09026da67cb7f253845f
                                                • Instruction ID: 0820dbea76b893260da98cfe63bb82421a6254764c57eaf244a41c59128756f0
                                                • Opcode Fuzzy Hash: bbc48ce06d4709f8d9bff8790310395ad67c8c908a1c09026da67cb7f253845f
                                                • Instruction Fuzzy Hash: D1B1CB31B0CB8A0BE71CC62984F10B5B7D2EFC3701B06467EE5DAD3299DD6CA8529781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 783bcac1994381a9bd1c8578987a6171454d738527ffd50c57caa5a6da4c8741
                                                • Instruction ID: 760158a3c1bca82d7450a7b4d246be2a8b114dcb7b2ab7f91805b279a3fbcc15
                                                • Opcode Fuzzy Hash: 783bcac1994381a9bd1c8578987a6171454d738527ffd50c57caa5a6da4c8741
                                                • Instruction Fuzzy Hash: D8B2793060CB894FD359DB28C4A04B5B7E2FFD6301B1545BEE58AC729ADE38E856C781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 88f89ce07c6ceb9bca66f25dff52f1e326dfd9d3b2222ee9db6d8f1b99a93052
                                                • Instruction ID: 337ef7da4031a830d15b3324c0305b10044b88a0060a28081981c080992b6432
                                                • Opcode Fuzzy Hash: 88f89ce07c6ceb9bca66f25dff52f1e326dfd9d3b2222ee9db6d8f1b99a93052
                                                • Instruction Fuzzy Hash: DF726431A0CB864FE7698B1484A12B477E1EF97310F1641BDD58ECB6DBDE6CA846C780
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c52061df085e68bda36a46e4896b3703a686f58c7c6f97ffdc866983cc29a394
                                                • Instruction ID: 21f806d5c1259b4081d7ee85136f173507e491aeef65b6079d2f3a2771a79584
                                                • Opcode Fuzzy Hash: c52061df085e68bda36a46e4896b3703a686f58c7c6f97ffdc866983cc29a394
                                                • Instruction Fuzzy Hash: 86521631B0CA0D4FDB68EB2884B567977E1FF5A700B1541BEE08EC7296DE28AC52D741
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 96ef59f8d3f0dd8005a02c1076b90be66296b3e01dbdf77777a9eff187f276b8
                                                • Instruction ID: e81a5eda94f7d4e1c6f260144acd518748d355dea17d899189b776c68244a851
                                                • Opcode Fuzzy Hash: 96ef59f8d3f0dd8005a02c1076b90be66296b3e01dbdf77777a9eff187f276b8
                                                • Instruction Fuzzy Hash: 27D1BE5694E7CA4FE353577508B10A07FB0AE23A5075E01EBC5C4CF0E7DA4DA85AE722
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2195132122.00007FFD34500000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34500000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34500000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1abcff434359d593b9eca38647f53ec6084110f85f353117c02e72eb4c0e6b33
                                                • Instruction ID: f38ecec0114434bdf2e6a3d26a4dd36f9796f3b6e61e9eed030b1aef4b0cd784
                                                • Opcode Fuzzy Hash: 1abcff434359d593b9eca38647f53ec6084110f85f353117c02e72eb4c0e6b33
                                                • Instruction Fuzzy Hash: E1D15776E0DBC64FE753CB285CA65A87FE0EF57310B0901FAC589CB0A7D91DA8069342
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0357e769a50ac48cf7e1a6c336757e4956a1124589fa0b9f1fd014ee0d530663
                                                • Instruction ID: 58cac6f075277d2440c3e7194c9d40c8310cb163538f524d50db9a99a950d43f
                                                • Opcode Fuzzy Hash: 0357e769a50ac48cf7e1a6c336757e4956a1124589fa0b9f1fd014ee0d530663
                                                • Instruction Fuzzy Hash: 71C19C3160CB890FE31DCB2884B51B1B7E2FFD6701B1646BEE4C6C72A5DA68A456C781
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 03f63450c78ec3a2e808db8b2bfceeb31fa068cc1a9c43fafa09b77c1cb421ba
                                                • Instruction ID: 3ed1cecb4c2a4fa112b13c05fcba3862a010722181ce7d1e2f96cedf555300b7
                                                • Opcode Fuzzy Hash: 03f63450c78ec3a2e808db8b2bfceeb31fa068cc1a9c43fafa09b77c1cb421ba
                                                • Instruction Fuzzy Hash: 63417B3270D3891FD71E9A788C661B57B95EB83220B1682BFD486CB1EBDC68580783D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e597f3f0f974e2722a56bafa015a1ecbb83190821dad604be1d807ad31148d99
                                                • Instruction ID: 508de75c8cc1b106a5fbf1f0b5924836aabf3e6af0bea2aaa34e82bfd96b5f83
                                                • Opcode Fuzzy Hash: e597f3f0f974e2722a56bafa015a1ecbb83190821dad604be1d807ad31148d99
                                                • Instruction Fuzzy Hash: B7418E3170D38A1FD72E9A748C651A57FA5EB83310B1682BFD486CB1EBDD6C98078391

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 31 7ffd344387fa-7ffd3444751f VirtualProtect 37 7ffd34447521 31->37 38 7ffd34447527-7ffd3444754f 31->38 37->38
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID: O_^$O_^
                                                • API String ID: 544645111-3149176749
                                                • Opcode ID: bcc8e4d7a1ccd799bf221e81a993f8533846a0ab31b93d68d63cb26166d8815c
                                                • Instruction ID: 7c9426cdaa7d232cf2b9070a5c08d06af4ff32fa72563af1bc00e8356c17ac83
                                                • Opcode Fuzzy Hash: bcc8e4d7a1ccd799bf221e81a993f8533846a0ab31b93d68d63cb26166d8815c
                                                • Instruction Fuzzy Hash: 4B315971A0CA4C8FDB18DF98D8466F9BBE1FB55311F04423FD049D3252DB6468468781

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1216 7ffd34431ca5-7ffd34431d49 1226 7ffd34431d72-7ffd34431dfd 1216->1226 1227 7ffd34431d4b-7ffd34431d71 1216->1227 1235 7ffd34431dff-7ffd34431e4c 1226->1235 1236 7ffd34431e72-7ffd34431e75 1226->1236 1227->1226 1237 7ffd34431ebf-7ffd34431f22 LoadLibraryA 1235->1237 1250 7ffd34431e4e-7ffd34431e6f 1235->1250 1236->1237 1238 7ffd34431e77-7ffd34431e7a 1236->1238 1245 7ffd34431f24 1237->1245 1246 7ffd34431f2a-7ffd34431f56 call 7ffd34431f7a 1237->1246 1240 7ffd34431eb4-7ffd34431ebc 1238->1240 1241 7ffd34431e7c-7ffd34431e8f 1238->1241 1240->1237 1243 7ffd34431e93-7ffd34431ea6 1241->1243 1244 7ffd34431e91 1241->1244 1243->1243 1248 7ffd34431ea8-7ffd34431eb0 1243->1248 1244->1243 1245->1246 1252 7ffd34431f58-7ffd34431f5e 1246->1252 1253 7ffd34431fcb-7ffd34431fd7 1246->1253 1248->1240 1250->1236 1255 7ffd34431f60 1252->1255 1256 7ffd34431f65-7ffd34431f79 1252->1256 1257 7ffd34431fe2-7ffd34431ff3 1253->1257 1258 7ffd34431fd9-7ffd34431fe1 1253->1258 1255->1256 1259 7ffd34431ffe-7ffd34432058 call 7ffd344306f0 call 7ffd34430700 1257->1259 1260 7ffd34431ff5-7ffd34431ffd 1257->1260 1258->1257 1266 7ffd34432079-7ffd34432081 1259->1266 1267 7ffd3443205a-7ffd34432078 call 7ffd34430558 call 7ffd34430700 1259->1267 1260->1259 1267->1266
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f110b31a5c55ea6d9e2c80310c5b4289ffd1d78ca004e70607badfd40e09f56e
                                                • Instruction ID: 4d5ad961ad03e1b7025edbb9193dde0236392c0333860aafaccda2183bb7979e
                                                • Opcode Fuzzy Hash: f110b31a5c55ea6d9e2c80310c5b4289ffd1d78ca004e70607badfd40e09f56e
                                                • Instruction Fuzzy Hash: D2D16731A0C68D5FEB15EB6CE8667E93BE4EF46320F04017BE44DC7193CA68A845C791

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1419 7ffd344320aa-7ffd3443210d 1421 7ffd3443210f-7ffd34432162 1419->1421 1422 7ffd34432182-7ffd3443218d 1419->1422 1428 7ffd344321bd-7ffd34432224 1421->1428 1430 7ffd34432164-7ffd34432173 1421->1430 1423 7ffd3443218f 1422->1423 1424 7ffd34432191-7ffd344321a4 1422->1424 1423->1424 1424->1424 1425 7ffd344321a6-7ffd344321ae 1424->1425 1427 7ffd344321b2-7ffd344321ba 1425->1427 1427->1428 1435 7ffd34432226 1428->1435 1436 7ffd3443222c-7ffd34432258 call 7ffd3443227c 1428->1436 1430->1428 1432 7ffd34432175-7ffd34432178 1430->1432 1432->1427 1433 7ffd3443217a-7ffd34432180 1432->1433 1433->1422 1435->1436 1439 7ffd344322cd-7ffd344322d7 1436->1439 1440 7ffd3443225a-7ffd34432260 1436->1440 1441 7ffd344322e2-7ffd344322f3 1439->1441 1442 7ffd344322d9-7ffd344322e1 1439->1442 1443 7ffd34432262 1440->1443 1444 7ffd34432267-7ffd3443227b 1440->1444 1445 7ffd344322fe-7ffd344323b0 VirtualProtect 1441->1445 1446 7ffd344322f5-7ffd344322fd 1441->1446 1442->1441 1443->1444 1450 7ffd344323b2 1445->1450 1451 7ffd344323b8-7ffd344323e0 1445->1451 1446->1445 1450->1451
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: abcf81e5a1d6a9b6bce191779dc2a48bc69ded7abfbea69de63189dd47307e5f
                                                • Instruction ID: ef036df8ec1a5f0c712effbaaec01a0891c8855ad3928f9f515840203320f920
                                                • Opcode Fuzzy Hash: abcf81e5a1d6a9b6bce191779dc2a48bc69ded7abfbea69de63189dd47307e5f
                                                • Instruction Fuzzy Hash: D5B1063090CB8D4FEB59DF68C8566E97BE1FF56311F04426BE449C3292DA78A845CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1452 7ffd344467da-7ffd344486dd 1454 7ffd34448752-7ffd3444875a 1452->1454 1455 7ffd344486df-7ffd3444872f 1452->1455 1456 7ffd3444875e-7ffd34448771 1454->1456 1457 7ffd3444875c 1454->1457 1461 7ffd3444878a-7ffd344487ed GetFileAttributesA 1455->1461 1463 7ffd34448731-7ffd34448740 1455->1463 1456->1456 1458 7ffd34448773-7ffd3444877b 1456->1458 1457->1456 1460 7ffd3444877f-7ffd34448787 1458->1460 1460->1461 1467 7ffd344487ef 1461->1467 1468 7ffd344487f5-7ffd3444881f call 7ffd34448843 1461->1468 1463->1461 1464 7ffd34448742-7ffd34448745 1463->1464 1464->1460 1466 7ffd34448747-7ffd34448751 1464->1466 1466->1454 1467->1468 1471 7ffd34448821-7ffd34448827 1468->1471 1472 7ffd34448894-7ffd3444889f 1468->1472 1473 7ffd3444882e-7ffd34448842 1471->1473 1474 7ffd34448829 1471->1474 1475 7ffd344488a1-7ffd344488a9 1472->1475 1476 7ffd344488aa-7ffd344488bb 1472->1476 1474->1473 1475->1476 1477 7ffd344488bd-7ffd344488c5 1476->1477 1478 7ffd344488c6-7ffd34448964 1476->1478 1477->1478 1484 7ffd3444896c-7ffd34448991 1478->1484 1485 7ffd34448966 1478->1485 1485->1484
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 0f90cf13880bde67a2b99bba0e6439bc3c74961aa2d10170e6f5068a5035013e
                                                • Instruction ID: 4bbf0adba0bc477a9fa175c6aa4826e7b6dcd8c36d4f053561cb378fccc96594
                                                • Opcode Fuzzy Hash: 0f90cf13880bde67a2b99bba0e6439bc3c74961aa2d10170e6f5068a5035013e
                                                • Instruction Fuzzy Hash: C991C530A08A4C8FEB58DF68C8567E97BE1FF56310F04427ED84DC7296DA78A845CB91
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FFD344323A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: d82380c34de2eb524a3537dccac9c1bc87c6d475dfeba551fc4f4fb523209548
                                                • Instruction ID: 85f5ff577287760292f0a7f6795965f0bdeb60816d10a6a152993c066b7620fa
                                                • Opcode Fuzzy Hash: d82380c34de2eb524a3537dccac9c1bc87c6d475dfeba551fc4f4fb523209548
                                                • Instruction Fuzzy Hash: 8041263090CB888FDB19DBA898566E97FE0EF56321F0402AFD089C3192CB646856C791
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: O_^$O_^$O_^$O_^$O_^
                                                • API String ID: 0-2660881393
                                                • Opcode ID: e48856246a3335fc6f0e9590ce023caa9ad46f3f846ec3b2c106e7587006169c
                                                • Instruction ID: ec2a00551fcd01e914686964935bf783db5695264b68b46568824df17a69695a
                                                • Opcode Fuzzy Hash: e48856246a3335fc6f0e9590ce023caa9ad46f3f846ec3b2c106e7587006169c
                                                • Instruction Fuzzy Hash: AFC1B55BF0D6962BEB1666BC68B62E67BD4EF5322870A01B3C2C8CD043ED1C68574245
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: L4$ L4$0L4$hL4$L4
                                                • API String ID: 0-2994237154
                                                • Opcode ID: dd2a484b6609965b3be6a00f15ba632fa6b34c884e0ef9165a2da756aa02cd6a
                                                • Instruction ID: 30fcc805e19e69d702d4aebb3117ba2cce26c251f605707468852c9ce7b1fd21
                                                • Opcode Fuzzy Hash: dd2a484b6609965b3be6a00f15ba632fa6b34c884e0ef9165a2da756aa02cd6a
                                                • Instruction Fuzzy Hash: 64A16D47B0D9872BEBB4A62C58F62F67BD4DF9372070941BBD288CB09BDC0C6C5A5241
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f73d6c5e8fc7a500565a2485e02784a7d11d5dca048e5717cf2b149d387ed0c6
                                                • Instruction ID: 3260275ce6c56eb7554c8c1badbf1c9a70fd93033a4d847789bf5190134e88c6
                                                • Opcode Fuzzy Hash: f73d6c5e8fc7a500565a2485e02784a7d11d5dca048e5717cf2b149d387ed0c6
                                                • Instruction Fuzzy Hash: 1DF13461A4EBCA4FE313473448B51A07FF0AF2362071A05FBC5D5CB0A7DA5DA85AD722
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4511ab8f5235ce853ac0b0c7a1119662c8a2c0ccc506ba51aa48a546b8444ccc
                                                • Instruction ID: ce007929eca5ad95fe42b16a23f3bef7042eba402d1adb6e8c7c77ea85a8c1dc
                                                • Opcode Fuzzy Hash: 4511ab8f5235ce853ac0b0c7a1119662c8a2c0ccc506ba51aa48a546b8444ccc
                                                • Instruction Fuzzy Hash: 0FD1785698E7CA4FE313167518B50A07FB0AE23A6071E01EBC5C4CF0E7DA4E585AE722
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30d53b424b070bf97295e7077aa1b7db8f3218c8d4c1205ba98217e7a46abb31
                                                • Instruction ID: a5bdf2c7c0fa3cb919d53c7855cff542a91c721f5a06c44dac2e65e38da8b966
                                                • Opcode Fuzzy Hash: 30d53b424b070bf97295e7077aa1b7db8f3218c8d4c1205ba98217e7a46abb31
                                                • Instruction Fuzzy Hash: 65A1765698E7CA4FE31307750CB51A07FB0AE23A6031E11EBCAD4CF0A7D64D585AE722
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 446a3e4189e63f18aaa4daa439090a49fc0f97ab99241df94c673b320af97dcc
                                                • Instruction ID: e1806e7703491bba4cd3cf3af6d6c095f549566351e6f7bd9ddf5780d6c62bbd
                                                • Opcode Fuzzy Hash: 446a3e4189e63f18aaa4daa439090a49fc0f97ab99241df94c673b320af97dcc
                                                • Instruction Fuzzy Hash: 3851FF51B0DAC90FE782A7B848B92B56FD5DF5B125B1D01FBD0C8C71ABCA8C5856D302
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2194830524.00007FFD34430000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34430000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7ffd34430000_Purchase Order For Linear Actuator.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 38866847a65edf961bf737de9c38d90182d08938408e9acd73744cff26f6efbf
                                                • Instruction ID: 14e133a0b20fe6919a87479fa51f900fd3fcd05edb494fe9dcc59625ede692d1
                                                • Opcode Fuzzy Hash: 38866847a65edf961bf737de9c38d90182d08938408e9acd73744cff26f6efbf
                                                • Instruction Fuzzy Hash: EE41F632A0D7D50FD31E9A795C560A17FB5DB8322071A82FBD4C6CB1A7E4596C0BC391

                                                Execution Graph

                                                Execution Coverage:7.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:21
                                                Total number of Limit Nodes:4
                                                execution_graph 26023 2f60848 26025 2f6084e 26023->26025 26024 2f6091b 26025->26024 26027 2f61383 26025->26027 26029 2f61396 26027->26029 26028 2f61484 26028->26025 26029->26028 26031 2f67ea8 26029->26031 26032 2f67eb2 26031->26032 26033 2f67ecc 26032->26033 26036 5c4d9e0 26032->26036 26042 5c4d9f0 26032->26042 26033->26029 26038 5c4da05 26036->26038 26037 5c4dc1a 26037->26033 26038->26037 26039 5c4dc40 GlobalMemoryStatusEx 26038->26039 26040 5c4dc3f GlobalMemoryStatusEx 26038->26040 26041 5c4de88 GlobalMemoryStatusEx 26038->26041 26039->26038 26040->26038 26041->26038 26044 5c4da05 26042->26044 26043 5c4dc1a 26043->26033 26044->26043 26045 5c4dc40 GlobalMemoryStatusEx 26044->26045 26046 5c4dc3f GlobalMemoryStatusEx 26044->26046 26047 5c4de88 GlobalMemoryStatusEx 26044->26047 26045->26044 26046->26044 26047->26044
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 076d91efd267b2098a408c121d2176d8a15894b2589022125845f79043082c7a
                                                • Instruction ID: 0451ddb402e186a5f49e599bd1a77f137ba2e1e598ee6f578f5911e9564e4735
                                                • Opcode Fuzzy Hash: 076d91efd267b2098a408c121d2176d8a15894b2589022125845f79043082c7a
                                                • Instruction Fuzzy Hash: 1E53F831D10B1A8ACB51EF68C8846A9F7B1FF99300F15D79AE45877121FB70AAD4CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 569 2f63e80-2f63ee6 571 2f63f30-2f63f32 569->571 572 2f63ee8-2f63ef3 569->572 574 2f63f34-2f63f8c 571->574 572->571 573 2f63ef5-2f63f01 572->573 575 2f63f24-2f63f2e 573->575 576 2f63f03-2f63f0d 573->576 583 2f63fd6-2f63fd8 574->583 584 2f63f8e-2f63f99 574->584 575->574 578 2f63f11-2f63f20 576->578 579 2f63f0f 576->579 578->578 580 2f63f22 578->580 579->578 580->575 586 2f63fda-2f63ff2 583->586 584->583 585 2f63f9b-2f63fa7 584->585 587 2f63fca-2f63fd4 585->587 588 2f63fa9-2f63fb3 585->588 592 2f63ff4-2f63fff 586->592 593 2f6403c-2f6403e 586->593 587->586 589 2f63fb7-2f63fc6 588->589 590 2f63fb5 588->590 589->589 594 2f63fc8 589->594 590->589 592->593 595 2f64001-2f6400d 592->595 596 2f64040-2f640a2 593->596 594->587 597 2f64030-2f6403a 595->597 598 2f6400f-2f64019 595->598 605 2f640a4-2f640aa 596->605 606 2f640ab-2f6410b 596->606 597->596 599 2f6401d-2f6402c 598->599 600 2f6401b 598->600 599->599 602 2f6402e 599->602 600->599 602->597 605->606 613 2f6410d-2f64111 606->613 614 2f6411b-2f6411f 606->614 613->614 615 2f64113 613->615 616 2f64121-2f64125 614->616 617 2f6412f-2f64133 614->617 615->614 616->617 618 2f64127-2f6412a call 2f60abc 616->618 619 2f64135-2f64139 617->619 620 2f64143-2f64147 617->620 618->617 619->620 624 2f6413b-2f6413e call 2f60abc 619->624 621 2f64157-2f6415b 620->621 622 2f64149-2f6414d 620->622 626 2f6415d-2f64161 621->626 627 2f6416b-2f6416f 621->627 622->621 625 2f6414f-2f64152 call 2f60abc 622->625 624->620 625->621 626->627 630 2f64163 626->630 631 2f64171-2f64175 627->631 632 2f6417f 627->632 630->627 631->632 633 2f64177 631->633 634 2f64180 632->634 633->632 634->634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \VGm
                                                • API String ID: 0-1150679331
                                                • Opcode ID: 26e9d5232c835d43ceaa4d611769023695e704b2306b2d133617c6278bdc57f7
                                                • Instruction ID: 29ebb05061cf52ca7e0f047164a282b80604c6c83b1323339896f4b289501a83
                                                • Opcode Fuzzy Hash: 26e9d5232c835d43ceaa4d611769023695e704b2306b2d133617c6278bdc57f7
                                                • Instruction Fuzzy Hash: DE916C70E002199FEF24DFA8C9897EEBBF2EF88744F148129E515A7254EB749845CF81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5441ef4985d516406b355900768fed667540123e4f0503acb051b85015b8a1ef
                                                • Instruction ID: e743589b5fa17b205a74297bac262a156b4e9692ca99450b54bc1c65032693e5
                                                • Opcode Fuzzy Hash: 5441ef4985d516406b355900768fed667540123e4f0503acb051b85015b8a1ef
                                                • Instruction Fuzzy Hash: 47B15D70E002098FDB20DFA9C8997ADBBF2EF88394F148129D915E7394EB749845CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 508 2f64810-2f6489c 511 2f648e6-2f648e8 508->511 512 2f6489e-2f648a9 508->512 513 2f648ea-2f64902 511->513 512->511 514 2f648ab-2f648b7 512->514 521 2f64904-2f6490f 513->521 522 2f6494c-2f6494e 513->522 515 2f648da-2f648e4 514->515 516 2f648b9-2f648c3 514->516 515->513 518 2f648c7-2f648d6 516->518 519 2f648c5 516->519 518->518 520 2f648d8 518->520 519->518 520->515 521->522 523 2f64911-2f6491d 521->523 524 2f64950-2f64995 522->524 525 2f64940-2f6494a 523->525 526 2f6491f-2f64929 523->526 532 2f6499b-2f649a9 524->532 525->524 528 2f6492d-2f6493c 526->528 529 2f6492b 526->529 528->528 530 2f6493e 528->530 529->528 530->525 533 2f649b2-2f64a0f 532->533 534 2f649ab-2f649b1 532->534 541 2f64a11-2f64a15 533->541 542 2f64a1f-2f64a23 533->542 534->533 541->542 543 2f64a17-2f64a1a call 2f60abc 541->543 544 2f64a25-2f64a29 542->544 545 2f64a33-2f64a37 542->545 543->542 544->545 547 2f64a2b-2f64a2e call 2f60abc 544->547 548 2f64a47-2f64a4b 545->548 549 2f64a39-2f64a3d 545->549 547->545 550 2f64a4d-2f64a51 548->550 551 2f64a5b 548->551 549->548 553 2f64a3f 549->553 550->551 554 2f64a53 550->554 555 2f64a5c 551->555 553->548 554->551 555->555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \VGm$\VGm
                                                • API String ID: 0-2238751749
                                                • Opcode ID: cbd2114005d552cddd8ab006f8379ec318d16efab9216c4b8641e60ae4220cbf
                                                • Instruction ID: 1f02e4469f7ed1d669b52929b2700a6573536461e264fcd260a72ac0a27183d7
                                                • Opcode Fuzzy Hash: cbd2114005d552cddd8ab006f8379ec318d16efab9216c4b8641e60ae4220cbf
                                                • Instruction Fuzzy Hash: 38718D70E002499FDB20DFA9C888BAEBBF2FF88754F148129E515A7254EB749845CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 460 2f64807-2f6489c 463 2f648e6-2f648e8 460->463 464 2f6489e-2f648a9 460->464 465 2f648ea-2f64902 463->465 464->463 466 2f648ab-2f648b7 464->466 473 2f64904-2f6490f 465->473 474 2f6494c-2f6494e 465->474 467 2f648da-2f648e4 466->467 468 2f648b9-2f648c3 466->468 467->465 470 2f648c7-2f648d6 468->470 471 2f648c5 468->471 470->470 472 2f648d8 470->472 471->470 472->467 473->474 475 2f64911-2f6491d 473->475 476 2f64950-2f64962 474->476 477 2f64940-2f6494a 475->477 478 2f6491f-2f64929 475->478 483 2f64969-2f64995 476->483 477->476 480 2f6492d-2f6493c 478->480 481 2f6492b 478->481 480->480 482 2f6493e 480->482 481->480 482->477 484 2f6499b-2f649a9 483->484 485 2f649b2-2f64a0f 484->485 486 2f649ab-2f649b1 484->486 493 2f64a11-2f64a15 485->493 494 2f64a1f-2f64a23 485->494 486->485 493->494 495 2f64a17-2f64a1a call 2f60abc 493->495 496 2f64a25-2f64a29 494->496 497 2f64a33-2f64a37 494->497 495->494 496->497 499 2f64a2b-2f64a2e call 2f60abc 496->499 500 2f64a47-2f64a4b 497->500 501 2f64a39-2f64a3d 497->501 499->497 502 2f64a4d-2f64a51 500->502 503 2f64a5b 500->503 501->500 505 2f64a3f 501->505 502->503 506 2f64a53 502->506 507 2f64a5c 503->507 505->500 506->503 507->507
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \VGm$\VGm
                                                • API String ID: 0-2238751749
                                                • Opcode ID: bbe1317b33484f9e0a66dd8b35d0c06a0864d75715209fad81a4402099ef2f1b
                                                • Instruction ID: ccd484e3a8a550986a4172882f34b38931d7ed8cd67429d1f675cca2f469ad18
                                                • Opcode Fuzzy Hash: bbe1317b33484f9e0a66dd8b35d0c06a0864d75715209fad81a4402099ef2f1b
                                                • Instruction Fuzzy Hash: CB718B70E002499FDB20EFA8C988BEEBBF2FF88754F148129E515A7254DB749845CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 556 5c4d1cc-5c4eab4 GlobalMemoryStatusEx 559 5c4eab6-5c4eabc 556->559 560 5c4eabd-5c4eae5 556->560 559->560
                                                APIs
                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05C4E5B2), ref: 05C4EAA7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4596591941.0000000005C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5c40000_InstallUtil.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 4bab20cd2c164eeca6483f3d2f3020584667917639d6fcca9d5aa122f0942fcb
                                                • Instruction ID: 1b6185d916e588c754c2552c8b27b31ea59156f0608b195cb1d3ee7f05a20107
                                                • Opcode Fuzzy Hash: 4bab20cd2c164eeca6483f3d2f3020584667917639d6fcca9d5aa122f0942fcb
                                                • Instruction Fuzzy Hash: 7D1136B1C0065A9BCB10CF9AC444B9EFBF4BF48224F11856AD918A7240D378A914CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 563 5c4ea38-5c4ea7e 564 5c4ea86-5c4eab4 GlobalMemoryStatusEx 563->564 565 5c4eab6-5c4eabc 564->565 566 5c4eabd-5c4eae5 564->566 565->566
                                                APIs
                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05C4E5B2), ref: 05C4EAA7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4596591941.0000000005C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_5c40000_InstallUtil.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 109e378c3ec0b7fdfca94bceddf68184ef1899b929cdd19c33de80cb9527b677
                                                • Instruction ID: c37c4bc9f7dc67e54f30a10b7ef135b045223cdbd752d708431e0689ff4af386
                                                • Opcode Fuzzy Hash: 109e378c3ec0b7fdfca94bceddf68184ef1899b929cdd19c33de80cb9527b677
                                                • Instruction Fuzzy Hash: 171136B1C0066A9FCB10CF9AC444BDEFBB4BF48310F11826AE818A7240D378A954CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 635 2f63e74-2f63ee6 637 2f63f30-2f63f32 635->637 638 2f63ee8-2f63ef3 635->638 640 2f63f34-2f63f8c 637->640 638->637 639 2f63ef5-2f63f01 638->639 641 2f63f24-2f63f2e 639->641 642 2f63f03-2f63f0d 639->642 649 2f63fd6-2f63fd8 640->649 650 2f63f8e-2f63f99 640->650 641->640 644 2f63f11-2f63f20 642->644 645 2f63f0f 642->645 644->644 646 2f63f22 644->646 645->644 646->641 652 2f63fda-2f63ff2 649->652 650->649 651 2f63f9b-2f63fa7 650->651 653 2f63fca-2f63fd4 651->653 654 2f63fa9-2f63fb3 651->654 658 2f63ff4-2f63fff 652->658 659 2f6403c-2f6403e 652->659 653->652 655 2f63fb7-2f63fc6 654->655 656 2f63fb5 654->656 655->655 660 2f63fc8 655->660 656->655 658->659 661 2f64001-2f6400d 658->661 662 2f64040-2f64052 659->662 660->653 663 2f64030-2f6403a 661->663 664 2f6400f-2f64019 661->664 669 2f64059-2f6408e 662->669 663->662 665 2f6401d-2f6402c 664->665 666 2f6401b 664->666 665->665 668 2f6402e 665->668 666->665 668->663 670 2f64094-2f640a2 669->670 671 2f640a4-2f640aa 670->671 672 2f640ab-2f6410b 670->672 671->672 679 2f6410d-2f64111 672->679 680 2f6411b-2f6411f 672->680 679->680 681 2f64113 679->681 682 2f64121-2f64125 680->682 683 2f6412f-2f64133 680->683 681->680 682->683 684 2f64127-2f6412a call 2f60abc 682->684 685 2f64135-2f64139 683->685 686 2f64143-2f64147 683->686 684->683 685->686 690 2f6413b-2f6413e call 2f60abc 685->690 687 2f64157-2f6415b 686->687 688 2f64149-2f6414d 686->688 692 2f6415d-2f64161 687->692 693 2f6416b-2f6416f 687->693 688->687 691 2f6414f-2f64152 call 2f60abc 688->691 690->686 691->687 692->693 696 2f64163 692->696 697 2f64171-2f64175 693->697 698 2f6417f 693->698 696->693 697->698 699 2f64177 697->699 700 2f64180 698->700 699->698 700->700
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \VGm
                                                • API String ID: 0-1150679331
                                                • Opcode ID: 6307243ae63f003c089eb7d8a823376ac079b21b7c319ed91b3d862f72877b16
                                                • Instruction ID: 24d7e0aa2febf4fd2b7a672ff8fe385f1ff14ebc8dcc850ba2504810014ac4ef
                                                • Opcode Fuzzy Hash: 6307243ae63f003c089eb7d8a823376ac079b21b7c319ed91b3d862f72877b16
                                                • Instruction Fuzzy Hash: 07A17B70E002199FEB24DFA8C9897EEBBF2FF88744F148129E515A7254EB749845CF81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 731 2f68720-2f68737 732 2f68739-2f6873c 731->732 733 2f6873e-2f68764 732->733 734 2f68769-2f6876c 732->734 733->734 735 2f6876e-2f68794 734->735 736 2f68799-2f6879c 734->736 735->736 737 2f6879e-2f687c4 736->737 738 2f687c9-2f687cc 736->738 737->738 740 2f687ce-2f687f4 738->740 741 2f687f9-2f687fc 738->741 740->741 743 2f687fe-2f68824 741->743 744 2f68829-2f6882c 741->744 743->744 747 2f6882e-2f68854 744->747 748 2f68859-2f6885c 744->748 747->748 752 2f6885e-2f68884 748->752 753 2f68889-2f6888c 748->753 752->753 756 2f6888e-2f688b4 753->756 757 2f688b9-2f688bc 753->757 756->757 762 2f688be-2f688c0 757->762 763 2f688cd-2f688d0 757->763 945 2f688c2 call 2f6a01b 762->945 946 2f688c2 call 2f69f78 762->946 947 2f688c2 call 2f69f68 762->947 769 2f688d2-2f688f8 763->769 770 2f688fd-2f68900 763->770 769->770 772 2f68902-2f68928 770->772 773 2f6892d-2f68930 770->773 772->773 779 2f68932-2f68958 773->779 780 2f6895d-2f68960 773->780 774 2f688c8 774->763 779->780 782 2f68962-2f68988 780->782 783 2f6898d-2f68990 780->783 782->783 788 2f68992-2f689b8 783->788 789 2f689bd-2f689c0 783->789 788->789 790 2f689c2-2f689e8 789->790 791 2f689ed-2f689f0 789->791 790->791 797 2f689f2-2f68a18 791->797 798 2f68a1d-2f68a20 791->798 797->798 799 2f68a22-2f68a48 798->799 800 2f68a4d-2f68a50 798->800 799->800 807 2f68a52-2f68a78 800->807 808 2f68a7d-2f68a80 800->808 807->808 809 2f68a82-2f68aa8 808->809 810 2f68aad-2f68ab0 808->810 809->810 817 2f68ab2-2f68ad8 810->817 818 2f68add-2f68ae0 810->818 817->818 819 2f68ae2-2f68b08 818->819 820 2f68b0d-2f68b10 818->820 819->820 827 2f68b12-2f68b38 820->827 828 2f68b3d-2f68b40 820->828 827->828 829 2f68b42-2f68b68 828->829 830 2f68b6d-2f68b70 828->830 829->830 837 2f68b72-2f68b98 830->837 838 2f68b9d-2f68ba0 830->838 837->838 839 2f68ba2-2f68bc8 838->839 840 2f68bcd-2f68bd0 838->840 839->840 847 2f68bd2-2f68be8 840->847 848 2f68bed-2f68bf0 840->848 847->848 849 2f68bf2-2f68c18 848->849 850 2f68c1d-2f68c20 848->850 849->850 857 2f68c22-2f68c48 850->857 858 2f68c4d-2f68c50 850->858 857->858 859 2f68c52-2f68c5e 858->859 860 2f68c6b-2f68c6e 858->860 881 2f68c66 859->881 866 2f68c70-2f68c96 860->866 867 2f68c9b-2f68c9e 860->867 866->867 869 2f68ca0-2f68cc6 867->869 870 2f68ccb-2f68cce 867->870 869->870 875 2f68cd0-2f68cf6 870->875 876 2f68cfb-2f68cfe 870->876 875->876 878 2f68d00-2f68d26 876->878 879 2f68d2b-2f68d2e 876->879 878->879 884 2f68d30-2f68d56 879->884 885 2f68d5b-2f68d5e 879->885 881->860 884->885 888 2f68d60-2f68d86 885->888 889 2f68d8b-2f68d8e 885->889 888->889 893 2f68d90-2f68db6 889->893 894 2f68dbb-2f68dbe 889->894 893->894 897 2f68dc0-2f68de6 894->897 898 2f68deb-2f68dee 894->898 897->898 903 2f68df0-2f68e16 898->903 904 2f68e1b-2f68e1e 898->904 903->904 907 2f68e20 904->907 908 2f68e2b-2f68e2e 904->908 917 2f68e26 907->917 913 2f68e30-2f68e56 908->913 914 2f68e5b-2f68e5e 908->914 913->914 920 2f68e60-2f68e86 914->920 921 2f68e8b-2f68e8e 914->921 917->908 920->921 923 2f68e90-2f68eb6 921->923 924 2f68ebb-2f68ebe 921->924 923->924 929 2f68ec0-2f68ee6 924->929 930 2f68eeb-2f68eed 924->930 929->930 932 2f68ef4-2f68ef7 930->932 933 2f68eef 930->933 932->732 938 2f68efd-2f68f03 932->938 933->932 945->774 946->774 947->774
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1eadd560aef0dc16a47208bbb1326776b3b7f97fd85f29c26119857d810ca2b9
                                                • Instruction ID: 20a002b2fc841b76cae849581fe17ad923ce886658262f14e1de583d6b49d88f
                                                • Opcode Fuzzy Hash: 1eadd560aef0dc16a47208bbb1326776b3b7f97fd85f29c26119857d810ca2b9
                                                • Instruction Fuzzy Hash: 40126035B012079BDB19AB2CE49822837A3FBC5790F25896CD105DB354CF79DC8ADB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dcee65a8cc60584e29f38a88612d25e4521ac61b9f2367003b9137bc357d1e63
                                                • Instruction ID: 177105825dc6fe953811595d76aaa619d8320d93f54e764f5a930a91dd54d24a
                                                • Opcode Fuzzy Hash: dcee65a8cc60584e29f38a88612d25e4521ac61b9f2367003b9137bc357d1e63
                                                • Instruction Fuzzy Hash: 32A14F35B001098FDB14DBA4D998AADBBF2FF88354F248569EA06E7364DB35DC41CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8db67b5ad77e954de7e5fafe32b216a6b97b96efa77dfabd678a664d64651863
                                                • Instruction ID: 5c0f52a9770dda93c6265e7632223ec750ba98253739b2e3c02dc3285a72286c
                                                • Opcode Fuzzy Hash: 8db67b5ad77e954de7e5fafe32b216a6b97b96efa77dfabd678a664d64651863
                                                • Instruction Fuzzy Hash: D3B13970E0021A8FDB20DFA8C8997ADBBF2EF48794F148129D915A7394EB749845CF91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 136036ab394d5bde41a4fbe1e4da99db9cfa7da09fcc1fe23e507bc688912bb6
                                                • Instruction ID: 42072c6f0779d10e8aaeeb2864243bd118a344f70eea4188bb629934759041c9
                                                • Opcode Fuzzy Hash: 136036ab394d5bde41a4fbe1e4da99db9cfa7da09fcc1fe23e507bc688912bb6
                                                • Instruction Fuzzy Hash: 49912E35A001058FDB14DFA4D988AADBBB2EF88354F248569EA06E7364DB35EC41CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f0514e80e5ef5a3c669b3f431bc3aba2543523913b11a43903f4c197865d0375
                                                • Instruction ID: fb727957801f69d33a2284c378cc988879d3d9743b5e2d3da62c4796304b30f3
                                                • Opcode Fuzzy Hash: f0514e80e5ef5a3c669b3f431bc3aba2543523913b11a43903f4c197865d0375
                                                • Instruction Fuzzy Hash: 73815F35A001058FDB14DFA4D988AADBBF2FF88350F248569EA05A7364DB35EC42CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05b7f24b5bcb591f81b296a26b15946454ebc2da2591574890b56e266a1d5719
                                                • Instruction ID: c959a8acfcef5e817a2b3f09ae50e20ef971777da0fc8d37338ae29eb926ae2d
                                                • Opcode Fuzzy Hash: 05b7f24b5bcb591f81b296a26b15946454ebc2da2591574890b56e266a1d5719
                                                • Instruction Fuzzy Hash: 0E618F30B00115CFDB14EF69C558AAEB7B6FF89744F2040A9E506EB3A1DB759C41CBA1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7784e22cf3415b5b4558f13cfcaf72f834323af7c0fac0e88d170da6ecc3287
                                                • Instruction ID: 7870166487dfef0fde8d64005c58f2503174bed87f097d10a3bff0598533f5c5
                                                • Opcode Fuzzy Hash: d7784e22cf3415b5b4558f13cfcaf72f834323af7c0fac0e88d170da6ecc3287
                                                • Instruction Fuzzy Hash: DF41D270F012468FDF25CA68D59477E7772EB86354F20486AD206EB382D739DC868B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f6f856a69b64ed68a4e9c7dec104827d42b197a702e957306882e12c5f875287
                                                • Instruction ID: 327210285fe120530a64537dc65fe691d97a7de2518a3c3bdaa6977ea8bb31be
                                                • Opcode Fuzzy Hash: f6f856a69b64ed68a4e9c7dec104827d42b197a702e957306882e12c5f875287
                                                • Instruction Fuzzy Hash: 7D513D75A00209DFDB44DFA9E884799FBB1FF88310F14C1A9E9089B355EB70D845CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6f1f709c97941096b52fa15d9b492e476d8f83d6bc204bd38f17a77909cc2ab1
                                                • Instruction ID: 84a24e5224d88c99bfcebf44107c89f183cf67f03d2884546fb143f47a7a9102
                                                • Opcode Fuzzy Hash: 6f1f709c97941096b52fa15d9b492e476d8f83d6bc204bd38f17a77909cc2ab1
                                                • Instruction Fuzzy Hash: AB510470E102188FDB14CFA9C888BADBBB5FF48354F14812AE916AB355D778A844CF94
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e61188b79a81ed529cdb1831bfa0bc71f89347fe04a30e6245bcb0414a046983
                                                • Instruction ID: ea2c0dd0a1f05eb9d81084e022eb352fa2adbe5830e84ad373eba6f09ec977f9
                                                • Opcode Fuzzy Hash: e61188b79a81ed529cdb1831bfa0bc71f89347fe04a30e6245bcb0414a046983
                                                • Instruction Fuzzy Hash: 00510370E002188FDB14CFA9C888BAEFBB5FF48314F14811AE916AB351D778A844CF95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0efc28c3a0cd8a6f0f5a75ac1617fd14ac5f173f23642f93c67a9491779c751d
                                                • Instruction ID: 25c73c65a7249125b9d814763778978f48f139cd39dbdb7bcdc9e4fd0248b079
                                                • Opcode Fuzzy Hash: 0efc28c3a0cd8a6f0f5a75ac1617fd14ac5f173f23642f93c67a9491779c751d
                                                • Instruction Fuzzy Hash: 3A514E38216246CFC709DF2AF9909543FB1FBDA345304A6ADE1149B362DA782DC6CF81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4d71aeb29064878347f79659919c5cfc774907ee484fbd0fab7603c839587849
                                                • Instruction ID: c22320aa2a701dd85473e53aeda5d6b8f03c087e1d8e76eebea915784cc89f2f
                                                • Opcode Fuzzy Hash: 4d71aeb29064878347f79659919c5cfc774907ee484fbd0fab7603c839587849
                                                • Instruction Fuzzy Hash: 17511B38616246CFC709DF2AF9909583FB1FBDA345304A6ADE1149B362DA782DC5CF81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3522a89daa37c012b61471cf52e88501d9e3c35f82211a4dcd0ee365d0228572
                                                • Instruction ID: fa5ca3243fb90cb10d061cd36a1f7ccdd2e7d4fdc08976eaebc3f20d5bce2637
                                                • Opcode Fuzzy Hash: 3522a89daa37c012b61471cf52e88501d9e3c35f82211a4dcd0ee365d0228572
                                                • Instruction Fuzzy Hash: 2D314D75B00616EFD705CB68C880E7AB7B6FBC8300F55C168E5019B299CB35EC92CBA0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a758a39a5f39ef37da76f3ced436778e0f30e985eaa27342131e50e20f230eb7
                                                • Instruction ID: b021b8d86438cb4d86a699cfd42b330f20dc6e68a4f1ae92c3896db81b02df71
                                                • Opcode Fuzzy Hash: a758a39a5f39ef37da76f3ced436778e0f30e985eaa27342131e50e20f230eb7
                                                • Instruction Fuzzy Hash: 4C314E31E0021A9FDB14EFA5D4487AEF7B6EF85354F608525E506EB280EB70AD85CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 35003103d717e2f4e3f3a393c9af96e430978575749943fa9e9c468215a79e9f
                                                • Instruction ID: 1eecc0447583100c6bdef255378498fcb49ac2d0f71c257e51efb01555fd5863
                                                • Opcode Fuzzy Hash: 35003103d717e2f4e3f3a393c9af96e430978575749943fa9e9c468215a79e9f
                                                • Instruction Fuzzy Hash: CB41D0B1D0034DDFDB10CFA9C984AEEBBB5EF48314F14802AE909AB254DB759945CF90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05dacc9c045b9159a3305b11b4549e0f1d0ee9637d00d19a5287a3b0889b26e6
                                                • Instruction ID: e085733712706fd7ccffd03a1c992e4bcd92ff435bafaf945cf138382823e3e4
                                                • Opcode Fuzzy Hash: 05dacc9c045b9159a3305b11b4549e0f1d0ee9637d00d19a5287a3b0889b26e6
                                                • Instruction Fuzzy Hash: 6F315E30E0120A9FDB24DFB5C4487AEF7B2EF85744F208529E902EB284D7709845CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1addc23bdc3bcc99f5d3315c75ca6715454935e2c38bae542f2a418f9549fb2
                                                • Instruction ID: b3db6d58d523d057745cdb9026e05bd2e4ca165cfc9184d1943eb85ff8142bed
                                                • Opcode Fuzzy Hash: e1addc23bdc3bcc99f5d3315c75ca6715454935e2c38bae542f2a418f9549fb2
                                                • Instruction Fuzzy Hash: F541EFB0D0034DDFEB10CFA9C984A9EBBF5FF48314F10802AE909AB254DB75A945CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8ebf26c8e0344bfb75650c71fadaa4ad4e8ee9c93059e8eaa04a6d28d5b3aaf2
                                                • Instruction ID: cd1099ad21a4f6911e76c4ff3487186ff54ec4f2db1dbc100e7b84fd93d7f111
                                                • Opcode Fuzzy Hash: 8ebf26c8e0344bfb75650c71fadaa4ad4e8ee9c93059e8eaa04a6d28d5b3aaf2
                                                • Instruction Fuzzy Hash: 35216075E0424A9BDB19CF68D8946AEF7B2FF89340F50C619E905BB341DB719C81CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6aaaba8c18b2b677cf01cd4e0e397d018723c38a61322905e4517758e1174261
                                                • Instruction ID: 6750e593f6db42c1dce14b10ac8ab40706cff9bb8fd105063275ef58c44f387b
                                                • Opcode Fuzzy Hash: 6aaaba8c18b2b677cf01cd4e0e397d018723c38a61322905e4517758e1174261
                                                • Instruction Fuzzy Hash: A4215175E0024A9BDB15CF68D5557AEF7B2FF89340F10C619E905BB241DB719C81CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb178bbc31bc01911591113db2497bdd029081d1253e04b9ec7dacd1c904cdb3
                                                • Instruction ID: d5357b76b53ac7fc6f703d74addccf7bd1ad975d70332999482cf34b6f555654
                                                • Opcode Fuzzy Hash: fb178bbc31bc01911591113db2497bdd029081d1253e04b9ec7dacd1c904cdb3
                                                • Instruction Fuzzy Hash: 3B21A138B011098FEB24DB69E88876A3B66EBC5344F148A69D51ACB355DB7C9C81CB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 17f9f6f5774c64449961493b06f4a99dfb9afa38dbafeaa4eac93c02d7f54854
                                                • Instruction ID: 000a1fbc13f415f3e81772149c6ca8354818ad109fdc2d41f3ff1de9168a0f53
                                                • Opcode Fuzzy Hash: 17f9f6f5774c64449961493b06f4a99dfb9afa38dbafeaa4eac93c02d7f54854
                                                • Instruction Fuzzy Hash: 5021A131E002099FCB18CF64C5946EEF7B2EF89340F20861AE912FB350DBB0A845CB40
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6693bf5485a7f3d16ffde139045af7c7f5cbf77bac50f28b7aa64438e5e046e
                                                • Instruction ID: 988214ed4bf277d7cc83d8aa4b5f194c37cec7655514d7829ea3ffa0fc92cb01
                                                • Opcode Fuzzy Hash: c6693bf5485a7f3d16ffde139045af7c7f5cbf77bac50f28b7aa64438e5e046e
                                                • Instruction Fuzzy Hash: 9D2100317092808FC711EB78D8506AA7BB2EFCA340B1585AEC105CB395DB789C84CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3e9ad77acb7f06c6e727a047cb379258b170a91d0bc74c567cfb45e670d7fbe5
                                                • Instruction ID: 225ddd08de710519806b5921afd8fbf2d3bb371990249be4bdd0618bcf116049
                                                • Opcode Fuzzy Hash: 3e9ad77acb7f06c6e727a047cb379258b170a91d0bc74c567cfb45e670d7fbe5
                                                • Instruction Fuzzy Hash: C3212D30A00245CFDB14EB78C5687AE77F2EF89385F200568D20AEB354DB358D40CB51
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f84eeb5eb2b953885d1125b45b416d607987303df7ff9e15d33d26c0299036d9
                                                • Instruction ID: 52e54fa1beeb6d7b6aa3d7c9429c2d066653a9fdbe9aa21c68dffd66bcaa554a
                                                • Opcode Fuzzy Hash: f84eeb5eb2b953885d1125b45b416d607987303df7ff9e15d33d26c0299036d9
                                                • Instruction Fuzzy Hash: F0217F31B101048FEB14DB79C968BAD77F6EF88714F218169E605FB3A4DA718D41CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593600059.0000000002DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DDD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2ddd000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f9b7c96147310eb145bae83ace9b13451a9eab492f444c7e1d50608cebfbf865
                                                • Instruction ID: a45c0fb90b4d58a1686999822398179b569d09151d8cc49668f02ce07599bf6f
                                                • Opcode Fuzzy Hash: f9b7c96147310eb145bae83ace9b13451a9eab492f444c7e1d50608cebfbf865
                                                • Instruction Fuzzy Hash: 32210072504604EFDF14DF14D980B26BBA6EBC4314F70C56DE94A0A352C37AD846CA62
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 66194e2389e6864b43e33c668f54ef1a898f73638ffc1c63849d36aa65100fed
                                                • Instruction ID: 52a795492b55a9aef46bbf2a5b0df1d9251188ad80e5efd2e107abbebb3a52a8
                                                • Opcode Fuzzy Hash: 66194e2389e6864b43e33c668f54ef1a898f73638ffc1c63849d36aa65100fed
                                                • Instruction Fuzzy Hash: 3C210234B00105DFDB14EB78C958AAE77F2EB89745B2004A8E506EB3A4DB769D41CBA1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593600059.0000000002DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DDD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2ddd000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f73cc1749d2a69e6ed7760e567ba9dbbacb9a445707005da1006d433af3f5be8
                                                • Instruction ID: 48ce8073fbdeb0f9298202a11b4cd67a07ca280fe21d6575ece5c8af189f6d4f
                                                • Opcode Fuzzy Hash: f73cc1749d2a69e6ed7760e567ba9dbbacb9a445707005da1006d433af3f5be8
                                                • Instruction Fuzzy Hash: 54214B711097C09FCB03CB64D990711BF71AB46214F2985EBD8898F2A7C33A980ACB62
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a62882d5f85e586d81d029b3c3b4d8bf693f80290906a908e477b8fa7842a6fb
                                                • Instruction ID: 14d11b61e281897f1b99f0f82820ac7af6fd84630cd6ce81bc2724581df2ad59
                                                • Opcode Fuzzy Hash: a62882d5f85e586d81d029b3c3b4d8bf693f80290906a908e477b8fa7842a6fb
                                                • Instruction Fuzzy Hash: A721AE30F012058BDF35A769E48C33A3B61EB42795F144869E60BCB780DB298C958792
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 57c803588fa90d97a03ba28ba49387949a0fb29b61182e792eb45eb57cd82364
                                                • Instruction ID: a958659760a462699457e44a06b57a0092a5a3ad240e822cce57342c55d27b0f
                                                • Opcode Fuzzy Hash: 57c803588fa90d97a03ba28ba49387949a0fb29b61182e792eb45eb57cd82364
                                                • Instruction Fuzzy Hash: D9215E71B101058FEB14DB68C958BBD7BF6EF88714F258169E605FB3A4DA718D01CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b489fce038efcf45ca430c2b6590643a5551562c54bd646e1c9ff9196894d67a
                                                • Instruction ID: c9d5f87d6d157e69104b3dfeba7cbb5f0d32f4e4ae69335c8cf941b8ee9e9f34
                                                • Opcode Fuzzy Hash: b489fce038efcf45ca430c2b6590643a5551562c54bd646e1c9ff9196894d67a
                                                • Instruction Fuzzy Hash: 8221EA30B00255CBDB14EB78C5687AE77F2EB89785F200468D60AEB354DB769D41CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 281d046ce54ac79225abbfa0488ca9b909ebfdbad4070ac50ea8bed79dd8a983
                                                • Instruction ID: 0a584f126a47cc16d931b19c3a5f23b5be525758720622ed79c739270641b9eb
                                                • Opcode Fuzzy Hash: 281d046ce54ac79225abbfa0488ca9b909ebfdbad4070ac50ea8bed79dd8a983
                                                • Instruction Fuzzy Hash: 47216231E002199BDB18CF64C4946AEF7B6EF89350F60861AE916FB340DBB0A845CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bd9ea3a82c369e683a107e6688deac8804f8f3277c253531bab3e37dd46ddf85
                                                • Instruction ID: 0a5a4baac21042a0f12b0b27489a563559f421208f95937cb97b67b4ae66e182
                                                • Opcode Fuzzy Hash: bd9ea3a82c369e683a107e6688deac8804f8f3277c253531bab3e37dd46ddf85
                                                • Instruction Fuzzy Hash: D221A538B011098BEF24E729E88872A3766EBC5744F105A29D61ACF355DF7DDC80CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6a228b5c946e792b7de868f8bd0a54a90c78b326c1a068a3634245e78e4b6ec0
                                                • Instruction ID: d92c00866c516e1bb8a5ff4d0e8f8976c2b355b0e371276b184acb87aa3e129b
                                                • Opcode Fuzzy Hash: 6a228b5c946e792b7de868f8bd0a54a90c78b326c1a068a3634245e78e4b6ec0
                                                • Instruction Fuzzy Hash: 3221F434B00205DFDB54EB78C958AAE77F2EB89745B2004A8E506EB3A0DB76DD41CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d45977de7377a554cc94798abca6dd2d986d8a2f37faeea25aa328edceb0c639
                                                • Instruction ID: 0a167ecd55bcc646f2ee64905b6887009c42feb7c4d54ded3fe03fa8274f3b0f
                                                • Opcode Fuzzy Hash: d45977de7377a554cc94798abca6dd2d986d8a2f37faeea25aa328edceb0c639
                                                • Instruction Fuzzy Hash: 47116A31F002098BEF649A79D408B3A3661FB866A4F30486DD216CF385DF65CC858BD1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 479600ebae8df0ad46db2a4594b7de3094fc54d42e43eeb45e2676de0ed2211c
                                                • Instruction ID: 909fc018dfb8e34b9b265046b6dd43b8be525d56643ec59d6333933687c0e987
                                                • Opcode Fuzzy Hash: 479600ebae8df0ad46db2a4594b7de3094fc54d42e43eeb45e2676de0ed2211c
                                                • Instruction Fuzzy Hash: 5F119E31F012098BEF259A759418B7A3661FB862A4F34486ED652CF281EF65CC858BD2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5813fc485812257358274127381925b72ab258a53ae8ffd0826f0b11c800129f
                                                • Instruction ID: f8dfb7cff9f5b28a1eede465c020d99f2b286460365941d831ee68dee74a198f
                                                • Opcode Fuzzy Hash: 5813fc485812257358274127381925b72ab258a53ae8ffd0826f0b11c800129f
                                                • Instruction Fuzzy Hash: 1E112335F012658FCB10EBB5980866F7BF5FB89B90F104528E90AD7344EB388982CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 568ff85d82a107f3d702a546822c03aad78d4bd1cdb7e3febb03739f0b1e8518
                                                • Instruction ID: 2a0347297b5955a2043897e6b8c4cbb2a48dffa34eac923a21f1c01a2c821b91
                                                • Opcode Fuzzy Hash: 568ff85d82a107f3d702a546822c03aad78d4bd1cdb7e3febb03739f0b1e8518
                                                • Instruction Fuzzy Hash: FB115131E012158FCB21EFB889982BEB7B1EB49390B240479D909EB301EB35C941CBD1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad75289ffc94667af40a96c19764564bcb2ba2669fa8c741fecd78d2ecaa430b
                                                • Instruction ID: abd36a4d14bd33f54562d24606ec82fb30cd3addc70ba56d49ac2acdeedea1d5
                                                • Opcode Fuzzy Hash: ad75289ffc94667af40a96c19764564bcb2ba2669fa8c741fecd78d2ecaa430b
                                                • Instruction Fuzzy Hash: D4012131E002159FCB25EFB889582BEB7F5EB49290B240479D509EB301EB35D941CBD5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 32e55ad39f5779e4350094c1f6edd9ac88d78a5e0cb8fb8cc9eb374d79829ef0
                                                • Instruction ID: 056fc6912160b9a60a36dd4d03d7203594762b850f5675433c996c82d086c9f4
                                                • Opcode Fuzzy Hash: 32e55ad39f5779e4350094c1f6edd9ac88d78a5e0cb8fb8cc9eb374d79829ef0
                                                • Instruction Fuzzy Hash: CF017131E001058BDB44DF94D9847AABB66FF84311F64C668C90C6B39AEBB4AD05CBA0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 818c5d58677686367bedfd2c312a2673a964e80513317ce51c5df63b5ce52180
                                                • Instruction ID: c5f2067dd80674426326afe63bd3006e5e0235cfc51fc0249674899cc448a1ee
                                                • Opcode Fuzzy Hash: 818c5d58677686367bedfd2c312a2673a964e80513317ce51c5df63b5ce52180
                                                • Instruction Fuzzy Hash: D611F330D00248DEEF36EA94D99C7FCB772EF2139AF24242AD121B21A09B7048C5CF11
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 177ae5ecf0aa3706f4bb0c6567a03749eea0065be795644f36c5056572c8d48d
                                                • Instruction ID: ca1dc67114beb7190c907de8da0230082a4fbfc2be53734af7b52d1665816070
                                                • Opcode Fuzzy Hash: 177ae5ecf0aa3706f4bb0c6567a03749eea0065be795644f36c5056572c8d48d
                                                • Instruction Fuzzy Hash: EE015A74A0114EDFDB45EFA8E891A8C7FB1EB85300F1486ACC504AF251EA342E45DB61
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76847a4304e22b005346bce5f408afa449630543d1d0918d611c1998dc0832ff
                                                • Instruction ID: e7da02e8926540b9179b50bcbaa4aea4ae823d967843026d3a02bceb43835ce4
                                                • Opcode Fuzzy Hash: 76847a4304e22b005346bce5f408afa449630543d1d0918d611c1998dc0832ff
                                                • Instruction Fuzzy Hash: 63F0C439B01104CFC714EB74E598A6C77B2EF89B55F5184A8E5069B3A4DB35AD42CF40
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.4593836596.0000000002F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_2f60000_InstallUtil.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 938017985ef0a22a2df1e2109557e68eed93fe56bffa78f30352bba64170767b
                                                • Instruction ID: bb7a4222682f43f379bf241e44f57ff69be0bc1b8e387ba6689d1c74dfd99707
                                                • Opcode Fuzzy Hash: 938017985ef0a22a2df1e2109557e68eed93fe56bffa78f30352bba64170767b
                                                • Instruction Fuzzy Hash: 57F04F34A0014EDFDF44EFA8F88169D7BB5EBC0300F6096ACC504AB250EE752E459B91