Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SSA-Statement283482.exe

Overview

General Information

Sample name:SSA-Statement283482.exe
Analysis ID:1510120
MD5:3947493098fa9f8ad99838b31b1718ca
SHA1:46c9b68d1a104a46d79025965cae26f44e768985
SHA256:aa1b77e4203f23734eee91f426b9167c579f3a075ddc45c42ac4714ddc56d03a
Tags:exe
Infos:

Detection

ScreenConnect Tool
Score:63
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:32
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to hide user accounts
Enables network access during safeboot for specific services
Modifies security policies related information
Reads the Security eventlog
Reads the System eventlog
Sigma detected: Remote Access Tool - ScreenConnect Suspicious Execution
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Enables debug privileges
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected ScreenConnect Tool

Classification

  • System is w10x64
  • SSA-Statement283482.exe (PID: 8 cmdline: "C:\Users\user\Desktop\SSA-Statement283482.exe" MD5: 3947493098FA9F8AD99838B31B1718CA)
    • msiexec.exe (PID: 5448 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\8139d6693ff11377\setup.msi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 6696 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5868 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding FA703DBE50430AA3AE223680D26C73B8 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • rundll32.exe (PID: 6672 cmdline: rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI99FE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3906140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments MD5: 889B99C52A60DD49227C5E485A016679)
    • msiexec.exe (PID: 1516 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding F47F0135428421DD6AA24B08E4ABF26D MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 6976 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding B204C9D5325E238648AF623869E5D724 E Global\MSI0000 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • ScreenConnect.ClientService.exe (PID: 7204 cmdline: "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk&c=QuadChomes&c=QuadChomes.com&c=&c=Host&c=&c=&c=&c=" MD5: 361BCC2CB78C75DD6F583AF81834E447)
    • ScreenConnect.WindowsClient.exe (PID: 7280 cmdline: "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe" "RunRole" "784d1de5-465a-4b33-b06c-f62c00412c92" "User" MD5: 20AB8141D958A58AADE5E78671A719BF)
  • svchost.exe (PID: 7416 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SSA-Statement283482.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Config.Msi\3ba078.rbsJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
      C:\Windows\Installer\MSIA2A9.tmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
        C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.1775891248.0000000005870000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
            00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
              00000008.00000002.2990249542.0000000002C81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                  Process Memory Space: SSA-Statement PID: 8JoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                    Click to see the 3 entries
                    SourceRuleDescriptionAuthorStrings
                    0.2.SSA-Statement283482.exe.5870000.11.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                      8.0.ScreenConnect.WindowsClient.exe.3d0000.0.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                        8.2.ScreenConnect.WindowsClient.exe.2cffa20.4.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                          0.0.SSA-Statement283482.exe.263d8.2.raw.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                            0.2.SSA-Statement283482.exe.5870000.11.unpackJoeSecurity_ScreenConnectToolYara detected ScreenConnect ToolJoe Security
                              Click to see the 3 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk&c=QuadChomes&c=QuadChomes.com&c=&c=Host&c=&c=&c=&c=", CommandLine: "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk&c=QuadChomes&c=QuadChomes.com&c=&c=Host&c=&c=&c=&c=", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe, NewProcessName: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe, OriginalFileName: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk&c=QuadChomes&c=QuadChomes.com&c=&c=Host&c=&c=&c=&c=", ProcessId: 7204, ProcessName: ScreenConnect.ClientService.exe
                              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7416, ProcessName: svchost.exe
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: SSA-Statement283482.exeReversingLabs: Detection: 23%
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_03A91738 CryptProtectData,7_2_03A91738
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_03A91730 CryptProtectData,7_2_03A91730
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeEXE: msiexec.exeJump to behavior

                              Compliance

                              barindex
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeEXE: msiexec.exeJump to behavior
                              Source: SSA-Statement283482.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: SSA-Statement283482.exeStatic PE information: certificate valid
                              Source: SSA-Statement283482.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2989146177.0000000000FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: SSA-Statement283482.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: SSA-Statement283482.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: SSA-Statement283482.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000007.00000002.3002731702.00000000025C7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: SSA-Statement283482.exe, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2988908903.0000000000BE0000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2989657969.0000000001002000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2990249542.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: SSA-Statement283482.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000007.00000000.1779720856.00000000009ED000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: SSA-Statement283482.exe, ScreenConnect.Windows.dll.2.dr, ScreenConnect.Windows.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1766003141.0000000004E30000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: SSA-Statement283482.exe, 3ba077.msi.2.dr, MSIA2A9.tmp.2.dr, MSIA480.tmp.2.dr, 3ba079.msi.2.dr, 3ba078.rbs.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.4.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000007.00000002.3002731702.00000000025C7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.4.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: SSA-Statement283482.exe, 3ba077.msi.2.dr, MSI99FE.tmp.1.dr, 3ba079.msi.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: SSA-Statement283482.exe, ScreenConnect.Windows.dll.2.dr, ScreenConnect.Windows.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2989146177.0000000000FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.pdb source: ScreenConnect.ClientService.exe, 00000007.00000002.2987674732.0000000000C0E000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000007.00000002.3002731702.00000000025C7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: SSA-Statement283482.exe
                              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                              Source: C:\Windows\System32\svchost.exeFile opened: c:
                              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior

                              Networking

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry value created: NULL ServiceJump to behavior
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: instance-uil9h2-relay.screenconnect.com
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                              Source: svchost.exe, 00000009.00000002.2988465492.00000250DF200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                              Source: ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF418000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                              Source: edb.log.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
                              Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                              Source: qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF418000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF418000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF44D000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                              Source: qmgr.db.9.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                              Source: ScreenConnect.ClientService.exe, 00000007.00000002.2987674732.0000000000C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://instance-uil9h2-relay.screenconnect.com:443/
                              Source: ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001AB6000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001A9E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000019DE000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001869000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000016E9000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000018E2000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000017AD000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.000000000171B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://instance-uil9h2-relay.screenconnect.com:443/d
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0A
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://ocsp.digicert.com0X
                              Source: SSA-Statement283482.exe, 00000000.00000002.1750186684.0000000003101000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001622000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1757129535.0000000004E33000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.4.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr, Microsoft.Deployment.Compression.dll.4.dr, Microsoft.Deployment.Compression.Cab.dll.4.drString found in binary or memory: http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
                              Source: rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1757129535.0000000004E33000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.4.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr, Microsoft.Deployment.Compression.dll.4.dr, Microsoft.Deployment.Compression.Cab.dll.4.drString found in binary or memory: http://wixtoolset.org/news/
                              Source: rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1757129535.0000000004E33000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.4.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr, Microsoft.Deployment.Compression.dll.4.dr, Microsoft.Deployment.Compression.Cab.dll.4.drString found in binary or memory: http://wixtoolset.org/releases/
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                              Source: SSA-Statement283482.exe, ScreenConnect.WindowsBackstageShell.exe.2.dr, ScreenConnect.ClientService.exe.2.dr, ScreenConnect.WindowsFileManager.exe.2.dr, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr, ScreenConnect.WindowsClient.exe.2.dr, ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: http://www.digicert.com/CPS0
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                              Source: ScreenConnect.WindowsCredentialProvider.dll.2.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                              Source: ScreenConnect.Core.dll.2.drString found in binary or memory: https://feedback.screenconnect.com/Feedback.axd
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF4C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
                              Source: edb.log.9.dr, qmgr.db.9.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                              Source: edb.log.9.dr, qmgr.db.9.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
                              Source: edb.log.9.dr, qmgr.db.9.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF4C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
                              Source: svchost.exe, 00000009.00000003.1809505047.00000250DF4C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
                              Source: edb.log.9.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SecurityJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\System\ScreenConnectJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_04EB0540 CreateProcessAsUserW,7_2_04EB0540
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3ba077.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{36B75195-3778-3603-935A-9224F330994C}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2A9.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2C9.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA480.tmpJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3ba079.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\3ba079.msiJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{36B75195-3778-3603-935A-9224F330994C}Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\{36B75195-3778-3603-935A-9224F330994C}\DefaultIconJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Windows\Installer\wix{36B75195-3778-3603-935A-9224F330994C}.SchedServiceConfig.rmiJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\yctqcdfa.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\yctqcdfa.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\tucjce3b.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\tucjce3b.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\mkrxjzen.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\mkrxjzen.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\q55vujtm.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\q55vujtm.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\yzfqfiyk.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\yzfqfiyk.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\emleicwe.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\emleicwe.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\fuo3eybe.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\fuo3eybe.newcfgJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\pk4olpe4.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (8139d6693ff11377)\pk4olpe4.newcfgJump to behavior
                              Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIA2C9.tmpJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_010636A07_2_010636A0
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B2870BA8_2_00007FFD9B2870BA
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B2810CF8_2_00007FFD9B2810CF
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B2810D78_2_00007FFD9B2810D7
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B59776C8_2_00007FFD9B59776C
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B596BE38_2_00007FFD9B596BE3
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B5965218_2_00007FFD9B596521
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B5A393A8_2_00007FFD9B5A393A
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B5996B98_2_00007FFD9B5996B9
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B59B25D8_2_00007FFD9B59B25D
                              Source: SSA-Statement283482.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: SSA-Statement283482.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: SSA-Statement283482.exeStatic PE information: Resource name: FILES type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: SSA-Statement283482.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: SSA-Statement283482.exeStatic PE information: Resource name: FILES type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Source: SSA-Statement283482.exe, 00000000.00000002.1750186684.00000000039E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1750186684.00000000039E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1750186684.00000000039E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1786785688.00000000080B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exe.muiX vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1786785688.00000000080B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsiexec.exeX vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1773279632.0000000005540000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1773961502.0000000005690000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1774068518.00000000056B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamelibwebp.dllB vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1774068518.00000000056B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamezlib.dll2 vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1774068518.00000000056B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1759187338.00000000042C3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1773499606.00000000055F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.000000000054F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.000000000054F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1775891248.0000000005A2C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1775891248.0000000005A2C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSfxCA.dllL vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1775891248.0000000005A2C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamewixca.dll\ vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exe, 00000000.00000002.1775891248.0000000005A2C000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameScreenConnect.Core.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenamelibwebp.dllB vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenamezlib.dll2 vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameScreenConnect.Windows.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameScreenConnect.WindowsInstaller.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameScreenConnect.InstallerActions.dll< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameSfxCA.dllL vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenamewixca.dll\ vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameScreenConnect.ClientInstallerRunner.exe< vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeBinary or memory string: OriginalFilenameDotNetResolver.exe4 vs SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.SSA-Statement283482.exe.263d8.2.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.2.SSA-Statement283482.exe.55f0000.5.raw.unpack, CursorBuffer.csCryptographic APIs: 'TransformBlock'
                              Source: 0.0.SSA-Statement283482.exe.ac3d8.4.raw.unpack, WindowsToolkit.csCryptographic APIs: 'CreateDecryptor'
                              Source: 0.0.SSA-Statement283482.exe.ac3d8.4.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.0.SSA-Statement283482.exe.ac3d8.4.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.0.SSA-Statement283482.exe.ac3d8.4.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsExtensions.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsExtensions.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: classification engineClassification label: mal63.evad.winEXE@16/63@3/2
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)Jump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SSA-Statement283482.exe.logJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeMutant created: NULL
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeFile created: C:\Users\user\AppData\Local\Temp\ScreenConnectJump to behavior
                              Source: SSA-Statement283482.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: SSA-Statement283482.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI99FE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3906140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: SSA-Statement283482.exeReversingLabs: Detection: 23%
                              Source: SSA-Statement283482.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2
                              Source: SSA-Statement283482.exeString found in binary or memory: $F294ACFC-3146-4483-A7BF-ADDCA7C260E2)
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeFile read: C:\Users\user\Desktop\SSA-Statement283482.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\SSA-Statement283482.exe "C:\Users\user\Desktop\SSA-Statement283482.exe"
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\8139d6693ff11377\setup.msi"
                              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FA703DBE50430AA3AE223680D26C73B8 C
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI99FE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3906140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F47F0135428421DD6AA24B08E4ABF26D
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B204C9D5325E238648AF623869E5D724 E Global\MSI0000
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk&c=QuadChomes&c=QuadChomes.com&c=&c=Host&c=&c=&c=&c="
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe" "RunRole" "784d1de5-465a-4b33-b06c-f62c00412c92" "User"
                              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\8139d6693ff11377\setup.msi"Jump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FA703DBE50430AA3AE223680D26C73B8 CJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding F47F0135428421DD6AA24B08E4ABF26DJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding B204C9D5325E238648AF623869E5D724 E Global\MSI0000Jump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI99FE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3906140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArgumentsJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe "C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe" "RunRole" "784d1de5-465a-4b33-b06c-f62c00412c92" "User"Jump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cabinet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: wtsapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: winsta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: netapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: rasapi32.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: rasman.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: rtutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: version.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeSection loaded: dwrite.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: esent.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: mi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: webio.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: es.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dll
                              Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dll
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: SSA-Statement283482.exeStatic PE information: certificate valid
                              Source: SSA-Statement283482.exeStatic file information: File size 5620224 > 1048576
                              Source: SSA-Statement283482.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x533200
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                              Source: SSA-Statement283482.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Source: SSA-Statement283482.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsFileManager\obj\Release\ScreenConnect.WindowsFileManager.pdb source: ScreenConnect.WindowsFileManager.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdbU source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2989146177.0000000000FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdbe source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdbM source: SSA-Statement283482.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientInstallerRunner\obj\Release\ScreenConnect.ClientInstallerRunner.pdb source: SSA-Statement283482.exe
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsInstaller\obj\Release\net20\ScreenConnect.WindowsInstaller.pdb source: SSA-Statement283482.exe
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdbT source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsBackstageShell\obj\Release\ScreenConnect.WindowsBackstageShell.pdb source: ScreenConnect.WindowsBackstageShell.exe.2.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller.Package\Microsoft.Deployment.WindowsInstaller.Package.pdb source: Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr
                              Source: Binary string: C:\Compile\screenconnect\Product\WindowsAuthenticationPackage\bin\Release\ScreenConnect.WindowsAuthenticationPackage.pdb source: ScreenConnect.ClientService.exe, 00000007.00000002.3002731702.00000000025C7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsAuthenticationPackage.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Core\obj\Release\net20\ScreenConnect.Core.pdb source: SSA-Statement283482.exe, ScreenConnect.Core.dll.4.dr, ScreenConnect.Core.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\ClientService\obj\Release\ScreenConnect.ClientService.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2988908903.0000000000BE0000.00000004.08000000.00040000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2989657969.0000000001002000.00000002.00000001.01000000.0000000D.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2990249542.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\DotNetResolver\obj\Debug\DotNetResolver.pdb source: SSA-Statement283482.exe
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetServiceRunner.pdb source: ScreenConnect.ClientService.exe, 00000007.00000000.1779720856.00000000009ED000.00000002.00000001.01000000.0000000C.sdmp, ScreenConnect.ClientService.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdb source: SSA-Statement283482.exe, ScreenConnect.Windows.dll.2.dr, ScreenConnect.Windows.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression.Cab\Microsoft.Deployment.Compression.Cab.pdb source: rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1766003141.0000000004E30000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.Cab.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\WindowsInstaller\Microsoft.Deployment.WindowsInstaller.pdb source: Microsoft.Deployment.WindowsInstaller.dll.4.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\ship\x86\wixca.pdb source: SSA-Statement283482.exe, 3ba077.msi.2.dr, MSIA2A9.tmp.2.dr, MSIA480.tmp.2.dr, 3ba079.msi.2.dr, 3ba078.rbs.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\build\work\eca3d12b\wix3\build\obj\ship\x86\Compression\Microsoft.Deployment.Compression.pdb source: rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.Compression.dll.4.dr
                              Source: Binary string: screenconnect_windows_credential_provider.pdb source: ScreenConnect.ClientService.exe, 00000007.00000002.3002731702.00000000025C7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\WindowsClient\obj\Release\ScreenConnect.WindowsClient.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.2.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\InstallerActions\obj\Release\ScreenConnect.InstallerActions.pdb source: ScreenConnect.InstallerActions.dll.4.dr
                              Source: Binary string: E:\delivery\Dev\wix37_public\build\ship\x86\SfxCA.pdb source: SSA-Statement283482.exe, 3ba077.msi.2.dr, MSI99FE.tmp.1.dr, 3ba079.msi.2.dr, setup.msi.0.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Windows\obj\Release\net20\ScreenConnect.Windows.pdbW] source: SSA-Statement283482.exe, ScreenConnect.Windows.dll.2.dr, ScreenConnect.Windows.dll.4.dr
                              Source: Binary string: C:\builds\cc\cwcontrol\Product\Client\obj\Release\net20\ScreenConnect.Client.pdb source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2989146177.0000000000FC2000.00000002.00000001.01000000.00000010.sdmp, ScreenConnect.Client.dll.2.dr
                              Source: Binary string: \??\C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.pdb source: ScreenConnect.ClientService.exe, 00000007.00000002.2987674732.0000000000C0E000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: screenconnect_windows_credential_provider.pdb' source: ScreenConnect.ClientService.exe, 00000007.00000002.3002731702.00000000025C7000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsClient.exe, 00000008.00000002.2999805002.0000000012C90000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.WindowsCredentialProvider.dll.2.dr
                              Source: Binary string: C:\Users\jmorgan\Source\cwcontrol\Custom\DotNetRunner\Release\DotNetRunner.pdb source: SSA-Statement283482.exe
                              Source: SSA-Statement283482.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                              Source: SSA-Statement283482.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                              Source: SSA-Statement283482.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                              Source: SSA-Statement283482.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                              Source: SSA-Statement283482.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                              Data Obfuscation

                              barindex
                              Source: 0.0.SSA-Statement283482.exe.5578f8.3.raw.unpack, Program.cs.Net Code: Main System.Reflection.Assembly.Load(byte[])
                              Source: SSA-Statement283482.exeStatic PE information: real checksum: 0x54fd91 should be: 0x56a8dd
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeCode function: 0_2_015D6F00 push eax; mov dword ptr [esp], ecx0_2_015D6F11
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_04EB7DC4 push esp; retf 7_2_04EB7DD3
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_04EB7DD4 push esp; retf 7_2_04EB7DE3
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_04EB7DBF push esp; retf 7_2_04EB7DC3
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_04EB7E47 push esp; retf 7_2_04EB7DD3
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B59428D push ebx; iretd 8_2_00007FFD9B5942AA
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeCode function: 8_2_00007FFD9B592F3C pushfd ; iretd 8_2_00007FFD9B592F3D
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2C9.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA480.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA2C9.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA480.tmpJump to dropped file
                              Source: ScreenConnect.ClientService.dll.2.drBinary or memory string: bcdedit.exeg/copy {current} /d "Reboot and Reconnect Safe Mode"7{.{8}-.{4}-.{4}-.{4}-.{12}}
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\ApplicationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (8139d6693ff11377)Jump to behavior

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: SSA-Statement283482.exe, 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: SSA-Statement283482.exe, 00000000.00000002.1774068518.00000000056B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: rundll32.exe, 00000004.00000003.1756510783.0000000004FB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2988908903.0000000000BE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2989657969.0000000001002000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.2990249542.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000002.3006070613.000000001B592000.00000002.00000001.01000000.0000000F.sdmpString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: SSA-Statement283482.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.ClientService.dll.2.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList?ScreenConnect.WindowsClient.exe
                              Source: ScreenConnect.Windows.dll.2.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: ScreenConnect.Windows.dll.4.drString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeMemory allocated: 15D0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeMemory allocated: 66C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeMemory allocated: 5EB0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeMemory allocated: 1060000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeMemory allocated: 15C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeMemory allocated: 13D0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeMemory allocated: B90000 memory reserve | memory write watchJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeMemory allocated: 11A0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.InstallerActions.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsAuthenticationPackage.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsBackstageShell.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsFileManager.exeJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.Compression.Cab.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA2C9.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA480.tmpJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Windows.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.Compression.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsCredentialProvider.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Core.dllJump to dropped file
                              Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.dllJump to dropped file
                              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dllJump to dropped file
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exe TID: 2916Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe TID: 7264Thread sleep count: 39 > 30Jump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe TID: 7496Thread sleep time: -30000s >= -30000sJump to behavior
                              Source: C:\Windows\System32\svchost.exe TID: 7452Thread sleep time: -30000s >= -30000s
                              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: setup.msi.0.drBinary or memory string: VMCi-
                              Source: svchost.exe, 00000009.00000002.2988584621.00000250DF253000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2987238245.00000250D9C2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                              Source: ScreenConnect.ClientService.exe, 00000007.00000002.3011430432.0000000004250000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualAlloc(attemptImageBase, dwSize, WindowsNative.MEM.MEM_COMMIT | WindowsNative.MEM.MEM_RESERVE, WindowsNative.PAGE.PAGE_READWRITE)
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.LoadLibrary(loadedImageBase + ptr[i].Name)
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.GetProcAddress(intPtr, ptr5)
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsMemoryNativeLibrary.csReference to suspicious API methods: WindowsNative.VirtualProtect(loadedImageBase + sectionHeaders[i].VirtualAddress, (IntPtr)num, flNewProtect, &pAGE)
                              Source: 0.2.SSA-Statement283482.exe.56b0000.8.raw.unpack, WindowsExtensions.csReference to suspicious API methods: HandleMinder.CreateWithFunc(WindowsNative.OpenProcess(processAccess, bInheritHandle: false, processID), WindowsNative.CloseHandle)
                              Source: 0.0.SSA-Statement283482.exe.5578f8.3.raw.unpack, Program.csReference to suspicious API methods: FindResource(moduleHandle, e.Name, "FILES")
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\8139d6693ff11377\setup.msi"Jump to behavior
                              Source: unknownProcess created: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe "c:\program files (x86)\screenconnect client (8139d6693ff11377)\screenconnect.clientservice.exe" "?e=access&y=guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=bgiaaackaabsu0exaagaaaeaaqbtifoccyzyziymra7q%2fxlupwy5psgwtirmantaqcpos3wxm8kzgeilcwiaqrulpkqvk7rqd6bb%2fhzh%2fmngsw2cah4apdev45ug24apv2chftsj6rshgliavmqdpgdtzgv70nokrvbqf4otzhjbjedmnc4eqan%2fjh9itc%2bqr9sxrag6l1z%2bokoxbfhbj6wfpk7eupm6olxgyqoaman4rv%2bfdtlaueme6p2zovuespdohb1g6ubms3fmbjca%2f9azwydk%2f143g89rcdbayabhrd4c4l%2fhfxv8rmfl8imxlpmvnbcvlou8opeaiedgjx8c%2baewmgqksgh4y5dfbur2zklk&c=quadchomes&c=quadchomes.com&c=&c=host&c=&c=&c=&c="
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.2.drBinary or memory string: Progman
                              Source: ScreenConnect.WindowsClient.exe, 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, ScreenConnect.WindowsClient.exe.2.drBinary or memory string: Shell_TrayWnd-Shell_SecondaryTrayWnd%MsgrIMEWindowClass
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.InstallerActions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Core.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Windows.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dll VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_04EB15E0 CreateNamedPipeW,7_2_04EB15E0
                              Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exeCode function: 7_2_01064D2E RtlGetVersion,7_2_01064D2E
                              Source: C:\Users\user\Desktop\SSA-Statement283482.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Lowering of HIPS / PFW / Operating System Security Settings

                              barindex
                              Source: C:\Windows\System32\msiexec.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Lsa Authentication PackagesJump to behavior
                              Source: Yara matchFile source: SSA-Statement283482.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.2.SSA-Statement283482.exe.5870000.11.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 8.0.ScreenConnect.WindowsClient.exe.3d0000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 8.2.ScreenConnect.WindowsClient.exe.2cffa20.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.SSA-Statement283482.exe.263d8.2.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.SSA-Statement283482.exe.5870000.11.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.SSA-Statement283482.exe.d5db8.1.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.SSA-Statement283482.exe.ac3d8.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.0.SSA-Statement283482.exe.10000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000002.1775891248.0000000005870000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000008.00000002.2990249542.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: SSA-Statement PID: 8, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6672, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.ClientService.exe PID: 7204, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: ScreenConnect.WindowsClient.exe PID: 7280, type: MEMORYSTR
                              Source: Yara matchFile source: C:\Config.Msi\3ba078.rbs, type: DROPPED
                              Source: Yara matchFile source: C:\Windows\Installer\MSIA2A9.tmp, type: DROPPED
                              Source: Yara matchFile source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe, type: DROPPED
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire Infrastructure1
                              Valid Accounts
                              1
                              Native API
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              OS Credential Dumping11
                              Peripheral Device Discovery
                              Remote Services11
                              Archive Collected Data
                              22
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomains1
                              Replication Through Removable Media
                              12
                              Command and Scripting Interpreter
                              1
                              DLL Search Order Hijacking
                              1
                              DLL Search Order Hijacking
                              1
                              Deobfuscate/Decode Files or Information
                              LSASS Memory1
                              File and Directory Discovery
                              Remote Desktop ProtocolData from Removable Media1
                              Non-Application Layer Protocol
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain AccountsAt1
                              Valid Accounts
                              1
                              Valid Accounts
                              1
                              Obfuscated Files or Information
                              Security Account Manager24
                              System Information Discovery
                              SMB/Windows Admin SharesData from Network Shared Drive2
                              Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCron2
                              Windows Service
                              1
                              Access Token Manipulation
                              1
                              Software Packing
                              NTDS11
                              Security Software Discovery
                              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchd1
                              Bootkit
                              2
                              Windows Service
                              1
                              DLL Side-Loading
                              LSA Secrets2
                              Process Discovery
                              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts13
                              Process Injection
                              1
                              DLL Search Order Hijacking
                              Cached Domain Credentials41
                              Virtualization/Sandbox Evasion
                              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                              File Deletion
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
                              Masquerading
                              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                              Valid Accounts
                              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Access Token Manipulation
                              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd41
                              Virtualization/Sandbox Evasion
                              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task13
                              Process Injection
                              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                              Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                              Hidden Users
                              GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                              Business RelationshipsServerTrusted RelationshipVisual BasicContainer Orchestration JobContainer Orchestration Job1
                              Bootkit
                              Web Portal CaptureLocal GroupsComponent Object Model and Distributed COMLocal Email CollectionInternal ProxyCommonly Used PortDirect Network Flood
                              Identify Business TempoBotnetHardware AdditionsPythonHypervisorProcess Injection1
                              Rundll32
                              Credential API HookingDomain GroupsExploitation of Remote ServicesRemote Email CollectionExternal ProxyTransfer Data to Cloud AccountReflection Amplification
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1510120 Sample: SSA-Statement283482.exe Startdate: 12/09/2024 Architecture: WINDOWS Score: 63 55 instance-uil9h2-relay.screenconnect.com 2->55 57 server-nixd2d85b70-relay.screenconnect.com 2->57 65 Multi AV Scanner detection for submitted file 2->65 67 .NET source code contains potential unpacker 2->67 69 .NET source code references suspicious native API functions 2->69 71 3 other signatures 2->71 8 msiexec.exe 93 48 2->8         started        12 ScreenConnect.ClientService.exe 17 19 2->12         started        15 SSA-Statement283482.exe 5 2->15         started        17 svchost.exe 2->17         started        signatures3 process4 dnsIp5 35 C:\...\ScreenConnect.ClientService.exe, PE32 8->35 dropped 37 C:\Windows\Installer\MSIA480.tmp, PE32 8->37 dropped 39 C:\Windows\Installer\MSIA2C9.tmp, PE32 8->39 dropped 43 9 other files (none is malicious) 8->43 dropped 73 Enables network access during safeboot for specific services 8->73 75 Modifies security policies related information 8->75 19 msiexec.exe 8->19         started        21 msiexec.exe 1 8->21         started        23 msiexec.exe 8->23         started        59 server-nixd2d85b70-relay.screenconnect.com 147.75.81.4, 443, 49731, 49734 PACKETUS Switzerland 12->59 77 Reads the Security eventlog 12->77 79 Reads the System eventlog 12->79 25 ScreenConnect.WindowsClient.exe 2 12->25         started        41 C:\Users\user\...\SSA-Statement283482.exe.log, ASCII 15->41 dropped 81 Contains functionality to hide user accounts 15->81 28 msiexec.exe 6 15->28         started        61 127.0.0.1 unknown unknown 17->61 file6 signatures7 process8 file9 31 rundll32.exe 11 19->31         started        83 Contains functionality to hide user accounts 25->83 45 C:\Users\user\AppData\Local\...\MSI99FE.tmp, PE32 28->45 dropped signatures10 process11 file12 47 C:\Users\user\...\ScreenConnect.Windows.dll, PE32 31->47 dropped 49 C:\...\ScreenConnect.InstallerActions.dll, PE32 31->49 dropped 51 C:\Users\user\...\ScreenConnect.Core.dll, PE32 31->51 dropped 53 4 other files (none is malicious) 31->53 dropped 63 Contains functionality to hide user accounts 31->63 signatures13

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              SSA-Statement283482.exe24%ReversingLabsWin32.PUA.ConnectWise
                              SourceDetectionScannerLabelLink
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Client.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsAuthenticationPackage.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsBackstageShell.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsCredentialProvider.dll0%ReversingLabs
                              C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsFileManager.exe0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.Compression.Cab.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.Compression.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.Package.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\Microsoft.Deployment.WindowsInstaller.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Core.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.InstallerActions.dll0%ReversingLabs
                              C:\Users\user\AppData\Local\Temp\MSI99FE.tmp-\ScreenConnect.Windows.dll0%ReversingLabs
                              C:\Windows\Installer\MSIA2C9.tmp0%ReversingLabs
                              C:\Windows\Installer\MSIA480.tmp0%ReversingLabs
                              No Antivirus matches
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              http://www.fontbureau.com0%URL Reputationsafe
                              http://www.fontbureau.com/designersG0%URL Reputationsafe
                              http://www.fontbureau.com/designers/?0%URL Reputationsafe
                              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                              http://www.fontbureau.com/designers?0%URL Reputationsafe
                              http://www.tiro.com0%URL Reputationsafe
                              http://www.fontbureau.com/designers0%URL Reputationsafe
                              http://www.goodfont.co.kr0%URL Reputationsafe
                              http://www.carterandcone.coml0%URL Reputationsafe
                              http://www.sajatypeworks.com0%URL Reputationsafe
                              http://www.typography.netD0%URL Reputationsafe
                              http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                              http://www.founder.com.cn/cn0%URL Reputationsafe
                              http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                              http://www.fontbureau.com/designers80%URL Reputationsafe
                              http://www.fonts.com0%URL Reputationsafe
                              http://www.sandoll.co.kr0%URL Reputationsafe
                              http://www.urwpp.deDPlease0%URL Reputationsafe
                              http://www.zhongyicts.com.cn0%URL Reputationsafe
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              http://www.sakkal.com0%URL Reputationsafe
                              http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                              http://instance-uil9h2-relay.screenconnect.com:443/0%Avira URL Cloudsafe
                              http://crl.ver)0%Avira URL Cloudsafe
                              http://wixtoolset.org/news/0%Avira URL Cloudsafe
                              https://g.live.com/odclientsettings/ProdV2.C:0%Avira URL Cloudsafe
                              https://docs.rs/getrandom#nodejs-es-module-support0%Avira URL Cloudsafe
                              http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v0%Avira URL Cloudsafe
                              https://g.live.com/odclientsettings/ProdV20%Avira URL Cloudsafe
                              https://g.live.com/odclientsettings/Prod.C:0%Avira URL Cloudsafe
                              http://wixtoolset.org/releases/0%Avira URL Cloudsafe
                              https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c960%Avira URL Cloudsafe
                              https://feedback.screenconnect.com/Feedback.axd0%Avira URL Cloudsafe
                              http://instance-uil9h2-relay.screenconnect.com:443/d0%Avira URL Cloudsafe
                              https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b60%Avira URL Cloudsafe
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              server-nixd2d85b70-relay.screenconnect.com
                              147.75.81.4
                              truefalse
                                unknown
                                instance-uil9h2-relay.screenconnect.com
                                unknown
                                unknowntrue
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://www.apache.org/licenses/LICENSE-2.0ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.comScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersGScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/?ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/bTheScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers?ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://instance-uil9h2-relay.screenconnect.com:443/ScreenConnect.ClientService.exe, 00000007.00000002.2987674732.0000000000C60000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/vrundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1757129535.0000000004E33000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.4.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr, Microsoft.Deployment.Compression.dll.4.dr, Microsoft.Deployment.Compression.Cab.dll.4.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://docs.rs/getrandom#nodejs-es-module-supportScreenConnect.WindowsCredentialProvider.dll.2.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.ver)svchost.exe, 00000009.00000002.2988465492.00000250DF200000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.tiro.comScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://g.live.com/odclientsettings/ProdV2.C:edb.log.9.dr, qmgr.db.9.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designersScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://wixtoolset.org/news/rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1757129535.0000000004E33000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.4.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr, Microsoft.Deployment.Compression.dll.4.dr, Microsoft.Deployment.Compression.Cab.dll.4.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.goodfont.co.krScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://g.live.com/odclientsettings/Prod.C:edb.log.9.dr, qmgr.db.9.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cn/cTheScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://wixtoolset.org/releases/rundll32.exe, 00000004.00000003.1756510783.0000000004FA7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1756510783.0000000004F38000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1757129535.0000000004E33000.00000004.00000020.00020000.00000000.sdmp, Microsoft.Deployment.WindowsInstaller.dll.4.dr, Microsoft.Deployment.WindowsInstaller.Package.dll.4.dr, Microsoft.Deployment.Compression.dll.4.dr, Microsoft.Deployment.Compression.Cab.dll.4.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cnScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://g.live.com/odclientsettings/ProdV2edb.log.9.dr, qmgr.db.9.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000009.00000003.1809505047.00000250DF4C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://feedback.screenconnect.com/Feedback.axdScreenConnect.Core.dll.2.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleaseScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8ScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.comScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sandoll.co.krScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://instance-uil9h2-relay.screenconnect.com:443/dScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001AB6000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001A9E000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000019DE000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001869000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000016E9000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000018E2000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.00000000017AD000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.000000000171B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.zhongyicts.com.cnScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSSA-Statement283482.exe, 00000000.00000002.1750186684.0000000003101000.00000004.00000800.00020000.00000000.sdmp, ScreenConnect.ClientService.exe, 00000007.00000002.2990824174.0000000001622000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.comScreenConnect.WindowsClient.exe, 00000008.00000002.3011725761.000000001D122000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000009.00000003.1809505047.00000250DF4C2000.00000004.00000800.00020000.00000000.sdmp, edb.log.9.dr, qmgr.db.9.drfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  147.75.81.4
                                  server-nixd2d85b70-relay.screenconnect.comSwitzerland
                                  54825PACKETUSfalse
                                  IP
                                  127.0.0.1
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1510120
                                  Start date and time:2024-09-12 15:43:06 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 31s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:14
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:SSA-Statement283482.exe
                                  Detection:MAL
                                  Classification:mal63.evad.winEXE@16/63@3/2
                                  EGA Information:
                                  • Successful, ratio: 50%
                                  HCA Information:
                                  • Successful, ratio: 74%
                                  • Number of executed functions: 193
                                  • Number of non-executed functions: 1
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 184.28.90.27
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target SSA-Statement283482.exe, PID 8 because it is empty
                                  • Execution Graph export aborted for target rundll32.exe, PID 6672 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtSetInformationFile calls found.
                                  • VT rate limit hit for: SSA-Statement283482.exe
                                  TimeTypeDescription
                                  09:44:11API Interceptor2x Sleep call for process: svchost.exe modified
                                  09:44:21API Interceptor1x Sleep call for process: ScreenConnect.ClientService.exe modified
                                  No context
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  PACKETUSWM847duagm.exeGet hashmaliciousUnknownBrowse
                                  • 185.245.180.242
                                  firmware.x86_64.elfGet hashmaliciousUnknownBrowse
                                  • 61.14.224.54
                                  EfzTOF4PQ1.exeGet hashmaliciousFormBookBrowse
                                  • 160.202.78.123
                                  eBill.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                  • 139.178.89.98
                                  eBill.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                  • 139.178.89.96
                                  http://bestbuy.beautybyjoulexa.com.au/citrix/fxc/bWljaGFlbHNjb2ZpZWxkQGRpc25leS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                  • 185.194.217.175
                                  BTC.exeGet hashmaliciousAsyncRAT, Rezlt, StormKitty, VenomRAT, Vermin Keylogger, WorldWind Stealer, XWormBrowse
                                  • 185.252.232.158
                                  mirai.ppc.elfGet hashmaliciousMiraiBrowse
                                  • 66.78.16.43
                                  http://eedqt.foruskw.com/4lAabg16572cnef1382rzkeufeqnp14569ZZZRNPUIWFYUECM7379HVKJ18607i18Get hashmaliciousUnknownBrowse
                                  • 147.75.81.235
                                  https://sjq4p0lz.r.us-east-1.awstrack.me/L0/https:%2F%2Fwww.howtogeek.com%2F%3Futm_medium=newsletter%26utm_campaign=HTG-202408281159%26utm_source=HTG-NL%26user=am9obi53aW5kQGVwcmVtaXVtLmNvbQ%26lctg=7c0d2c3042ca45dcc1d0360b05cf7ed73c0a503df62a4d7921a3eb742c01cab5/1/010001919a125aa7-c1b4578c-8e1f-4667-8509-677bedec8ac0-000000/XnQZD8ewfocpYq5Ry0SP_pMdhr0=389Get hashmaliciousUnknownBrowse
                                  • 147.75.85.97
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsAuthenticationPackage.dllXML_00000S1D4S555555S4D111111S.exeGet hashmaliciousScreenConnect ToolBrowse
                                    XML_00000S1D4S555555S4D111111S.exeGet hashmaliciousScreenConnect ToolBrowse
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):219373
                                      Entropy (8bit):6.5820174222020125
                                      Encrypted:false
                                      SSDEEP:3072:oR9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMGC:oRuH2aCGw1ST1wQLdqvC
                                      MD5:370AF99A541C9CF00499EDD7C737FD74
                                      SHA1:E2C08581B34748B8656986C89AED3B47ED95103D
                                      SHA-256:74802D28DE7F0F3E339F2E4978A3CD86CB04EDE0DECBB04751A4D6012D7B1755
                                      SHA-512:E8461426CB61207B6F5005671A3049A9A5BE61A7F1CDCC9DBB31FE48B8F7C3006E74394B54C66DD9A4196B000342D62ED3B8EE4C136D060CAED42E8EAED675D6
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Config.Msi\3ba078.rbs, Author: Joe Security
                                      Reputation:low
                                      Preview:...@IXOS.@.....@.M,Y.@.....@.....@.....@.....@.....@......&.{36B75195-3778-3603-935A-9224F330994C}'.ScreenConnect Client (8139d6693ff11377)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{36B75195-3778-3603-935A-9224F330994C}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (8139d6693ff11377)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{40A64DDB-C3F2-1624-70DC-7181A1E29087}&.{36B75195-3778-3603-935A-9224F330994C}.@......&.{D3422459-9E74-C140-280B-22440A1685FB}&.{36B75195-3778-3603-935A-9224F330994C}.@......&.{F7B34A45-C5CD-8115-C4BF-BE030371C630}&.{36B75195-3778-3603-935A-9224F330994C}.@......&.{DC342F26-423E-5232-48B5-C761DAB85A3F}&.{36B75195-3778-3603-935A-9224F330994C}.@......&.{0FB784A3-ECC3-2548-D223-27AD6621B4AD}&.{36B75195-3778-3603-935A-9224F330994C}.@......&.{835B0EDF-F87D-F81D-B25B-93BF0C69479D}&.{36B75195-3778-3603-935A-9224F330994C}.@....
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):50133
                                      Entropy (8bit):4.759054454534641
                                      Encrypted:false
                                      SSDEEP:1536:p1+F+UTQd/3EUDv8vw+Dsj2jr0FJK97w/Leh/KR1exJKekmrg9:p1+F+UTQWUDv8vw+Dsj2jr0FJK97w/LR
                                      MD5:D524E8E6FD04B097F0401B2B668DB303
                                      SHA1:9486F89CE4968E03F6DCD082AA2E4C05AEF46FCC
                                      SHA-256:07D04E6D5376FFC8D81AFE8132E0AA6529CCCC5EE789BEA53D56C1A2DA062BE4
                                      SHA-512:E5BC6B876AFFEB252B198FEB8D213359ED3247E32C1F4BFC2C5419085CF74FE7571A51CAD4EAAAB8A44F1421F7CA87AF97C9B054BDB83F5A28FA9A880D4EFDE5
                                      Malicious:false
                                      Reputation:low
                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP.q...'..6....wp.......y....C|.)>..Ldt..... $...X..........1$.../...2.%%3./>>...L.y.0.C._.........1Y..Qj.o....<....=...R..;...C....&.......1p2.r.x.u?Y..R...c......X.....I.5.2q..R...>.E.pw .@ ).w.l.....S...X..'.C.I......-.Y........4.J..P<.E..=c!.@To..#.._.2.....K.!..h...z......t......^..4...D...f..Q...:..%.z.<......^.....;<...r..yC.....Q........4_.Sns..z.......=..]t...X..<....8.e`}..n....S.H[..S@?.~....,...j.2..*v.......B....A...a......D..c..w..K,..t...S.....*v....7.6|..&.....r....#....G......Y...i..'.............'.......Z.....#2e..........|....)..%....A.....4{..u;N......&q...}.tD..x.....4...J...L......5.Q..M....K..3U..M..............5...........t.>.......lYu....3TY.?...r...'.......3.m........=.H...#.o.........n.....,4.~...<h..u...i.H...V......V/...P.$%..z...
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):26722
                                      Entropy (8bit):7.7401940386372345
                                      Encrypted:false
                                      SSDEEP:384:rAClIRkKxFCQPZhNAmutHcRIfvVf6yMt+FRVoSVCdcDk6jO0n/uTYUq5ZplYKlBy:MV3PZrXgTf6vEVm6zjpGYUElerG49
                                      MD5:5CD580B22DA0C33EC6730B10A6C74932
                                      SHA1:0B6BDED7936178D80841B289769C6FF0C8EEAD2D
                                      SHA-256:DE185EE5D433E6CFBB2E5FCC903DBD60CC833A3CA5299F2862B253A41E7AA08C
                                      SHA-512:C2494533B26128FBF8149F7D20257D78D258ABFFB30E4E595CB9C6A742F00F1BF31B1EE202D4184661B98793B9909038CF03C04B563CE4ECA1E2EE2DEC3BF787
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:...........lSystem.Resources.ResourceReader, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089#System.Resources.RuntimeResourceSet............PADPADP)...s^.J.....E.....(....jF.C...1P)...H..../..72J..I.J.a.K8c._.ks`.k.`.kK..m.M6p............b...P...........'...!...............K...............w.......P.......1......."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.1.6.....$A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.2.5.6....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.3.2....."A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.4.8.....,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.B.l.a.n.k.1.6.;...(A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.M.a.c.2.2.....0A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.O.p.a.q.u.e.1.9.2.8...,A.p.p.l.i.c.a.t.i.o.n.I.c.o.n.T.i.t.l.e.1.6.....6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.C.o.l.o.r.4...6B.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.:...DB.l.a.n.k.M.o.n.i.t.o.r.B.a.c.k.g.r.o.u.n.d.I.m.a.g.e.V.i.s.i.b.l.e.xb..*B.l.a.n.k.M.o.n.i.t.o.r.T.e.x.t.C.o.l.o.r..b..*D.a.r.k.T.h.e.m.e.B.a.r.B.a.s.e.C.o.l.o.r..b..<D.a.r.k.T.h.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):197120
                                      Entropy (8bit):6.58476728626163
                                      Encrypted:false
                                      SSDEEP:3072:CxGtNaldxI5KY9h12QMusqVFJRJcyzvJquFzDvJXYrR:BtNalc5fr12QbPJYaquFGr
                                      MD5:AE0E6EBA123683A59CAE340C894260E9
                                      SHA1:35A6F5EB87179EB7252131A881A8D5D4D9906013
                                      SHA-256:D37F58AAE6085C89EDD3420146EB86D5A108D27586CB4F24F9B580208C9B85F1
                                      SHA-512:1B6D4AD78C2643A861E46159D5463BA3EC5A23A2A3DE1575E22FDCCCD906EE4E9112D3478811AB391A130FA595306680B8608B245C1EECB11C5BCE098F601D6B
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Z<..........." ..0.................. ... ....... .......................`............@.................................-...O.... .......................@..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................a.......H...........(............^................................................(....*..(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*..{....*:.(......}....*.0..A........(....s....%.~(...%-.&~'.....y...s....%.(...(...+(...+o"...o....*....0..s.......~#.....2. ....+...j..... ......... ...............%.r...p.%.r...p............%.&...($....5..............s%....=...*..0...........~*...%-.&~).....|...s&...%.*...(...+..~+...%-.&~).....}...s(...%.+...(...+.r9..
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):68096
                                      Entropy (8bit):6.068776675019683
                                      Encrypted:false
                                      SSDEEP:1536:tA0ZscQ5V6TsQqoSDKh6+39QFVIl1KJhb8gp:q0Zy3wUOQFVQKJp
                                      MD5:0402CF8AE8D04FCC3F695A7BB9548AA0
                                      SHA1:044227FA43B7654032524D6F530F5E9B608E5BE4
                                      SHA-256:C76F1F28C5289758B6BD01769C5EBFB519EE37D0FA8031A13BB37DE83D849E5E
                                      SHA-512:BE4CBC906EC3D189BEBD948D3D44FCF7617FFAE4CC3C6DC49BF4C0BD809A55CE5F8CD4580E409E5BCE7586262FBAF642085FA59FE55B60966DB48D81BA8C0D78
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0.T..........." ..0.............. ... ...@....... ..............................d.....@.................................e ..O....@.......................`..........8............................................ ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........n..@...................<.........................................(....*^.(...........%...}....*:.(......}....*:.(......}....*:.(......}....*.~,...%-.&~+.....i...s....%.,...(...+*vs....%.}P.........s....(....*....0...........s....}.....s....}...........}.......(&.....}.....(....&.()..........s....o.....()...~-...%-.&~+.....j...s....%.-...o ....s!...}.....s"...}.....s#...}...... .... 0u.........s....s=...}....... ..6........s....s=...}.....('...($............o%........
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):95520
                                      Entropy (8bit):6.505346220942731
                                      Encrypted:false
                                      SSDEEP:1536:rg1s9pgbNBAklbZfe2+zRVdHeDxGXAorrCnBsWBcd6myJkgoT0HMM7CxM7:khbNDxZGXfdHrX7rAc6myJkgoT0HXN7
                                      MD5:361BCC2CB78C75DD6F583AF81834E447
                                      SHA1:1E2255EC312C519220A4700A079F02799CCD21D6
                                      SHA-256:512F9D035E6E88E231F082CC7F0FF661AFA9ACC221CF38F7BA3721FD996A05B7
                                      SHA-512:94BA891140E7DDB2EFA8183539490AC1B4E51E3D5BD0A4001692DD328040451E6F500A7FC3DA6C007D9A48DB3E6337B252CE8439E912D4FE7ADC762206D75F44
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(..qF.qF.qF....qF.....qF....qF.<.B.qF.<.E.qF.<.C.qF....qF.#..qF.qG..qF.2.O.qF.2...qF.2.D.qF.Rich.qF.........................PE..L.....wc...............!.............!............@.......................................@.................................p...x....`..X............L.. )...p......`!..p............................ ..@............................................text...:........................... ..`.rdata...f.......h..................@..@.data........@.......,..............@....rsrc...X....`.......6..............@..@.reloc.......p.......<..............@..B........................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):548864
                                      Entropy (8bit):6.031251664661689
                                      Encrypted:false
                                      SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                      MD5:16C4F1E36895A0FA2B4DA3852085547A
                                      SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                      SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                      SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1721856
                                      Entropy (8bit):6.639136400085158
                                      Encrypted:false
                                      SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                      MD5:9F823778701969823C5A01EF3ECE57B7
                                      SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                      SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                      SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):260168
                                      Entropy (8bit):6.416438906122177
                                      Encrypted:false
                                      SSDEEP:3072:qJvChyA4m2zNGvxDd6Q6dtaVNVrlaHpFahvJ9ERnWtMG8Ff2lt9Bgcld5aaYxg:0IvxDdL6d8VNdlC3g0RCXh5D
                                      MD5:5ADCB5AE1A1690BE69FD22BDF3C2DB60
                                      SHA1:09A802B06A4387B0F13BF2CDA84F53CA5BDC3785
                                      SHA-256:A5B8F0070201E4F26260AF6A25941EA38BD7042AEFD48CD68B9ACF951FA99EE5
                                      SHA-512:812BE742F26D0C42FDDE20AB4A02F1B47389F8D1ACAA6A5BB3409BA27C64BE444AC06D4129981B48FA02D4C06B526CB5006219541B0786F8F37CF2A183A18A73
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: XML_00000S1D4S555555S4D111111S.exe, Detection: malicious, Browse
                                      • Filename: XML_00000S1D4S555555S4D111111S.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A........................T....................V.......V.......V......................=U......=U......=U$.....=U......Rich....................PE..d.....Qf.........." ...'.^...^.......................................................(....`..........................................e.......f..P................ ......HP..........P%..p............................$..@............p...............................text...t].......^.................. ..`.rdata.......p.......b..............@..@.data....+...........d..............@....pdata... ......."...x..............@..@_RDATA..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):61216
                                      Entropy (8bit):6.31175789874945
                                      Encrypted:false
                                      SSDEEP:1536:SW/+lo6MOc8IoiKWjbNv8DtyQ4RE+TC6VAhVbIF7fIxp:SLlo6dccl9yQGVtFra
                                      MD5:6DF2DEF5E591E2481E42924B327A9F15
                                      SHA1:38EAB6E9D99B5CAEEC9703884D25BE8D811620A9
                                      SHA-256:B6A05985C4CF111B94A4EF83F6974A70BF623431187691F2D4BE0332F3899DA9
                                      SHA-512:5724A20095893B722E280DBF382C9BFBE75DD4707A98594862760CBBD5209C1E55EEAF70AD23FA555D62C7F5E54DE1407FB98FC552F42DCCBA5D60800965C6A5
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...L............."...0.................. ........@.. ....................... ......3]....@.....................................O.......,............... )..............8............................................ ............... ..H............text........ ...................... ..`.rsrc...,...........................@..@.reloc..............................@..B........................H........S......................x.........................................(....*^.(.......a...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........(....(....(....(....r...p(....o....(....r...p..~....(....(....r9..p..~....(....(.....g~).....(....rY..p.(....&(.....(....s....( ...s....(!...*...0...........(".....(#.....($....s....%.o%...%.o&...%.o'...%s!...o(...%~....o)...}......(....o*...o+....(,.....@...%..(.....o-....s....}.....{...........s/...o0....s....}..
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):266
                                      Entropy (8bit):4.842791478883622
                                      Encrypted:false
                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):601376
                                      Entropy (8bit):6.185921191564225
                                      Encrypted:false
                                      SSDEEP:6144:r+z3H0n063rDHWP5hLG/6XixJQm16Eod7ZeYai1FzJTZJ5BCEOG6y9QsZSc4F2/Q:qzEjrTWPMLBfWFaSdJ5BeG6xs6/yRod
                                      MD5:20AB8141D958A58AADE5E78671A719BF
                                      SHA1:F914925664AB348081DAFE63594A64597FB2FC43
                                      SHA-256:9CFD2C521D6D41C3A86B6B2C3D9B6A042B84F2F192F988F65062F0E1BFD99CAB
                                      SHA-512:C5DD5ED90C516948D3D8C6DFA3CA7A6C8207F062883BA442D982D8D05A7DB0707AFEC3A0CB211B612D04CCD0B8571184FC7E81B2E98AE129E44C5C0E592A5563
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{<............"...0.................. ... ....@.. .......................`.......x....@.................................=...O.... .................. )...@..........8............................................ ............... ..H............text...`.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................q.......H........H................................................................{D...*..{E...*V.(F.....}D.....}E...*...0..A........u1.......4.,/(G....{D....{D...oH...,.(I....{E....{E...oJ...*.*.*. }.o )UU.Z(G....{D...oK...X )UU.Z(I....{E...oL...X*...0..b........r...p......%..{D......%q4....4...-.&.+...4...oM....%..{E......%q5....5...-.&.+...5...oM....(N...*..{O...*..{P...*V.(F.....}O.....}P...*.0..A........u6.......4.,/(G....{O....{O...oH...,.(I....{P....{P...oJ...*.*.*. 1.c. )UU.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):266
                                      Entropy (8bit):4.842791478883622
                                      Encrypted:false
                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):842248
                                      Entropy (8bit):6.268561504485627
                                      Encrypted:false
                                      SSDEEP:12288:q9vy8YABMuiAoPyEIrJs7jBjaau+EAaMVtw:P8Y4MuiAoPyZrJ8jrvDVtw
                                      MD5:BE74AB7A848A2450A06DE33D3026F59E
                                      SHA1:21568DCB44DF019F9FAF049D6676A829323C601E
                                      SHA-256:7A80E8F654B9DDB15DDA59AC404D83DBAF4F6EAFAFA7ECBEFC55506279DE553D
                                      SHA-512:2643D649A642220CEEE121038FE24EA0B86305ED8232A7E5440DFFC78270E2BDA578A619A76C5BB5A5A6FE3D9093E29817C5DF6C5DD7A8FBC2832F87AA21F0CC
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........}....}H..}H..}H.d~I..}H.dxIG.}H.dyI..}H..xI..}H..yI..}H..~I..}H..|H8.}H..}H..}H2.}I..}H2..I..}HRich..}H........PE..d.....Gf.........." ...'.P...........H....................................... ......q.....`......................................... ...t....................P...y.......(......,4.....T.......................(.......@............`...............................text....O.......P.................. ..`.rdata...z...`...|...T..............@..@.data....d.......0..................@....pdata...y...P...z..................@..@_RDATA...............z..............@..@.reloc..,4.......6...|..............@..B................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):81696
                                      Entropy (8bit):5.862223562830496
                                      Encrypted:false
                                      SSDEEP:1536:/tytl44RzbwI5kLP+VVVVVVVVVVVVVVVVVVVVVVVVVC7Yp7gxd:8/KukLdUpc
                                      MD5:B1799A5A5C0F64E9D61EE4BA465AFE75
                                      SHA1:7785DA04E98E77FEC7C9E36B8C68864449724D71
                                      SHA-256:7C39E98BEB59D903BC8D60794B1A3C4CE786F7A7AAE3274C69B507EBA94FAA80
                                      SHA-512:AD8C810D7CC3EA5198EE50F0CEB091A9F975276011B13B10A37306052697DC43E58A16C84FA97AB02D3927CD0431F62AEF27E500030607828B2129F305C27BE8
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P............"...0..@...........^... ...`....@.. .......................`......j.....@..................................^..O....`.. ............... )...@.......]..8............................................ ............... ..H............text....>... ...@.................. ..`.rsrc... ....`.......B..............@..@.reloc.......@......................@..B.................^......H....... +..@2..................`]........................................(....*^.(.......;...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s>....(....(....(....(....(.....(....(......s....}B....s....}C....~@...%-.&~?.....<...s ...%.@...o...+.....@...s ...o...+......A...s!...o...+}D.......B...s"...o...+.......(#...&......(#...& .... ...........($...&s....t......r...prs..p(%...(&...~>...%-.&...'...s(...%.>.....A...().......(*........(+...o,...(-...t....
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):266
                                      Entropy (8bit):4.842791478883622
                                      Encrypted:false
                                      SSDEEP:6:TMVBd1IffVKNC7VrfC7VNQpuAKr5KNZk2ygAyONO5W4QIT:TMHdG3VO+Qg9LNZoE0Oo4xT
                                      MD5:728175E20FFBCEB46760BB5E1112F38B
                                      SHA1:2421ADD1F3C9C5ED9C80B339881D08AB10B340E3
                                      SHA-256:87C640D3184C17D3B446A72D5F13D643A774B4ECC7AFBEDFD4E8DA7795EA8077
                                      SHA-512:FB9B57F4E6C04537E8FDB7CC367743C51BF2A0AD4C3C70DDDAB4EA0CF9FF42D5AEB9D591125E7331374F8201CEBF8D0293AD934C667C1394DC63CE96933124E7
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup>.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>.. <runtime>.. <generatePublisherEvidence enabled="false" />.. </runtime>..</configuration>
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:XML 1.0 document, ASCII text, with very long lines (476), with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):966
                                      Entropy (8bit):5.748455104655255
                                      Encrypted:false
                                      SSDEEP:24:2dL9hK6E4dl/5Hu1vGgDtSWB/Xer337ZWvH:chh7HH5O1egcq4H7ZWv
                                      MD5:5C93A94F5A550E43DA494153A79E8B6E
                                      SHA1:43CBF2DB1820EFFB5504B85FDE24F05605AE1ADD
                                      SHA-256:1B06BE6F425E258DA4E1A1736F45BF8ABFA90F0AD2C9A8139E28164510B63138
                                      SHA-512:EB98C628097E9EAAB89D518F5A415B1E8F810AF9A4047FC18ECDC66A5400E69D69F3D124C1506532AA8D4C80D9FB45F6A4830E0086D998A8B0C0E0CAA8C2B170
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="ClientLaunchParametersConstraint" serializeAs="String">.. <value>?h=instance-uil9h2-relay.screenconnect.com&amp;p=443&amp;k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1310720
                                      Entropy (8bit):1.3073774553270505
                                      Encrypted:false
                                      SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrg:KooCEYhgYEL0In
                                      MD5:611554AD6B448AC22B171F54AF850355
                                      SHA1:03A00D8A36F6FDFC369AF0F30D5DDF534F8842BC
                                      SHA-256:228C1539D0C2405770D4F3A06CD7798E99F4B5D9C4DCF3FC89C1BFA20ECCF86A
                                      SHA-512:B418998474A2584918CF2FC490015D137DDD1CE46B39BD05253563A64AE20811A3052938CD1AE26CE0B20233B660F3B2FCEC0F0E33B9411909EEE5CC2A307653
                                      Malicious:false
                                      Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0xaf2e5621, page size 16384, DirtyShutdown, Windows version 10.0
                                      Category:dropped
                                      Size (bytes):1310720
                                      Entropy (8bit):0.42212543339300906
                                      Encrypted:false
                                      SSDEEP:1536:BSB2ESB2SSjlK/dvmdMrSU0OrsJzvdYkr3g16T2UPkLk+kTX/Iw4KKCzAkUk1kI6:Baza/vMUM2Uvz7DO
                                      MD5:91DC5C323512E8A3F806D8B54D36333F
                                      SHA1:E159CE66BEA08AFC26CA8E7056CE3432E18516C9
                                      SHA-256:564A7175114D95DC0C68416CFEEA197A9BF61CFCA8F0F08E19FE38120D5FB5DF
                                      SHA-512:50E7418AE7098D88AB08ED1C0656B6778B3AAFD2CB1170C9F52A59523E22F50D6BD82E373C48DD0396F536B7CE339219538752E898D1834C9CF270C1A474DF40
                                      Malicious:false
                                      Preview:..V!... .......A.......X\...;...{......................0.!..........{A..,...|..h.#.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ........;...{...............................................................................................................................................................................................2...{...................................w`..,...|..................;.N2.,...|...........................#......h.#.....................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):16384
                                      Entropy (8bit):0.07664414174053057
                                      Encrypted:false
                                      SSDEEP:3:lViyYeZmpEgCjn13a/XDumCoXollcVO/lnlZMxZNQl:KyzZeEv53qT6NOewk
                                      MD5:848AD70A05224AC5916BBC150C4847FB
                                      SHA1:0D4ACA3E1C8180AA3AB365A8096084A0450C91C4
                                      SHA-256:925DC4B3E3A4FA510FB4BF71281D5CA3C104ACCBFF84A4D34E947D317AD6E69A
                                      SHA-512:69D03586E31E1E601E5FAD1D47932DDC6DC62264C76FA726CE9E5B5D1A09A3B8DE00FD09B25B51082D2F7C1B1B83CFBAA0BF3ABEC0BA7FDBF2941351485D43A1
                                      Malicious:false
                                      Preview:...0.....................................;...{...,...|.......{A..............{A......{A..........{A]................;.N2.,...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\SSA-Statement283482.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):321
                                      Entropy (8bit):5.36509199858051
                                      Encrypted:false
                                      SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTrM3RJoDLIP12MUAvvR+uCv:Q3La/KDLI4MWuPTArkvoDLI4MWuCv
                                      MD5:1CF2352B684EF57925D98E766BA897F2
                                      SHA1:6E8CB2C1143E9D9D1211BAA811FE4CAA49C08B55
                                      SHA-256:43C3FB3C0B72A899C5442DAC8748D019D800E0A9421D3677EB96E196ED285290
                                      SHA-512:9F2D6F89453C867386A65A04FF96067FC3B23A99A4BCE0ECD227E130F409069FE6DD202D4839CBF204C3F204EC058D6CDFDADA7DD212BC2356D74FEC97F22061
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):746
                                      Entropy (8bit):5.349174276064173
                                      Encrypted:false
                                      SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhaOK9eDLI4MNJK9P/JNTK9yirkvoDLb:ML9E4KlKDE4KhKiKhPKIE4oKNzKogE4P
                                      MD5:ED994980CB1AABB953B2C8ECDC745E1F
                                      SHA1:9E9D3E00A69FC862F4D3C30F42BF26693A2D2A21
                                      SHA-256:D23B54CCF9F6327FE1158762D4E5846649699A7B78418D056A197835ED1EBE79
                                      SHA-512:61DFC93154BCD734B9836A6DECF93674499FF533E2B9A1188886E2CBD04DF35538368485AA7E775B641ADC120BAE1AC2551B28647951C592AA77F6747F0E9187
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                                      Process:C:\Windows\SysWOW64\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                      Category:dropped
                                      Size (bytes):1086792
                                      Entropy (8bit):7.793516535218678
                                      Encrypted:false
                                      SSDEEP:24576:4UUGG/qSDceVjLHGeRdtRiypAxiK7cl72km/4aoczU:bG/XcW32gqkAfosU
                                      MD5:30CA21632F98D354A940903214AE4DE1
                                      SHA1:6C59A3A65FB8E7D4AD96A3E8D90E72B02091D3F4
                                      SHA-256:4BB0E9B5C70E3CAEB955397A4A3B228C0EA5836729202B8D4BA1BE531B60DAFC
                                      SHA-512:47509F092B089EB1FFC115643DCDFBFAC5F50F239DE63ECAD71963EC1D37FF72B89F5A2AEA137ED391BA9BA10947ABBE6103DB1C56032FD6B39A0855CB283509
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........S.c.2.0.2.0.2.0..|0.2.0..H0.2.0.Jq0.2.0.2.0.2.0..I0.2.0..y0.2.0..x0.2.0...0.2.0Rich.2.0................PE..L...9..P...........!.........H.......i.......................................p............@..............................*..l...x....@.......................P..d.......................................@...............h............................text............................... ..`.rdata..............................@..@.data....-..........................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):234
                                      Entropy (8bit):4.977464602412109
                                      Encrypted:false
                                      SSDEEP:6:JiMVBdTMkIffVymRMT4/0xC/C7VrfC7VNQpuAW4QIT:MMHd413VymhsS+Qg93xT
                                      MD5:6F52EBEA639FD7CEFCA18D9E5272463E
                                      SHA1:B5E8387C2EB20DD37DF8F4A3B9B0E875FA5415E3
                                      SHA-256:7027B69AB6EBC9F3F7D2F6C800793FDE2A057B76010D8CFD831CF440371B2B23
                                      SHA-512:B5960066430ED40383D39365EADB3688CADADFECA382404924024C908E32C670AFABD37AB41FF9E6AC97491A5EB8B55367D7199002BF8569CF545434AB2F271A
                                      Malicious:false
                                      Preview:.<?xml version="1.0" encoding="utf-8" ?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true">.. <supportedRuntime version="v4.0" />.. <supportedRuntime version="v2.0.50727" />.. </startup>..</configuration>
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):49152
                                      Entropy (8bit):4.62694170304723
                                      Encrypted:false
                                      SSDEEP:768:sqbC2wmdVdX9Y6BCH+C/FEQl2ifnxwr02Gy/G4Xux+bgHGvLw4:sAtXPC/Cifnxs02Gyu4Xu0MeR
                                      MD5:77BE59B3DDEF06F08CAA53F0911608A5
                                      SHA1:A3B20667C714E88CC11E845975CD6A3D6410E700
                                      SHA-256:9D32032109FFC217B7DC49390BD01A067A49883843459356EBFB4D29BA696BF8
                                      SHA-512:C718C1AFA95146B89FC5674574F41D994537AF21A388335A38606AEC24D6A222CBCE3E6D971DFE04D86398E607815DF63A54DA2BB96CCF80B4F52072347E1CE6
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ...............................$....@....................................O.................................................................................... ............... ..H............text... .... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):36864
                                      Entropy (8bit):4.340550904466943
                                      Encrypted:false
                                      SSDEEP:384:GqJxldkxhW9N5u8IALLU0X9Z1kTOPJlqE:GqJxl6xsPIA9COxlqE
                                      MD5:4717BCC62EB45D12FFBED3A35BA20E25
                                      SHA1:DA6324A2965C93B70FC9783A44F869A934A9CAF7
                                      SHA-256:E04DE7988A2A39931831977FA22D2A4C39CF3F70211B77B618CAE9243170F1A7
                                      SHA-512:BB0ABC59104435171E27830E094EAE6781D2826ED2FC9009C8779D2CA9399E38EDB1EC6A10C1676A5AF0F7CACFB3F39AC2B45E61BE2C6A8FE0EDB1AF63A739CA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0..`... .......~... ........... ....................................@.................................X~..O................................... }............................................... ............... ..H............text....^... ...`.................. ..`.rsrc................p..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):57344
                                      Entropy (8bit):4.657268358041957
                                      Encrypted:false
                                      SSDEEP:768:BLNru62y+VqB4N5SBcDhDxW7ZkCmX2Qv1Sf0AQdleSBRxf+xUI3:BJ2yUGmh2O11AsleyRxf+xt
                                      MD5:A921A2B83B98F02D003D9139FA6BA3D8
                                      SHA1:33D67E11AD96F148FD1BFD4497B4A764D6365867
                                      SHA-256:548C551F6EBC5D829158A1E9AD1948D301D7C921906C3D8D6B6D69925FC624A1
                                      SHA-512:E1D7556DAF571C009FE52D6FFE3D6B79923DAEEA39D754DDF6BEAFA85D7A61F3DB42DFC24D4667E35C4593F4ED6266F4099B393EFA426FA29A72108A0EAEDD3E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ........... ........... ....................... .......t....@.....................................O...................................`................................................ ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):176128
                                      Entropy (8bit):5.775360792482692
                                      Encrypted:false
                                      SSDEEP:3072:FkfZS7FUguxN+77b1W5GR69UgoCaf8TpCnfKlRUjW01Ky4:x+c7b1W4R6joxfQE
                                      MD5:5EF88919012E4A3D8A1E2955DC8C8D81
                                      SHA1:C0CFB830B8F1D990E3836E0BCC786E7972C9ED62
                                      SHA-256:3E54286E348EBD3D70EAED8174CCA500455C3E098CDD1FCCB167BC43D93DB29D
                                      SHA-512:4544565B7D69761F9B4532CC85E7C654E591B2264EB8DA28E60A058151030B53A99D1B2833F11BFC8ACC837EECC44A7D0DBD8BC7AF97FC0E0F4938C43F9C2684
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F.Y.........." ..0...... ......~.... ........... ..............................!|....@.................................,...O.................................................................................... ............... ..H............text....w... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):548864
                                      Entropy (8bit):6.031251664661689
                                      Encrypted:false
                                      SSDEEP:6144:7+kYq9xDsxaUGEcANzZ1dkmn27qcO5noYKvKzDrzL9e7eOJsXziIYjVtkb+vbHq+:7SHtpnoVMlUbHbBaYLD
                                      MD5:16C4F1E36895A0FA2B4DA3852085547A
                                      SHA1:AB068A2F4FFD0509213455C79D311F169CD7CAB8
                                      SHA-256:4D4BF19AD99827F63DD74649D8F7244FC8E29330F4D80138C6B64660C8190A53
                                      SHA-512:AB4E67BE339BECA30CAB042C9EBEA599F106E1E0E2EE5A10641BEEF431A960A2E722A459534BDC7C82C54F523B21B4994C2E92AA421650EE4D7E0F6DB28B47BA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...z............." ..0..X...........r... ........... ...............................D....@..................................r..O....................................q..8............................................ ............... ..H............text....V... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................r......H........B......................xq........................................{:...*..{;...*V.(<.....}:.....};...*...0..A........u~.......4.,/(=....{:....{:...o>...,.(?....{;....{;...o@...*.*.*. ... )UU.Z(=....{:...oA...X )UU.Z(?....{;...oB...X*...0..b........r...p......%..{:......%q.........-.&.+.......oC....%..{;......%q.........-.&.+.......oC....(D...*..{E...*..{F...*V.(<.....}E.....}F...*.0..A........u........4.,/(=....{E....{E...o>...,.(?....{F....{F...o@...*.*.*. F.b# )UU.
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):11776
                                      Entropy (8bit):5.267782165666963
                                      Encrypted:false
                                      SSDEEP:192:TY8/Qp6lCJuV3jnXtyVNamVNG1YZfCrMmbfHJ7kjvLQbuLd9NEFbOhmX:Z/cBJaLXt2NaheUrMmb/FkjvLQbuZZmX
                                      MD5:5060FA094CE77A1DB1BEB4010F3C2306
                                      SHA1:93B017A300C14CEEBA12AFBC23573A42443D861D
                                      SHA-256:25C495FB28889E0C4D378309409E18C77F963337F790FEDFBB13E5CC54A23243
                                      SHA-512:2384A0A8FC158481E969F66958C4B7D370BE4219046AB7D77E93E90F7F1C3815F23B47E76EFD8129234CCCB3BCAC2AA8982831D8745E0B733315C1CCF3B1973D
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m............." ..0..&..........&E... ...`....... ..............................t.....@..................................D..O....`..............................$D..8............................................ ............... ..H............text...,%... ...&.................. ..`.rsrc........`.......(..............@..@.reloc...............,..............@..B.................E......H........'.......................C........................................(....*^.(.......&...%...}....*:.(......}....*:.(......}....*:.(......}....*....0..........s.......}.....s....}.....{....r...p(......,h.{....r...p......%...(.....rS..p.(....~....%-.&~..........s....%......(...+%-.&+.(...........s....(...+&.{....o....-!.{.....{.....{....rc..po....(.....{....o.........{.....{.....{....r}..po....(.....{....o....-..{....r...p......(.....*.{....s .....-..o!.......{....r}..p.o
                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):1721856
                                      Entropy (8bit):6.639136400085158
                                      Encrypted:false
                                      SSDEEP:24576:gx5x94kEFj+Ifz3zvnXj/zXzvAAkGz8mvgtX79S+2bfh+RfmT01krTFiH4SqfKPo:gx5xKkEJkGYYpT0+TFiH7efP
                                      MD5:9F823778701969823C5A01EF3ECE57B7
                                      SHA1:DA733F482825EC2D91F9F1186A3F934A2EA21FA1
                                      SHA-256:ABCA7CF12937DA14C9323C880EC490CC0E063D7A3EEF2EAC878CD25C84CF1660
                                      SHA-512:FFC40B16F5EA2124629D797DC3A431BEB929373BFA773C6CDDC21D0DC4105D7360A485EA502CE8EA3B12EE8DCA8275A0EC386EA179093AF3AA8B31B4DD3AE1CA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l............" ..0..>...........]... ...`....... ..............................[.....@................................./]..O....`...............................\..8............................................ ............... ..H............text....=... ...>.................. ..`.rsrc........`.......@..............@..@.reloc...............D..............@..B................c]......H.......t...h..............0....\........................................()...*^.()..........%...}....*:.().....}....*:.().....}....*:.().....}....*..s*...*..s+...*:.(,.....(-...*..{....*"..}....*J.(/........(0...&*:.(,.....(1...*..{2...*"..}2...*.0..(........(3......+.............(0...&..X....i2.*v.(,....s4...}.....s5...}....*v.{.....r...p(...+.....o7....*.0...........o8....+..o9......(...+&.o....-....,..o......*..........."........{..........o:...&.......(.....*....0..L...
                                      Process:C:\Users\user\Desktop\SSA-Statement283482.exe
                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {36B75195-3778-3603-935A-9224F330994C}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                      Category:dropped
                                      Size (bytes):8237056
                                      Entropy (8bit):7.947702959091875
                                      Encrypted:false
                                      SSDEEP:196608:j53JLR3LGMLiW35953JLR3LGMLl53JLR3LGMLm53JLR3LGML:ZTiunT/TqT
                                      MD5:2AA4DC46E75B0A67EA4629169225E890
                                      SHA1:484B7A0CF43D099EF0E88D3A00326E38738E065E
                                      SHA-256:9EDE2A9B8D94D6D2AE58141DD6E06DA5BD84D0ECF09FA9678565543B07DE210D
                                      SHA-512:289E4AF2DEE5B81B85460A6F6D674AB8EA5B9515CD02BC17440B869B8780227769AA4DE817C1E15747755AB494A08C267628052A5D73B0F619611C0EDEC0414D
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {36B75195-3778-3603-935A-9224F330994C}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                      Category:dropped
                                      Size (bytes):8237056
                                      Entropy (8bit):7.947702959091875
                                      Encrypted:false
                                      SSDEEP:196608:j53JLR3LGMLiW35953JLR3LGMLl53JLR3LGMLm53JLR3LGML:ZTiunT/TqT
                                      MD5:2AA4DC46E75B0A67EA4629169225E890
                                      SHA1:484B7A0CF43D099EF0E88D3A00326E38738E065E
                                      SHA-256:9EDE2A9B8D94D6D2AE58141DD6E06DA5BD84D0ECF09FA9678565543B07DE210D
                                      SHA-512:289E4AF2DEE5B81B85460A6F6D674AB8EA5B9515CD02BC17440B869B8780227769AA4DE817C1E15747755AB494A08C267628052A5D73B0F619611C0EDEC0414D
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Default, Author: ScreenConnect Software, Keywords: Default, Comments: Default, Template: Intel;1033, Revision Number: {36B75195-3778-3603-935A-9224F330994C}, Create Time/Date: Tue Aug 13 23:22:20 2024, Last Saved Time/Date: Tue Aug 13 23:22:20 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
                                      Category:dropped
                                      Size (bytes):8237056
                                      Entropy (8bit):7.947702959091875
                                      Encrypted:false
                                      SSDEEP:196608:j53JLR3LGMLiW35953JLR3LGMLl53JLR3LGMLm53JLR3LGML:ZTiunT/TqT
                                      MD5:2AA4DC46E75B0A67EA4629169225E890
                                      SHA1:484B7A0CF43D099EF0E88D3A00326E38738E065E
                                      SHA-256:9EDE2A9B8D94D6D2AE58141DD6E06DA5BD84D0ECF09FA9678565543B07DE210D
                                      SHA-512:289E4AF2DEE5B81B85460A6F6D674AB8EA5B9515CD02BC17440B869B8780227769AA4DE817C1E15747755AB494A08C267628052A5D73B0F619611C0EDEC0414D
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):423504
                                      Entropy (8bit):6.577823761020625
                                      Encrypted:false
                                      SSDEEP:6144:9uH2aCGw1ST1wQLdqv5uH2aCGw1ST1wQLdqvi:9uH2anwohwQUv5uH2anwohwQUvi
                                      MD5:12A9029D3B9582D102B09A3EC47AAB64
                                      SHA1:E10709D6082DFDBEA4D27E26C52CBC3BD3176FD1
                                      SHA-256:8150695195C8F497E65D6A84C204C9E7204976AC8108B6D5C1C647F8636DA487
                                      SHA-512:FA8760F7D7C5100DF5C7272556A4B790F2D41E6A6EDF305853545B409848A0FFAAF6C9923FBEAFBAB8BFF3FB6CC7EE374A826F2F3F803E540671FB22D5BB60E8
                                      Malicious:false
                                      Yara Hits:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Windows\Installer\MSIA2A9.tmp, Author: Joe Security
                                      Preview:...@IXOS.@.....@.M,Y.@.....@.....@.....@.....@.....@......&.{36B75195-3778-3603-935A-9224F330994C}'.ScreenConnect Client (8139d6693ff11377)..setup.msi.@.....@.....@.....@......DefaultIcon..&.{36B75195-3778-3603-935A-9224F330994C}.....@.....@.....@.....@.......@.....@.....@.......@....'.ScreenConnect Client (8139d6693ff11377)......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{40A64DDB-C3F2-1624-70DC-7181A1E29087}^.C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.dll.@.......@.....@.....@......&.{D3422459-9E74-C140-280B-22440A1685FB}f.C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsBackstageShell.exe.@.......@.....@.....@......&.{F7B34A45-C5CD-8115-C4BF-BE030371C630}c.C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsFileManager.exe.@.......@.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):207360
                                      Entropy (8bit):6.573348437503042
                                      Encrypted:false
                                      SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):207360
                                      Entropy (8bit):6.573348437503042
                                      Encrypted:false
                                      SSDEEP:3072:X9LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDO/6Q+cxbr0qMG:XuH2aCGw1ST1wQLdqv
                                      MD5:BA84DD4E0C1408828CCC1DE09F585EDA
                                      SHA1:E8E10065D479F8F591B9885EA8487BC673301298
                                      SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
                                      SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.1619058777553297
                                      Encrypted:false
                                      SSDEEP:12:JSbX72FjMAGiLIlHVRpMh/7777777777777777777777777vDHF+6bbulp3Xl0i5:JuQI5cQ6bab6F
                                      MD5:C8CDF09FF0972C1D465CAD5A8DD5BE65
                                      SHA1:33AED449402B466FABD515BB2194A01B1A7DB1C7
                                      SHA-256:256C40B1FA27849452B596DD26B6B1E579389699E90A641BA71DE85F00D91242
                                      SHA-512:4403269E067202F073C725ED0FA359C712D7912DC4548D6FB1CF437C74B2852BE440250426466C86451920D18DDA7343844441DA861599B19867D31AF7186B04
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.8152725713318087
                                      Encrypted:false
                                      SSDEEP:48:g8PhMuRc06WX4uFT5e9ctofqcq56AduOSiC9Godb4YqyMi3D+kewitpio+xr2AdL:PhM1eFTdoSpHfmGodUGM8DZkpsVII
                                      MD5:1031C375F6CBBAF417962BEA66ED8EF2
                                      SHA1:6A40D45C89B849356153EFAC1AFA31D9C00BE1B4
                                      SHA-256:11AF6A26A73C523536D2734483A9241C26916BBEF3930ED2AFD28134700306A0
                                      SHA-512:0A8621DC1E5E1891BCE62D09C2A9B0002EDE280FF8E2AE6463CFAC673F04F0C599201C412C7E8C800F11369D204141616DE3BEF17A0CEA394D626A59FEC141B6
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:MS Windows icon resource - 3 icons, 16x16 with PNG image data, 16 x 16, 8-bit colormap, non-interlaced, 4 bits/pixel, 32x32 with PNG image data, 32 x 32, 1-bit colormap, non-interlaced, 4 bits/pixel
                                      Category:dropped
                                      Size (bytes):435
                                      Entropy (8bit):5.289734780210945
                                      Encrypted:false
                                      SSDEEP:12:Kvv/7tghWPjScQZ/Ev/739Jgh5TZYR/v/71XfghNeZ:QOZZq9JOz0dONeZ
                                      MD5:F34D51C3C14D1B4840AE9FF6B70B5D2F
                                      SHA1:C761D3EF26929F173CEB2F8E01C6748EE2249A8A
                                      SHA-256:0DD459D166F037BB8E531EB2ECEB2B79DE8DBBD7597B05A03C40B9E23E51357A
                                      SHA-512:D6EEB5345A5A049A87BFBFBBBEBFBD9FBAEC7014DA41DB1C706E8B16DDEC31561679AAE9E8A0847098807412BD1306B9616C8E6FCFED8683B4F33BD05ADE38D1
                                      Malicious:false
                                      Preview:..............z...6... ..............00..........0....PNG........IHDR.............(-.S....PLTE....22.u......tRNS.@..f..."IDATx.c` .0"...$.(......SC..Q8....9b.i.Xa.....IEND.B`..PNG........IHDR... ... .....I......PLTE....22.u......tRNS.@..f...(IDATx.c`...... ... D.......vb.....A`..(.-s...q....IEND.B`..PNG........IHDR...0...0.....m.k.....PLTE....22.u......tRNS.@..f...+IDATx.c` .......Q...S.@..DQu...4...(.}DQD...3x........IEND.B`.
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):432221
                                      Entropy (8bit):5.3751793324815615
                                      Encrypted:false
                                      SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauh:zTtbmkExhMJCIpErs
                                      MD5:F51F723C6F6832B0EAE7BF2976DEDB05
                                      SHA1:27EDF8330B9FC36D791A843D6C2A5C50FBF091E9
                                      SHA-256:4CCA011F899FB768DCA7093BB1683D7016DD7B5563F69FC7F6DD8C2B1842618F
                                      SHA-512:4516FD2CC3C04AB05164FA2E696E2ED62D1EC1C2D652DAB56FEBE987C534FF610B1B98B9A0A82A19451455BC4F875A8B70C51F5802F87A224DF448988DCF76D5
                                      Malicious:false
                                      Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                      Process:C:\Windows\System32\svchost.exe
                                      File Type:JSON data
                                      Category:dropped
                                      Size (bytes):55
                                      Entropy (8bit):4.306461250274409
                                      Encrypted:false
                                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                      Malicious:false
                                      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.031341210011988
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+//vXbAa3xT:2dL9hK6E46YPRIHvH
                                      MD5:567C6548AEA3E594B8E0CDC400D2051F
                                      SHA1:99EBEF09E61F9384919EB324ECB3507189895847
                                      SHA-256:890A609943DFB3095FEF6EAC35208AE932CC4E1528D8FDEEC3C36BE5FF6C3A57
                                      SHA-512:E0706F9CF7C5F637091CB81646EE05C8F74AAE05258860A49F9269B5E328AF8A6A4623C22F361E121245766C6063D89EE393334FBF4E9441D96DD74FA725923B
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a45%3a16</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.029489712591373
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+pQv/vXbAa3xT:2dL9hK6E46YPRIpQ3vH
                                      MD5:C10AEFA593856821B131AC359026C121
                                      SHA1:90193EF601C82D684E97776B05B3C4A3012D7ACA
                                      SHA-256:860C9C640C0839E622E419094B5962A530FA368D9A1014B9BD0F24A9B69234AC
                                      SHA-512:AEEB58E7EA14F9A425D80C74CC35CAA8B3D6B8FC6C711CAF90103273B373A42F1B87E9E53F67F91BAC01CC8C451F6A120B3B4BEAC56047A7D15AB9FAAD47C6D2
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a45%3a35</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.027661296867527
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+mQv/vXbAa3xT:2dL9hK6E46YPRIn3vH
                                      MD5:9D8C09993C204E5C11399C2E1B776382
                                      SHA1:499F24522B70FD58B1E2095AB15B81C887A44497
                                      SHA-256:F92C1A9A196699874C94C8B1C4BF62116339EDC60497862F7D14C8744A86BBDE
                                      SHA-512:22FF86B4BB5E4ED0114DC17E5EF3695F92033E018AA75279A33B5938B4B2364B0E070EDDC9AED182477EAA680263C2289FD8EE2653499A03B42599F2BBD35C57
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a44%3a15</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):582
                                      Entropy (8bit):5.0306752038901585
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+CPm/vXbAa3xT:2dL9hK6E46YPRIPvH
                                      MD5:A845C6156F481564C81EDEDBB25C6BDC
                                      SHA1:C00B755BDB82C72BC4EB5410412445905BE6E474
                                      SHA-256:3364228926F8E3FF58DA0E28D6A615676452763DD5ABB2AEF3A3A2DAB0183E24
                                      SHA-512:7EED8D85C337AB0D23550B306ECBE2784DF24B9AD7663A86BDEF8E5BA0D02ECC4D6844CD9FC53FF1261CF38735947319B9A042E9134CA3DD818C44971FD16D7C
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a46%3a08</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.025765415342166
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+y/vXbAa3xT:2dL9hK6E46YPRI4vH
                                      MD5:CE5422AF10544C0DCAB01D42453DD04D
                                      SHA1:F0BA4C81852D24EFD847AE6AF9788F2C74188D04
                                      SHA-256:BFFF1F46F0168FB5F2DADBD21A9AFB56F332A6E4A7AF37D00374AB6C6702CC27
                                      SHA-512:24789EB56185A4A76C222438A1397E31D1C80D68258BF964398E0A116DD39D6BCE24F7D7505D679A3863418C947FE6C4D07D541DD67942A84EEAA1B75643D249
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a44%3a21</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.025765415342166
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+8/vXbAa3xT:2dL9hK6E46YPRISvH
                                      MD5:F83F7E53DFD1FCD29F2EF90A933BF027
                                      SHA1:FEFA33C34A3ECA8276266D5CCE476488603F7FD5
                                      SHA-256:66846E1027028CAA892FD0AF9898A1C73F5F5C5DEA81BA7873780FB6B9FF0F66
                                      SHA-512:032DF69A0A29DDB5E2DD43817943D99284DD85EF14DD2AC5DD4CEBCA2BE0BBD96F57638460316710E9170FE8335B23FC5F7C58D0CE19A5E73AF02C1B8660DF0A
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a44%3a12</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.026368954016144
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+L5m/vXbAa3xT:2dL9hK6E46YPRIl8vH
                                      MD5:7260FE8D2A86B18860B8C3106A626F44
                                      SHA1:E4D5ADFA080E8F3323FF90E7D151282E509EB599
                                      SHA-256:CAE05A055016386D62FC9595C6CB8F77168403A32B81BEB3240713E78F3BA065
                                      SHA-512:E9F0B2AF952BBCF81DA33B1490057F3E41723321517A209FC7CA7D2DB80BE3EB3C3345AE07666FAC189D112E85202DB12AE862BE86D639579BAD70B7DD0EC766
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a44%3a09</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.026368954016144
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+L5m/vXbAa3xT:2dL9hK6E46YPRIl8vH
                                      MD5:7260FE8D2A86B18860B8C3106A626F44
                                      SHA1:E4D5ADFA080E8F3323FF90E7D151282E509EB599
                                      SHA-256:CAE05A055016386D62FC9595C6CB8F77168403A32B81BEB3240713E78F3BA065
                                      SHA-512:E9F0B2AF952BBCF81DA33B1490057F3E41723321517A209FC7CA7D2DB80BE3EB3C3345AE07666FAC189D112E85202DB12AE862BE86D639579BAD70B7DD0EC766
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a44%3a09</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):582
                                      Entropy (8bit):5.026053286474536
                                      Encrypted:false
                                      SSDEEP:12:TMHdGGqq9yAas26K9YG6DLI4MWiNuGEAaORnYPENONlb8AW2+u/vXbAa3xT:2dL9hK6E46YPRIUvH
                                      MD5:51D7A2F5F602AF038A7E9DD7D3DE5B94
                                      SHA1:8671F8DDD10C5DB8BC9BD6D2D8DF1C2805F047C3
                                      SHA-256:6E865BCDEF69960CF1389FA3D796825B006D672AAFC603AFC928EDEE02B4DA0A
                                      SHA-512:1219CCBA2C6863161E5687FE20A188ABAAE74F249B7FF1E1D5AB57DB7F619C832D45E53845B0FC5E576118E556FC7A36805E140EDEDC35CAACFFA344AE79580F
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <configSections>.. <section name="ScreenConnect.ApplicationSettings" type="System.Configuration.ClientSettingsSection, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" />.. </configSections>.. <ScreenConnect.ApplicationSettings>.. <setting name="HostToAddressMap" serializeAs="String">.. <value>instance-uil9h2-relay.screenconnect.com=147.75.81.4-12%2f09%2f2024%2013%3a45%3a00</value>.. </setting>.. </ScreenConnect.ApplicationSettings>..</configuration>
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.43170563505728
                                      Encrypted:false
                                      SSDEEP:48:5pkuWO+xFX4vT5hUQ9ctofqcq56AduOSiC9Godb4YqyMi3D+kewitpio+xr2AduK:7kPsTXooSpHfmGodUGM8DZkpsVII
                                      MD5:D6D11C2D5BD6702D92CE8CF7D9C1629C
                                      SHA1:4F9D50FFAD9399776496721B0995EA465AD82FF1
                                      SHA-256:9F8D06DBA7761BC56467E52D0C64637C9F77765F2613DEB573B872D934F41B44
                                      SHA-512:F08233C4B4CFC769B24AE42CD3D5766DE20376D4C82BF7D973968B04A2519E29C714D6C13F3426DCF2176A21B45B5889776E1E52279DD70D3781D0B77FF0E262
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.43170563505728
                                      Encrypted:false
                                      SSDEEP:48:5pkuWO+xFX4vT5hUQ9ctofqcq56AduOSiC9Godb4YqyMi3D+kewitpio+xr2AduK:7kPsTXooSpHfmGodUGM8DZkpsVII
                                      MD5:D6D11C2D5BD6702D92CE8CF7D9C1629C
                                      SHA1:4F9D50FFAD9399776496721B0995EA465AD82FF1
                                      SHA-256:9F8D06DBA7761BC56467E52D0C64637C9F77765F2613DEB573B872D934F41B44
                                      SHA-512:F08233C4B4CFC769B24AE42CD3D5766DE20376D4C82BF7D973968B04A2519E29C714D6C13F3426DCF2176A21B45B5889776E1E52279DD70D3781D0B77FF0E262
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.8152725713318087
                                      Encrypted:false
                                      SSDEEP:48:g8PhMuRc06WX4uFT5e9ctofqcq56AduOSiC9Godb4YqyMi3D+kewitpio+xr2AdL:PhM1eFTdoSpHfmGodUGM8DZkpsVII
                                      MD5:1031C375F6CBBAF417962BEA66ED8EF2
                                      SHA1:6A40D45C89B849356153EFAC1AFA31D9C00BE1B4
                                      SHA-256:11AF6A26A73C523536D2734483A9241C26916BBEF3930ED2AFD28134700306A0
                                      SHA-512:0A8621DC1E5E1891BCE62D09C2A9B0002EDE280FF8E2AE6463CFAC673F04F0C599201C412C7E8C800F11369D204141616DE3BEF17A0CEA394D626A59FEC141B6
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):1.43170563505728
                                      Encrypted:false
                                      SSDEEP:48:5pkuWO+xFX4vT5hUQ9ctofqcq56AduOSiC9Godb4YqyMi3D+kewitpio+xr2AduK:7kPsTXooSpHfmGodUGM8DZkpsVII
                                      MD5:D6D11C2D5BD6702D92CE8CF7D9C1629C
                                      SHA1:4F9D50FFAD9399776496721B0995EA465AD82FF1
                                      SHA-256:9F8D06DBA7761BC56467E52D0C64637C9F77765F2613DEB573B872D934F41B44
                                      SHA-512:F08233C4B4CFC769B24AE42CD3D5766DE20376D4C82BF7D973968B04A2519E29C714D6C13F3426DCF2176A21B45B5889776E1E52279DD70D3781D0B77FF0E262
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:Composite Document File V2 Document, Cannot read section info
                                      Category:dropped
                                      Size (bytes):20480
                                      Entropy (8bit):1.8152725713318087
                                      Encrypted:false
                                      SSDEEP:48:g8PhMuRc06WX4uFT5e9ctofqcq56AduOSiC9Godb4YqyMi3D+kewitpio+xr2AdL:PhM1eFTdoSpHfmGodUGM8DZkpsVII
                                      MD5:1031C375F6CBBAF417962BEA66ED8EF2
                                      SHA1:6A40D45C89B849356153EFAC1AFA31D9C00BE1B4
                                      SHA-256:11AF6A26A73C523536D2734483A9241C26916BBEF3930ED2AFD28134700306A0
                                      SHA-512:0A8621DC1E5E1891BCE62D09C2A9B0002EDE280FF8E2AE6463CFAC673F04F0C599201C412C7E8C800F11369D204141616DE3BEF17A0CEA394D626A59FEC141B6
                                      Malicious:false
                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):32768
                                      Entropy (8bit):0.06907654018647505
                                      Encrypted:false
                                      SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOL666CbfWGyVky6l3X:2F0i8n0itFzDHF+6bbuE3X
                                      MD5:5A88E8B39B3F8E639C3B064CDC3B2DB7
                                      SHA1:518D1532BF7F53F5B6B27899CE7ED61FEB814E44
                                      SHA-256:6E9FA1C4F8F154779142ED29029979C34F892909F5A0FD2AA193708BB6E3949C
                                      SHA-512:A7FF6208327F7A915FD615A8FADA8FF5A3C15C0B8A2B1F90CCE3A030096F08CF5956224C166B218AA31E8D51AC77C48FCD89B8C0526FE7C31CF16949E7001CCE
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):69632
                                      Entropy (8bit):0.24029517585528837
                                      Encrypted:false
                                      SSDEEP:48:pWIIyDBAduOS3qcq56AduOSiC9Godb4YqyMi3D+kewitpio+xrjoQ9c:4IIzxpHfmGodUGM8DZkpIo
                                      MD5:47D43AAF56FF14B523FECB0ABE4A67F9
                                      SHA1:A5DAD8D615EA2E84FEC89A2593CF5A1D6714B205
                                      SHA-256:8DDB389725EDB716779A30F56A6BBE398BF3C0A5EDF82D677C6E6D08B0CC53B6
                                      SHA-512:813BE65D6F4F8428252CB52FDFAA7651057CE789069375FA14CE37BCB61FD54037EB950275E840564EED4BACA6D26D91CD4D2E6B652BF8FB03E73B0430279945
                                      Malicious:false
                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\System32\msiexec.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):512
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                      Malicious:false
                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):7.425996531517683
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:SSA-Statement283482.exe
                                      File size:5'620'224 bytes
                                      MD5:3947493098fa9f8ad99838b31b1718ca
                                      SHA1:46c9b68d1a104a46d79025965cae26f44e768985
                                      SHA256:aa1b77e4203f23734eee91f426b9167c579f3a075ddc45c42ac4714ddc56d03a
                                      SHA512:97409a6c8f461c208e9995b2852b81b6f81bc3bc54d991822b36c66f5a800206de23b5517ee7e7ed59e9a12e173ecedca64430f98b47e898aa40e6ec44a04ad5
                                      SSDEEP:49152:3Dex5xKkEJkGYYpT0+TFiH7efP0x58IJL+md3rHgDNMKLo8SsxG/XcW32gqkAfoO:F4s6efPQ53JLbd3LINMLaGUW39f0
                                      TLSH:C746E011B3DA95B9D0BF053CD87A52699A74BC048722C7AF57D4BD292D32BC04E323B6
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_..E>`.E>`.E>`.....O>`.....?>`.....]>`..Ee.`>`..Ed.T>`..Ec.Q>`.LF..A>`.[l..F>`.E>a.%>`..Ei.D>`..E..D>`..Eb.D>`.RichE>`........
                                      Icon Hash:90cececece8e8eb0
                                      Entrypoint:0x4014ad
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x6377E6AC [Fri Nov 18 20:10:20 2022 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:1
                                      File Version Major:5
                                      File Version Minor:1
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:1
                                      Import Hash:9771ee6344923fa220489ab01239bdfd
                                      Signature Valid:true
                                      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                      Signature Validation Error:The operation completed successfully
                                      Error Number:0
                                      Not Before, Not After
                                      • 17/08/2022 01:00:00 16/08/2025 00:59:59
                                      Subject Chain
                                      • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
                                      Version:3
                                      Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
                                      Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
                                      Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
                                      Serial:0B9360051BCCF66642998998D5BA97CE
                                      Instruction
                                      call 00007FB5C4B8FB0Ah
                                      jmp 00007FB5C4B8F5BFh
                                      push ebp
                                      mov ebp, esp
                                      push 00000000h
                                      call dword ptr [0040D040h]
                                      push dword ptr [ebp+08h]
                                      call dword ptr [0040D03Ch]
                                      push C0000409h
                                      call dword ptr [0040D044h]
                                      push eax
                                      call dword ptr [0040D048h]
                                      pop ebp
                                      ret
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 00000324h
                                      push 00000017h
                                      call dword ptr [0040D04Ch]
                                      test eax, eax
                                      je 00007FB5C4B8F747h
                                      push 00000002h
                                      pop ecx
                                      int 29h
                                      mov dword ptr [004148D8h], eax
                                      mov dword ptr [004148D4h], ecx
                                      mov dword ptr [004148D0h], edx
                                      mov dword ptr [004148CCh], ebx
                                      mov dword ptr [004148C8h], esi
                                      mov dword ptr [004148C4h], edi
                                      mov word ptr [004148F0h], ss
                                      mov word ptr [004148E4h], cs
                                      mov word ptr [004148C0h], ds
                                      mov word ptr [004148BCh], es
                                      mov word ptr [004148B8h], fs
                                      mov word ptr [004148B4h], gs
                                      pushfd
                                      pop dword ptr [004148E8h]
                                      mov eax, dword ptr [ebp+00h]
                                      mov dword ptr [004148DCh], eax
                                      mov eax, dword ptr [ebp+04h]
                                      mov dword ptr [004148E0h], eax
                                      lea eax, dword ptr [ebp+08h]
                                      mov dword ptr [004148ECh], eax
                                      mov eax, dword ptr [ebp-00000324h]
                                      mov dword ptr [00414828h], 00010001h
                                      Programming Language:
                                      • [IMP] VS2008 SP1 build 30729
                                      • [IMP] VS2008 build 21022
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x129c40x50.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x533080.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x5462000x16000
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x54a0000xea8.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x11f200x70.rdata
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x11e600x40.rdata
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0xd0000x13c.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000xb1af0xb200d9fa6da0baf4b869720be833223490cbFalse0.6123156601123596data6.592039633797327IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0xd0000x60780x62008b45a1035c0de72f910a75db7749f735False0.41549744897959184data4.786621464556291IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0x140000x11e40x8001f4cc86b6735a74429c9d1feb93e2871False0.18310546875data2.265083745848167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x160000x5330800x5332000cb59c276652808eb7200fdad38bae5bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x54a0000xea80x1000a93b0f39998e1e69e5944da8c5ff06b1False0.72265625data6.301490309336801IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      FILES0x163d80x86000PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.39622565881529853
                                      FILES0x9c3d80x1a4600PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.5111637115478516
                                      FILES0x2409d80x1ac00PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows0.4415614047897196
                                      FILES0x25b5d80x2ec320PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.9812068939208984
                                      FILES0x5478f80x1600PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.3908025568181818
                                      RT_MANIFEST0x548ef80x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
                                      DLLImport
                                      mscoree.dllCorBindToRuntimeEx
                                      KERNEL32.dllGetModuleFileNameA, DecodePointer, SizeofResource, LockResource, LoadLibraryW, LoadResource, FindResourceW, GetProcAddress, WriteConsoleW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, FlushFileBuffers, HeapReAlloc, HeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, CreateFileW, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap
                                      OLEAUT32.dllVariantInit, SafeArrayUnaccessData, SafeArrayCreateVector, SafeArrayDestroy, VariantClear, SafeArrayAccessData
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 12, 2024 15:44:10.678889990 CEST49731443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:10.678951979 CEST44349731147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:10.679018974 CEST49731443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:11.290456057 CEST49731443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:11.290497065 CEST44349731147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:11.290730953 CEST44349731147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:13.452703953 CEST49734443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:13.452788115 CEST44349734147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:13.452886105 CEST49734443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:13.455749989 CEST49734443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:13.455790997 CEST44349734147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:13.455888987 CEST44349734147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:16.872443914 CEST49737443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:16.872476101 CEST44349737147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:16.872570992 CEST49737443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:16.887989044 CEST49737443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:16.888014078 CEST44349737147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:16.888058901 CEST44349737147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:22.540003061 CEST49741443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:22.540046930 CEST44349741147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:22.540119886 CEST49741443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:22.544027090 CEST49741443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:22.544039965 CEST44349741147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:22.544076920 CEST44349741147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:31.792597055 CEST49746443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:31.792640924 CEST44349746147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:31.792721033 CEST49746443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:31.795546055 CEST49746443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:31.795557976 CEST44349746147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:31.795608044 CEST44349746147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:47.541666031 CEST49747443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:47.541728020 CEST44349747147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:47.541810989 CEST49747443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:47.544163942 CEST49747443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:44:47.544181108 CEST44349747147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:44:47.546153069 CEST44349747147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:45:06.757999897 CEST49749443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:45:06.758048058 CEST44349749147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:45:06.758140087 CEST49749443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:45:06.761569977 CEST49749443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:45:06.761583090 CEST44349749147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:45:06.761645079 CEST44349749147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:45:40.085578918 CEST49750443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:45:40.085613012 CEST44349750147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:45:40.085746050 CEST49750443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:45:40.088654041 CEST49750443192.168.2.4147.75.81.4
                                      Sep 12, 2024 15:45:40.088674068 CEST44349750147.75.81.4192.168.2.4
                                      Sep 12, 2024 15:45:40.088721991 CEST44349750147.75.81.4192.168.2.4
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 12, 2024 15:44:10.588331938 CEST5897853192.168.2.41.1.1.1
                                      Sep 12, 2024 15:44:10.615725040 CEST53589781.1.1.1192.168.2.4
                                      Sep 12, 2024 15:44:47.506156921 CEST5174253192.168.2.41.1.1.1
                                      Sep 12, 2024 15:44:47.531346083 CEST53517421.1.1.1192.168.2.4
                                      Sep 12, 2024 15:45:40.043328047 CEST5036553192.168.2.41.1.1.1
                                      Sep 12, 2024 15:45:40.072587967 CEST53503651.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Sep 12, 2024 15:44:10.588331938 CEST192.168.2.41.1.1.10xcf5Standard query (0)instance-uil9h2-relay.screenconnect.comA (IP address)IN (0x0001)false
                                      Sep 12, 2024 15:44:47.506156921 CEST192.168.2.41.1.1.10x6db5Standard query (0)instance-uil9h2-relay.screenconnect.comA (IP address)IN (0x0001)false
                                      Sep 12, 2024 15:45:40.043328047 CEST192.168.2.41.1.1.10x4a53Standard query (0)instance-uil9h2-relay.screenconnect.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Sep 12, 2024 15:44:10.615725040 CEST1.1.1.1192.168.2.40xcf5No error (0)instance-uil9h2-relay.screenconnect.comserver-nixd2d85b70-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                      Sep 12, 2024 15:44:10.615725040 CEST1.1.1.1192.168.2.40xcf5No error (0)server-nixd2d85b70-relay.screenconnect.com147.75.81.4A (IP address)IN (0x0001)false
                                      Sep 12, 2024 15:44:47.531346083 CEST1.1.1.1192.168.2.40x6db5No error (0)instance-uil9h2-relay.screenconnect.comserver-nixd2d85b70-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                      Sep 12, 2024 15:44:47.531346083 CEST1.1.1.1192.168.2.40x6db5No error (0)server-nixd2d85b70-relay.screenconnect.com147.75.81.4A (IP address)IN (0x0001)false
                                      Sep 12, 2024 15:45:40.072587967 CEST1.1.1.1192.168.2.40x4a53No error (0)instance-uil9h2-relay.screenconnect.comserver-nixd2d85b70-relay.screenconnect.comCNAME (Canonical name)IN (0x0001)false
                                      Sep 12, 2024 15:45:40.072587967 CEST1.1.1.1192.168.2.40x4a53No error (0)server-nixd2d85b70-relay.screenconnect.com147.75.81.4A (IP address)IN (0x0001)false

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:09:44:04
                                      Start date:12/09/2024
                                      Path:C:\Users\user\Desktop\SSA-Statement283482.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\SSA-Statement283482.exe"
                                      Imagebase:0x10000
                                      File size:5'620'224 bytes
                                      MD5 hash:3947493098FA9F8AD99838B31B1718CA
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000002.1775891248.0000000005870000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000000.00000000.1740080529.0000000000026000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:09:44:05
                                      Start date:12/09/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\AppData\Local\Temp\ScreenConnect\8139d6693ff11377\setup.msi"
                                      Imagebase:0x310000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:09:44:05
                                      Start date:12/09/2024
                                      Path:C:\Windows\System32\msiexec.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\msiexec.exe /V
                                      Imagebase:0x7ff623800000
                                      File size:69'632 bytes
                                      MD5 hash:E5DA170027542E25EDE42FC54C929077
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Target ID:3
                                      Start time:09:44:05
                                      Start date:12/09/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding FA703DBE50430AA3AE223680D26C73B8 C
                                      Imagebase:0x310000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:09:44:05
                                      Start date:12/09/2024
                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                      Wow64 process (32bit):true
                                      Commandline:rundll32.exe "C:\Users\user\AppData\Local\Temp\MSI99FE.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3906140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                      Imagebase:0x160000
                                      File size:61'440 bytes
                                      MD5 hash:889B99C52A60DD49227C5E485A016679
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:09:44:07
                                      Start date:12/09/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding F47F0135428421DD6AA24B08E4ABF26D
                                      Imagebase:0x310000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:09:44:08
                                      Start date:12/09/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding B204C9D5325E238648AF623869E5D724 E Global\MSI0000
                                      Imagebase:0x310000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:09:44:08
                                      Start date:12/09/2024
                                      Path:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-uil9h2-relay.screenconnect.com&p=443&s=194aab28-7c37-4c31-9453-095c849fe3ac&k=BgIAAACkAABSU0ExAAgAAAEAAQBtiFOcCyZyZIYMRa7q%2fxlupwY5psgwtIrmaNtAqcPOS3wxM8KzGEILcWiAQrulPKqVk7Rqd6bB%2fHZh%2fmnGSw2CAH4apdeV45uG24aPv2cHFtSJ6RshGlIAVmQDpgDTZGV70NOKRVbQf4oTZhjBjedMNc4eQan%2fjh9itC%2bqr9sxraG6l1Z%2boKOxbfHBJ6Wfpk7eUPM6olxgYqoAmaN4Rv%2bfdTlaueMe6P2zoVUESpDoHb1G6UbMs3FmBJCA%2f9AZwydk%2f143G89rCDbAyabHRD4c4l%2fHfxv8RMfl8ImXlPMvnbcvlou8OpEAIEdGjx8c%2bAEWMGqksgH4Y5DFBuR2ZkLk&c=QuadChomes&c=QuadChomes.com&c=&c=Host&c=&c=&c=&c="
                                      Imagebase:0x9e0000
                                      File size:95'520 bytes
                                      MD5 hash:361BCC2CB78C75DD6F583AF81834E447
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:false

                                      Target ID:8
                                      Start time:09:44:09
                                      Start date:12/09/2024
                                      Path:C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe" "RunRole" "784d1de5-465a-4b33-b06c-f62c00412c92" "User"
                                      Imagebase:0x3d0000
                                      File size:601'376 bytes
                                      MD5 hash:20AB8141D958A58AADE5E78671A719BF
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000008.00000000.1793840200.00000000003D2000.00000002.00000001.01000000.00000011.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: 00000008.00000002.2990249542.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_ScreenConnectTool, Description: Yara detected ScreenConnect Tool, Source: C:\Program Files (x86)\ScreenConnect Client (8139d6693ff11377)\ScreenConnect.WindowsClient.exe, Author: Joe Security
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      Reputation:low
                                      Has exited:false

                                      Target ID:9
                                      Start time:09:44:11
                                      Start date:12/09/2024
                                      Path:C:\Windows\System32\svchost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                      Imagebase:0x7ff6eef20000
                                      File size:55'320 bytes
                                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:false

                                      Reset < >
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C8${/
                                        • API String ID: 0-4231431693
                                        • Opcode ID: 86af36078e009f4bd70eaca47784a1844b65e16c22d7a01d9ef5b65bd9b102d4
                                        • Instruction ID: 2c83bcf1298d6beb1935933cb19d6f18a35468b11e5a2e5ff354d09f9357dac1
                                        • Opcode Fuzzy Hash: 86af36078e009f4bd70eaca47784a1844b65e16c22d7a01d9ef5b65bd9b102d4
                                        • Instruction Fuzzy Hash: 1F61BD723102025BD716AB7ED8D066E7BE6FBCA2147448629E215CF344EFF4BC858B91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: C8${/
                                        • API String ID: 0-4231431693
                                        • Opcode ID: ea743f6617e611d235bc06669e1dbe24834fcdde28d083600267c1d5905e1e46
                                        • Instruction ID: 36827fc9b882f2716084ccdc8a5269d8c9399234648633f82a7c947ca5b791b9
                                        • Opcode Fuzzy Hash: ea743f6617e611d235bc06669e1dbe24834fcdde28d083600267c1d5905e1e46
                                        • Instruction Fuzzy Hash: 54519D713102025BD726AB7ED8D156E7BE6FBC92143408629E616CF344EFF4BC858B91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq$Hhq
                                        • API String ID: 0-2633903351
                                        • Opcode ID: 1e862c819f2b50d7d28950700ca145c8d0eb40ed2b11f2bfe5200480c4a226e6
                                        • Instruction ID: 4c6b7438ce30e47e2e7f2ee5c7dde364c69289773a056a6380fe2cbea30db734
                                        • Opcode Fuzzy Hash: 1e862c819f2b50d7d28950700ca145c8d0eb40ed2b11f2bfe5200480c4a226e6
                                        • Instruction Fuzzy Hash: D5419F35B0024A8BCF649FAD84946AEBBB2FFD4350F14846AE905DF380DE70ED0187A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: 1ed68bba14d78034dac2daa280254e126cadc203cae0ca116006783a423a60c6
                                        • Instruction ID: 632ca623543bce285cd2df7ae33a6021cae19c839a0455676370650d1e12ebdb
                                        • Opcode Fuzzy Hash: 1ed68bba14d78034dac2daa280254e126cadc203cae0ca116006783a423a60c6
                                        • Instruction Fuzzy Hash: E861F379B106059FCB14DFACD8949AEB7B2FF89314B148598E506AF365DB30EC01DB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: K]
                                        • API String ID: 0-3798347547
                                        • Opcode ID: a79ebbfe7f659f1b11f5540644ef90d32bd4a0679f10e9963df805fc522a500f
                                        • Instruction ID: 49f1c4be5be5a33f9e7f2668a4bbd14c65021262385557486e9ace4d7e3540e9
                                        • Opcode Fuzzy Hash: a79ebbfe7f659f1b11f5540644ef90d32bd4a0679f10e9963df805fc522a500f
                                        • Instruction Fuzzy Hash: 30313372B042008BCB11DF6DD8D569EBBE6FFC4361B15886AD849CF356EA30EC0587A0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tedq
                                        • API String ID: 0-228892971
                                        • Opcode ID: cd84282e185211406e6e1fd6af7117198a8d42cd32a03fbbe82e74bc7eaf8555
                                        • Instruction ID: 798c5da2a9374a1454753747f9921374a1fd67babe3495aacdd61a7e95773e07
                                        • Opcode Fuzzy Hash: cd84282e185211406e6e1fd6af7117198a8d42cd32a03fbbe82e74bc7eaf8555
                                        • Instruction Fuzzy Hash: 06310E70600B418FC734DF6DD98465AB7F1FF88324B504F2DE5668B6A1DB30A949CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: 361a706efaa31311d5f41a1061a3c771e8ce43915243562fa053f2fffd964810
                                        • Instruction ID: 448c116c87dc7d3694b0fbaf03f04a01d702ee7a196d3d817ceff5b2ee06e01f
                                        • Opcode Fuzzy Hash: 361a706efaa31311d5f41a1061a3c771e8ce43915243562fa053f2fffd964810
                                        • Instruction Fuzzy Hash: 8F118EBA7042018FCB16DB6CD490A6ABBE2FFDD260715849DE459DB751DA31EC018B50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: K]
                                        • API String ID: 0-3798347547
                                        • Opcode ID: 8dd89910143e21df190bf0bffb6ce123b67d6aa60e5d389c282dd38bc16ba804
                                        • Instruction ID: 024f0929c79918122925873c0bfbb7d6ef6d5f823b5c910a47f374bd140d42c2
                                        • Opcode Fuzzy Hash: 8dd89910143e21df190bf0bffb6ce123b67d6aa60e5d389c282dd38bc16ba804
                                        • Instruction Fuzzy Hash: B51126757002019BCB54DF6DD8C095EFBE6FFC9260744886AE819DF315EA70EC048BA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: bf8cc65f4f31d820e2542593c33227a26a38e0e9fd14a3f5cc124032b1f42722
                                        • Instruction ID: c4a08db914b19d72fb5e1b40d95efd39d38e15bd44e8b895e2ef0fcfe2443b89
                                        • Opcode Fuzzy Hash: bf8cc65f4f31d820e2542593c33227a26a38e0e9fd14a3f5cc124032b1f42722
                                        • Instruction Fuzzy Hash: 1C118F753042019FCB25DB6DD490A2ABBE6FFCD220714855DE55ACB340DE31EC028B50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tedq
                                        • API String ID: 0-228892971
                                        • Opcode ID: fb709d4440e2bbbd5425a9007a40e30c18e51cbb04838db3a189fadbfbe2fed3
                                        • Instruction ID: 864f80fa73e78dce75c3dfd3972c216f2756ed28936f8e2e0af0d466ff190bec
                                        • Opcode Fuzzy Hash: fb709d4440e2bbbd5425a9007a40e30c18e51cbb04838db3a189fadbfbe2fed3
                                        • Instruction Fuzzy Hash: E8F096717042115BC314DB6AA99096BFB9AEBD9320B14845EE9198F351DE32DC0687E0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Tedq
                                        • API String ID: 0-228892971
                                        • Opcode ID: bce81218209c9b350d89f766f90d7d0d3d45275d131407ec67c16f53c6a22ae4
                                        • Instruction ID: 4b5a8565063f62861201ac4bc8408d8494f33a70e49dd32957207ec329401a5c
                                        • Opcode Fuzzy Hash: bce81218209c9b350d89f766f90d7d0d3d45275d131407ec67c16f53c6a22ae4
                                        • Instruction Fuzzy Hash: B4F089713001155BC314DA9E9C90D6BFB9BFBC8760B54842AE9198B355CD72DC0283A0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 991cd1c8fdef743f2ddfe396b70c7c265e909c401ebb30874c78eca4a2019ea6
                                        • Instruction ID: 011839c01509f231fdeb3bfd213c9b584838570b9495f63e956490a370beeeda
                                        • Opcode Fuzzy Hash: 991cd1c8fdef743f2ddfe396b70c7c265e909c401ebb30874c78eca4a2019ea6
                                        • Instruction Fuzzy Hash: 4ED10675A0060ADFCF11CF98C9808AEBBB2FF49314B248459E955AB361D731ED56CFA0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 817df02e011c88d823c515f0acce43c6c95700de5d0fb1ef3ad65cb179f855f5
                                        • Instruction ID: f84d3c88b563f41bf42a2ce94b243c4217cbde482783a020ea1695c1eefcc28b
                                        • Opcode Fuzzy Hash: 817df02e011c88d823c515f0acce43c6c95700de5d0fb1ef3ad65cb179f855f5
                                        • Instruction Fuzzy Hash: E891AB746016018FC72ADF2CC8D496ABBF5FF89724740995AE196DB771DA30AC028B91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 42e5e2a9f771a760ca9c218c11aa7905876ccdf08831eaf762dd6f163fd04f88
                                        • Instruction ID: 3f159928045a74c893307eeec329c41d7554ec94adc0bd57ed154b3e248f49f5
                                        • Opcode Fuzzy Hash: 42e5e2a9f771a760ca9c218c11aa7905876ccdf08831eaf762dd6f163fd04f88
                                        • Instruction Fuzzy Hash: AB913971A003058BDB25DF6DD48459EBBF6FF85310B148A69E815AF354EFB0AC46CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f1650aa4e3f468d496562a1289ac274e271ae9613d3dc51c4a3e33fc7b148da4
                                        • Instruction ID: 92024220eb167bf1902f3998c0e83c1d56a5140b62849ca297a0a75631630c0f
                                        • Opcode Fuzzy Hash: f1650aa4e3f468d496562a1289ac274e271ae9613d3dc51c4a3e33fc7b148da4
                                        • Instruction Fuzzy Hash: 74811974B002069FCB55DF69D598A6DBBF2FB88300B148529E816DB3A4DFB4EC42CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 20c6e9567d14f15c919628497be34fc58e9913836c80062212287d8503f3c5b7
                                        • Instruction ID: 2a0a60eab46610ca65c8397ac5bc7b32aca6a90a9709b65052d3c087972f3246
                                        • Opcode Fuzzy Hash: 20c6e9567d14f15c919628497be34fc58e9913836c80062212287d8503f3c5b7
                                        • Instruction Fuzzy Hash: B5811A74B002069FDB55DF69D594A6DBBF2FB88300B108529E816DB3A4DFB4EC42CB51
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: acb52ae5a88ee6611d3984d7588e5b9b5005ffddc5a7b01e4bab79b26f982710
                                        • Instruction ID: 01f1f2da40fdff856ef28d07a8ec03b36f096cd306a63ff29e84428310927cdc
                                        • Opcode Fuzzy Hash: acb52ae5a88ee6611d3984d7588e5b9b5005ffddc5a7b01e4bab79b26f982710
                                        • Instruction Fuzzy Hash: 9F618F71B006058FDB14DF68D8844AEBBF2FFC92107258969E50AEF391DFB0AC068B50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a01e85404deb6c549d6662d81dd581a4d29b37f6c48fa41ffb7544f51cafd805
                                        • Instruction ID: 91e03ec84416d9d79f838306e4f80a28ba8c6c3615f91217e94e4a177c8f08bf
                                        • Opcode Fuzzy Hash: a01e85404deb6c549d6662d81dd581a4d29b37f6c48fa41ffb7544f51cafd805
                                        • Instruction Fuzzy Hash: 12513B75A10615CFCB44CFA9C88499EBBF6FF8A700B21816AE505EF361DBB1AD05CB40
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e226f9960b148dd706ab1536c503c6b4cfbc0e3fd410310c20b921ab88c1d457
                                        • Instruction ID: 3fbede61330324e0c0b5b63beca804003102758826333cca5a4b30cd0216e7fe
                                        • Opcode Fuzzy Hash: e226f9960b148dd706ab1536c503c6b4cfbc0e3fd410310c20b921ab88c1d457
                                        • Instruction Fuzzy Hash: F76100387106058FC754DF69C88485ABBF6FF8961171589A9E51ADB771EB30FC01CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b6658e20c84181232fc6fdc5a14799e762f32877fed9c0a676e7cb9c78119c27
                                        • Instruction ID: 831619a675e511c268c12357bb056bdce0a41527c1fdce51f6c6eb7b2698744a
                                        • Opcode Fuzzy Hash: b6658e20c84181232fc6fdc5a14799e762f32877fed9c0a676e7cb9c78119c27
                                        • Instruction Fuzzy Hash: 28517F70E103099FDB04DFB9D844B9DBBB2FF89300F109559E514BB290DBB5A985CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a615cfd5b1f2272d6f312e942e4eaf8912654d9cf44665aa449f04e8d2ca7301
                                        • Instruction ID: c239fe2f81d20ed71f585f13fedf4c29bf1670b869dce76c863c0dd0995ed51f
                                        • Opcode Fuzzy Hash: a615cfd5b1f2272d6f312e942e4eaf8912654d9cf44665aa449f04e8d2ca7301
                                        • Instruction Fuzzy Hash: 20510874600601CFDB28DF2DD8D466A7BB1FF89325B0445A8E8159F3AADB30E856CF91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a2d8abbe545d23f7dfef75978be103b9db54d6a26e2a19d817a67eac3a6ccb1
                                        • Instruction ID: d3950f1462bb960184710220a330a645d6630e76416a89567ea6c1f02263050f
                                        • Opcode Fuzzy Hash: 7a2d8abbe545d23f7dfef75978be103b9db54d6a26e2a19d817a67eac3a6ccb1
                                        • Instruction Fuzzy Hash: 23514C70E102099FDB14DFB9D884BDDBBB2FF88300F119659E514BB290DBB5A985CB90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 778518c1e5e7033cc6079971adaa06fb2e003bf82ab2a3f82789e04ff9627539
                                        • Instruction ID: 0509f0fe338a04c9ca91ab8bfe5c2ad4d10e9c09b7688d81ae97b19f9c240a08
                                        • Opcode Fuzzy Hash: 778518c1e5e7033cc6079971adaa06fb2e003bf82ab2a3f82789e04ff9627539
                                        • Instruction Fuzzy Hash: 4D413879704205DF9B14DB9CC49096A7BF6FF8C211B248099E909DF395DB31ED02DB61
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ea9461b126532b63b6670f125b5906c3bbe9d592776722d803987dcab9c48ad9
                                        • Instruction ID: 72d3e24b5873c0f0af5731d665a26aef1d1421e5c1a7fa0bffe547e3b11ed44b
                                        • Opcode Fuzzy Hash: ea9461b126532b63b6670f125b5906c3bbe9d592776722d803987dcab9c48ad9
                                        • Instruction Fuzzy Hash: FB314D31B002068FDB24AF6DC4986AEBBF6EF89354F144469D516EF750DF70AC058B94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f86615b83446971631abcf74aa37b45a94014b448d7323fa56b4b823a547ded4
                                        • Instruction ID: 38ddbc38f0257240e5ba65a80d88689319e0efc41c46b1e02d454d0a5de49c78
                                        • Opcode Fuzzy Hash: f86615b83446971631abcf74aa37b45a94014b448d7323fa56b4b823a547ded4
                                        • Instruction Fuzzy Hash: 54418E74A00205DFDB24DF68D598B6DBBF2FF88300F148458E416AB7A1CBB4AC85CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 40112931e92f3831d9433d734ebad739a15da11a887fb505b001ddc1ad133210
                                        • Instruction ID: ad2960586b4307236fc04d0dacbfe4f26daa8d2aea3809605eb01222f24f9886
                                        • Opcode Fuzzy Hash: 40112931e92f3831d9433d734ebad739a15da11a887fb505b001ddc1ad133210
                                        • Instruction Fuzzy Hash: 51415174E012199FDB58DFAAD940AEEBBF2BF88300F14812AE815BB354DB749941CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8802cac4a4fbac3d00a810c054bac9160d65371e7360744218f002c8e9efa2c
                                        • Instruction ID: 77310eb5b9a18a67bb7e37e41c8eac887240dc4c25bb4294092fdd464dfa3756
                                        • Opcode Fuzzy Hash: e8802cac4a4fbac3d00a810c054bac9160d65371e7360744218f002c8e9efa2c
                                        • Instruction Fuzzy Hash: EF313E35A00108DFCB00CF69D8808DEBBB5FF8D324B108169EA19AB361D772EC46CB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eaa54f522f6a0f67a97201ca3cc60ba0d96747b35b641944eaca53fc8062668b
                                        • Instruction ID: f524684469c347f38e7cabf88387d761e6bf6052b62420aac72b8658b4e1d6e1
                                        • Opcode Fuzzy Hash: eaa54f522f6a0f67a97201ca3cc60ba0d96747b35b641944eaca53fc8062668b
                                        • Instruction Fuzzy Hash: 413106706007018FC730DF2ED84466ABBF2BF89354B144A68E5A6DB7A1DB31E946CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aba4a99df015032ce2f4e38f06ed9953d287b54089262423f27102a1c62d4172
                                        • Instruction ID: a500ad58f06503ae33862c4f859420ead7977772a078475ce4e13ae15a11de17
                                        • Opcode Fuzzy Hash: aba4a99df015032ce2f4e38f06ed9953d287b54089262423f27102a1c62d4172
                                        • Instruction Fuzzy Hash: 2A314D75A00104DFCB01CF68D98099DBBB6FF8D314B258199EA19AB361D772EC46CB50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23b265c68b9cb487387a23159204e048e38284bf1fc72bee6e1f708b53144e0c
                                        • Instruction ID: e37e4b65769a1567f492620b25c5d5383b6ec80a60503c38ff826d83b3485bb7
                                        • Opcode Fuzzy Hash: 23b265c68b9cb487387a23159204e048e38284bf1fc72bee6e1f708b53144e0c
                                        • Instruction Fuzzy Hash: 3231B5746006018FC734DF2EC85466ABBF1FF89321B144A69D5A69B7A1D730E94ACF90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 012015663d4f26345c4a4f43fb069422760d6e32172c8398ecdd290811555ce1
                                        • Instruction ID: 63b03356c7b1565d5da021fe00244442b71f306227c809be7ca760bb3f54917c
                                        • Opcode Fuzzy Hash: 012015663d4f26345c4a4f43fb069422760d6e32172c8398ecdd290811555ce1
                                        • Instruction Fuzzy Hash: 4521BC317002021FD72AAB6DE8D16AE66E7FBC92507508A29D1058F764EEF0AC8187D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7025e31fcda318d4aa610136fa7889b1a63cc9f80c53c19500ec0d23e889edf4
                                        • Instruction ID: 7750fc7a9d2153229b34d0f7109ce159145e0dc32340759a33fceb21e4c54505
                                        • Opcode Fuzzy Hash: 7025e31fcda318d4aa610136fa7889b1a63cc9f80c53c19500ec0d23e889edf4
                                        • Instruction Fuzzy Hash: C8217F313002025FD729A77EE8D15AE77EBFBDA2507508A29E1158F764EEF0AC8187D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fc1c8f155e112ae1af3a7625d75c2c101e224e9b3fc374d3d673776ab1ce4c63
                                        • Instruction ID: e2eae8b8c523e02bd3820969b0149af22ae73e7a8fa2d3540a1f245ce8468460
                                        • Opcode Fuzzy Hash: fc1c8f155e112ae1af3a7625d75c2c101e224e9b3fc374d3d673776ab1ce4c63
                                        • Instruction Fuzzy Hash: 86214B70A017018BDB34DF7DD85866ABBF6BF84314B040A2CE566DB394DB30E905CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8c1dfebfc40ba56ae5c0ad1b1717c97811dc108ee2ee23ac24dc3313ecbf4917
                                        • Instruction ID: 57e9a964e9f49596c74350af1e37da42f62cfb7c967ef4b9152398e8b2940b60
                                        • Opcode Fuzzy Hash: 8c1dfebfc40ba56ae5c0ad1b1717c97811dc108ee2ee23ac24dc3313ecbf4917
                                        • Instruction Fuzzy Hash: D521F274E012198FDB19CFAAD9046EEBBF2FF89310F04C16AD418AB264DB745946CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 689be9ac4e7211aed3a1e88a08f8cc24cb2459ca83dc9dc05d94ef169ac3d120
                                        • Instruction ID: df90c55df83ac9331d77f624c572ce61030daa70366f4135e326d166481b2966
                                        • Opcode Fuzzy Hash: 689be9ac4e7211aed3a1e88a08f8cc24cb2459ca83dc9dc05d94ef169ac3d120
                                        • Instruction Fuzzy Hash: C1214F31600206CBDF28CF2CD9D459A7BB5FF48320B044669D9259F2EAEB31E955CBE1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bbbf6e4cbebe5135512089d5c7afd7f9332adb311d4c21bc38298b2a29954808
                                        • Instruction ID: 016206dcf2caaeaddebdd20b404876c663115d56891c1135a73011c73d277f3c
                                        • Opcode Fuzzy Hash: bbbf6e4cbebe5135512089d5c7afd7f9332adb311d4c21bc38298b2a29954808
                                        • Instruction Fuzzy Hash: F6211B302047059FC735CF6AD85459ABBF1FB44320B008A2DD5669BAE5DB31E94ACF81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e2ff557783efde2008fa43d81d061736e926a0eb6d434379f1f975aac66f2dd
                                        • Instruction ID: fcf201e2b18479616565cd7f096a492053e80b051f9de3a39471adbb428c6196
                                        • Opcode Fuzzy Hash: 4e2ff557783efde2008fa43d81d061736e926a0eb6d434379f1f975aac66f2dd
                                        • Instruction Fuzzy Hash: E911E937B00214DBDF208A5CC8045EEBBB5EBC4711F454479EA0AAB220D7B0DC15CBD1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 68b15e3c4b5b92965fad4b4a63153d72d4f13cb5e0da2ed03cbaad8eaa0462d4
                                        • Instruction ID: 976ce69b183a014cfd2c1d59f00e837e06bf865b858c3d854dc50713f2a987cc
                                        • Opcode Fuzzy Hash: 68b15e3c4b5b92965fad4b4a63153d72d4f13cb5e0da2ed03cbaad8eaa0462d4
                                        • Instruction Fuzzy Hash: D11182727043055FD714DA6DE880A9FBBE5EB84665B108A2AF5058B341DEB1FC058790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 894ada18ecb65d287fd99f401cbdb19a7e67de14c2b5c44a32d94e6a7d8a6c8b
                                        • Instruction ID: dccf00093aab84783be1b746366df55ccb232d9d4b26a38344b3bfc2ade155ef
                                        • Opcode Fuzzy Hash: 894ada18ecb65d287fd99f401cbdb19a7e67de14c2b5c44a32d94e6a7d8a6c8b
                                        • Instruction Fuzzy Hash: 23113A356097501FC7238B3D88944AE3FA1FE83220345089BE495CF693CF24884897A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 636d29f932bf50ca5383d5a481f22d688dcb6648d89ac308319b01616451a205
                                        • Instruction ID: 2a1726ab7b7f4a6b037cd8cdf2db5008c11574bb2557ae09ecc7f7061d4766eb
                                        • Opcode Fuzzy Hash: 636d29f932bf50ca5383d5a481f22d688dcb6648d89ac308319b01616451a205
                                        • Instruction Fuzzy Hash: 9111A576A002148BDF254A5CC8545BE7BA6EF88311F4A8469EA06AF260D7B0D8159B81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ea71157227663e6bd6e498e7d16a11edf1075415f26bf898550e2995e4733022
                                        • Instruction ID: 7f1be96af6b4c2b076465244acd558c17476e697809ffa62bf8eef9a67a442ba
                                        • Opcode Fuzzy Hash: ea71157227663e6bd6e498e7d16a11edf1075415f26bf898550e2995e4733022
                                        • Instruction Fuzzy Hash: 06115BB4E0020A9FCB44DFA8D5959AEBBF1FF89304F11846AD414EB3A5DB30A905CF65
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fd8cf0265f85cacf48bb1de3ee4d244651dc19ec14875c2968b4b87065dcf900
                                        • Instruction ID: b41562c2d14dd9a176a8267c66af3c95e7ef1c64b9b78b6e1b6ade557c732840
                                        • Opcode Fuzzy Hash: fd8cf0265f85cacf48bb1de3ee4d244651dc19ec14875c2968b4b87065dcf900
                                        • Instruction Fuzzy Hash: 7B11827560020A9BCF25CEADD894AAEBBB5FF84350F048566ED14CF285EB70E510CBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c569f22b1465e9d0dac3bf334d7196c2b7c4a17298aa6ee2304ef42a5124c485
                                        • Instruction ID: 3b9b954bf784dba83626764cd291dc19aac9e9a09ccfaf3b8fe6f12d0618c80a
                                        • Opcode Fuzzy Hash: c569f22b1465e9d0dac3bf334d7196c2b7c4a17298aa6ee2304ef42a5124c485
                                        • Instruction Fuzzy Hash: 1A1118B4E0020A9FCB44DFA9D545AAEFBF1FF88200F118469D915AB3A4DB30A901CF95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749662129.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_153d000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 678aae29d76be62ddd0e279d720d60a6842205246031ed00d8d5bed91d6988f0
                                        • Instruction ID: 716e8ac444cb47aeac132cf849dcc609982970478d9fb788445850f018b9c968
                                        • Opcode Fuzzy Hash: 678aae29d76be62ddd0e279d720d60a6842205246031ed00d8d5bed91d6988f0
                                        • Instruction Fuzzy Hash: 6E01F7714043009AE7118AA9CCC4B66FFF8EF817A4F48C81AED494F282D6799945CAB1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749662129.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_153d000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 927b1b1a1a3dc834468f29b31385e9f59389eb2cdce83d3a3cc5f553ae420c74
                                        • Instruction ID: 6af50fe0c866d9d91fc901f82ea759860a7593b0490bfae0685c102cba98320b
                                        • Opcode Fuzzy Hash: 927b1b1a1a3dc834468f29b31385e9f59389eb2cdce83d3a3cc5f553ae420c74
                                        • Instruction Fuzzy Hash: FD01807200E3C05FD7138B258C94B56BFB8EF43224F0980CBD9888F1A3C2695849C772
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fc693e066b22ffa95c449aa64281a94e48cf79a55bde8e938cd3bdd45dbe4bbb
                                        • Instruction ID: 06e0170923870ecc02a1d20dd8b2fd13fd97e367229e4f17c8e9291088a440c9
                                        • Opcode Fuzzy Hash: fc693e066b22ffa95c449aa64281a94e48cf79a55bde8e938cd3bdd45dbe4bbb
                                        • Instruction Fuzzy Hash: 6B012131B042065FE722862EACD0A6FBBEAFBC9215B00052AE505CB350FEE0AC008790
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 002c97ce818dc9483927128082cda04e284501231a17059652839521a6468ef0
                                        • Instruction ID: c450bc0af22b0db3ad69f9f15158a5eaca7034d3dc5f63badaf46092e08bff9d
                                        • Opcode Fuzzy Hash: 002c97ce818dc9483927128082cda04e284501231a17059652839521a6468ef0
                                        • Instruction Fuzzy Hash: E10128346002058FCB24CF58C4A8AAEB7F1FF4E348F105459E402AB694CB30EC04CF50
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41b03a0ebd7943ff3160ee42455604be076e24fecb33d57e00559142a0bbc2c9
                                        • Instruction ID: 5f4c521571fc5bc8c568c2333c9b13e3b5ebd519a31cea6e2e1a26e47f303e2a
                                        • Opcode Fuzzy Hash: 41b03a0ebd7943ff3160ee42455604be076e24fecb33d57e00559142a0bbc2c9
                                        • Instruction Fuzzy Hash: 39F0C2317002065FE725962EECD0A6FB7EAFBC9614B00452AE505CB340EEE0AC418794
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: feaae05e88a8c72652ca189d106ae0f34839e6b3662d6a0d56a36341bdb24f2e
                                        • Instruction ID: de51c7e8a2ac55a5a4f9f1b6865d5f0f979fe3b3c92a77d8535705eb7ae648dd
                                        • Opcode Fuzzy Hash: feaae05e88a8c72652ca189d106ae0f34839e6b3662d6a0d56a36341bdb24f2e
                                        • Instruction Fuzzy Hash: 0C018C75B001008FC714CF6DD49492ABBE6EFCE361B6688A9E848CF341DA31EC02CB95
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 584dfe9fd6dbc4a00622d8470b26d5aaf741127f0e815fa71dec96f712ff6a8d
                                        • Instruction ID: ee4d19b6411082226609c5ad5cba1a87c537dfd588d25cabf32f22a286ef55eb
                                        • Opcode Fuzzy Hash: 584dfe9fd6dbc4a00622d8470b26d5aaf741127f0e815fa71dec96f712ff6a8d
                                        • Instruction Fuzzy Hash: FDF06D357001008F8714DF6DD08482ABBE6FFCD2603658899E449CF341DE31EC02CB94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 440a3a590db93b8ac97d015a3251eae7b8e6a4d8d10aeae483d0abd0553b3339
                                        • Instruction ID: 69e6d150d5370e32cea1067f58737f3889e04eb7f040388983a2e35abcdfef42
                                        • Opcode Fuzzy Hash: 440a3a590db93b8ac97d015a3251eae7b8e6a4d8d10aeae483d0abd0553b3339
                                        • Instruction Fuzzy Hash: 3C01A270600209DFDB24DB18D298B9CBFF2FB48308F148548D0099F691CBB59DCACB82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f664822ee8cc7e0e8dc373286a2c5547c388965c37e42d03d983be8716a2df7
                                        • Instruction ID: 4cf9e8703a168285ab9debeec619610229a60e15ae3e6571535cea3ae203f5d0
                                        • Opcode Fuzzy Hash: 1f664822ee8cc7e0e8dc373286a2c5547c388965c37e42d03d983be8716a2df7
                                        • Instruction Fuzzy Hash: 04F05538300A055BC762AB6EE48056E37E6FFCA2613414829E42ACF300EF34ECC04BD0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c67ad2660c904c79b1d17994116af77e29a583119905021929d4c862b9394e29
                                        • Instruction ID: 7f8a2ec07614b9a6e8115e4ccf6b4f9b9f747f9859b2af4a853a3d8104c08911
                                        • Opcode Fuzzy Hash: c67ad2660c904c79b1d17994116af77e29a583119905021929d4c862b9394e29
                                        • Instruction Fuzzy Hash: 24E06570D093895FCB15CBB4D45149DBFF0DF42310F0445DED8549B392DA351A4AC752
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd747dca654b46e6c7c98742a4a682a7adc7e0425774e760a8ea88f548513e3c
                                        • Instruction ID: 313eadf2567204f872cc42decc23fca2119c03467137a69788ec26d4c9ee5b92
                                        • Opcode Fuzzy Hash: dd747dca654b46e6c7c98742a4a682a7adc7e0425774e760a8ea88f548513e3c
                                        • Instruction Fuzzy Hash: 8AE08C71941108FBCB50DFAEFD81B9EB7E8FF81209F1445A8E408EB200EA306E409795
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e3fba741f033e4ec3e14a15b10985cb28fcce4effac2bf9d6714ce0206ce347
                                        • Instruction ID: 6701db77e0e35a6f4153a68aaaccf3b95fcfa14c3a6b0a198850f9366b5a41d5
                                        • Opcode Fuzzy Hash: 3e3fba741f033e4ec3e14a15b10985cb28fcce4effac2bf9d6714ce0206ce347
                                        • Instruction Fuzzy Hash: F1E086737066101BC3345A9D7844146FAE5FBC9161744026EE40AC77D0E960980187A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16a76ae6519efc112635435a3f8e753a7c3315da0f014bcd5a64a9c27ecacb77
                                        • Instruction ID: 07f92180b97845614ff33822f3a2b79a475890f779fa40873c0d1744ca68d538
                                        • Opcode Fuzzy Hash: 16a76ae6519efc112635435a3f8e753a7c3315da0f014bcd5a64a9c27ecacb77
                                        • Instruction Fuzzy Hash: F7E09274E0520CAFCB44EFA8D45559DBBF5AB48300F0085AAA819A7350EA746A449F91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fa05e5070d154279022a5355a58401e121fe57d1b457dbf05a06450aed27dbb6
                                        • Instruction ID: 1b7f89bce59b8b8a1222172b266cd3c3e4ae47924cffb8ce46ca6f6b923c1b10
                                        • Opcode Fuzzy Hash: fa05e5070d154279022a5355a58401e121fe57d1b457dbf05a06450aed27dbb6
                                        • Instruction Fuzzy Hash: 60D05E70A0020DFFCB40EFA9F94165DB7F9FB84208B1045ACD808EB210EE316F40AB85
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3965de09b21cf92516f787cf880f9d43ff397ba469607549b0ebb10878d6911e
                                        • Instruction ID: df88786133d39d51096b680ca0e0fb14b647dd3efd2572c5da6c8ccfa687a95d
                                        • Opcode Fuzzy Hash: 3965de09b21cf92516f787cf880f9d43ff397ba469607549b0ebb10878d6911e
                                        • Instruction Fuzzy Hash: 71D012B590E3C55FC322CBA09A424557F709E93100F0A49DFD894AF362D5358D189393
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1749938329.00000000015D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_15d0000_SSA-Statement283482.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8205dbf8635ace79795dbef255820c284c912f69eea1c9bc59e7405cd0675745
                                        • Instruction ID: e3eb86cc073ace85731e977410d007560c408343c356bef7b11c022dc83bd489
                                        • Opcode Fuzzy Hash: 8205dbf8635ace79795dbef255820c284c912f69eea1c9bc59e7405cd0675745
                                        • Instruction Fuzzy Hash: A3B092B090530CAF8620DA99980185ABBACDB1A210B0001DAE91887320D972A91066D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $dq$$dq
                                        • API String ID: 0-2340669324
                                        • Opcode ID: 6b512d743f091a715cb99d74c0fcc7b8c3630f9a361405071867ad48f668207d
                                        • Instruction ID: f451b7b0570323c21cc072c070f7a261737658253f46bf9a0f53e458560be8d9
                                        • Opcode Fuzzy Hash: 6b512d743f091a715cb99d74c0fcc7b8c3630f9a361405071867ad48f668207d
                                        • Instruction Fuzzy Hash: C651DFB5B002199FCB15EF79D8806EFBBF6EBC9250B54812BD804D7360DA309D52DBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq$LRdq
                                        • API String ID: 0-2668683976
                                        • Opcode ID: 8745dc8f097dec44b65fc57ee4934c13aee367712672ff5d0b9fa9ceffce3dae
                                        • Instruction ID: 1a4223617ff304240a01f4d657371e3025293d274ee2b8043c2887d9b393c4a9
                                        • Opcode Fuzzy Hash: 8745dc8f097dec44b65fc57ee4934c13aee367712672ff5d0b9fa9ceffce3dae
                                        • Instruction Fuzzy Hash: 674148B17002256FDB089B7898547BF36A7FBC5701F41442AE516CB3C4DE788D83A791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $dq$$dq
                                        • API String ID: 0-2340669324
                                        • Opcode ID: bd35e830cbdada0e580dce36f360b64773fad18282fe0646a2f61d47028afe0c
                                        • Instruction ID: 930c410e98167a27ba877333046036a037d690f14294bf1c9164268aa67ba99d
                                        • Opcode Fuzzy Hash: bd35e830cbdada0e580dce36f360b64773fad18282fe0646a2f61d47028afe0c
                                        • Instruction Fuzzy Hash: 36319070F102299BDB189B75D9547AEBBB2EF88300F14C06AD801AB395CF749852DBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRdq
                                        • API String ID: 0-3106745678
                                        • Opcode ID: e042e8a97ca3966830b977862744675baf230749ad34c924352938c6712d6e4f
                                        • Instruction ID: 1ed0f9dca227f8dde8215bee1f8506b850127995be2f87ba57a00b588d858c60
                                        • Opcode Fuzzy Hash: e042e8a97ca3966830b977862744675baf230749ad34c924352938c6712d6e4f
                                        • Instruction Fuzzy Hash: B481F5B0B102258FDB149F64E858BAEBBB2FF84700F11842AE4069B790DF749C56CB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: 2b785317c30916e5c09784ca28234f9167998d2d379015cc14c489c705c1197a
                                        • Instruction ID: 0bc9ea1e3a1dd63e42b31d674ce22820b30be2680028325815b3af16332af593
                                        • Opcode Fuzzy Hash: 2b785317c30916e5c09784ca28234f9167998d2d379015cc14c489c705c1197a
                                        • Instruction Fuzzy Hash: 7471D7B1B00128DBDB089BB5C8546AEB6E7EFC8300F54802AE506EB3A4DF75DC539B51
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: ca9eb52691b0fde51a91acc1fb661820e1046ad0a919715f4472cec88f8820c2
                                        • Instruction ID: 4da304f674ed0631cc5b6cade99360c224356250e788d30630ae568f17864db3
                                        • Opcode Fuzzy Hash: ca9eb52691b0fde51a91acc1fb661820e1046ad0a919715f4472cec88f8820c2
                                        • Instruction Fuzzy Hash: C5415BB0B401259BDB18AA6988A47AF6796DFC4311F40843EDA06EB3C0CE759C5397E1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: 0096606c91ee79c3e83eef2f7cc3bc96a1e9106ba1edc01d94f0088f3709fdf3
                                        • Instruction ID: a6dd2b23ca8fddd583723f5e68d4176bef982988595f1da1887cdf510cae4642
                                        • Opcode Fuzzy Hash: 0096606c91ee79c3e83eef2f7cc3bc96a1e9106ba1edc01d94f0088f3709fdf3
                                        • Instruction Fuzzy Hash: CC513670604268AFDB04DB65D8647EE7FB2EFCA311F14846AD406E7381CE795C86CBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $dq
                                        • API String ID: 0-847773763
                                        • Opcode ID: d47cb47b65a8180a2deb5ed6eb2be7cba493b76a8e7b28e699f64902a1db8cb4
                                        • Instruction ID: 36a26ef9ad623258d92ac4d95f2f080f645ec83fdf7521ce4f280d12a4b5bffe
                                        • Opcode Fuzzy Hash: d47cb47b65a8180a2deb5ed6eb2be7cba493b76a8e7b28e699f64902a1db8cb4
                                        • Instruction Fuzzy Hash: 7741C3B0B10229DFDB149B75C8546EEBBB2EF88300F54C06AD801AB395DF749853DBA0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRdq
                                        • API String ID: 0-3106745678
                                        • Opcode ID: de5846424fb6c06d7a7971f7ab6ca695a8aeef95c84919ebc94fc0b87352a7a9
                                        • Instruction ID: 55e4108deef236b72cd0d82c90b122956f5e24cb8baedd9b83a6421cbeed6d78
                                        • Opcode Fuzzy Hash: de5846424fb6c06d7a7971f7ab6ca695a8aeef95c84919ebc94fc0b87352a7a9
                                        • Instruction Fuzzy Hash: 1E2104B27101326FDB08DA3598547FF76AABFC5501F81402FE426C7394EAB4C952A791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (hq
                                        • API String ID: 0-4060669308
                                        • Opcode ID: 500fcc230d72bcef7f1811f6139bf60ae9483e1f7b228f7a60e009ee8edf5a16
                                        • Instruction ID: 9ce33a70be1214707e757821d4748bee19d7b71a58944750d231cf40bec72fe9
                                        • Opcode Fuzzy Hash: 500fcc230d72bcef7f1811f6139bf60ae9483e1f7b228f7a60e009ee8edf5a16
                                        • Instruction Fuzzy Hash: B62136717082359BD709A62654943EF7B96EFC5261F84802BEA09E73C1CD389C53A7A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRdq
                                        • API String ID: 0-3106745678
                                        • Opcode ID: 0bb18f545043f2c8c7ab58954e8ed54a5ff83594ca6bb94a6499d938bc0ef26d
                                        • Instruction ID: 9c6254a5945f2088ce45aa3862b26532f0891205d69f454102ba3fb8476a8b26
                                        • Opcode Fuzzy Hash: 0bb18f545043f2c8c7ab58954e8ed54a5ff83594ca6bb94a6499d938bc0ef26d
                                        • Instruction Fuzzy Hash: 1421A5B0B102159BDB14DF60D8997EF7BBAEB88701F50842AE802A7380DE745D17CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRdq
                                        • API String ID: 0-3106745678
                                        • Opcode ID: 4d385c3b5f15fa43dec62a9349884a07d28bc0c6390c2382376349d3954ccbfd
                                        • Instruction ID: a3742a448d48de9e57825727831a90fe513516994fae7ecdcc45b71a2d3a5e90
                                        • Opcode Fuzzy Hash: 4d385c3b5f15fa43dec62a9349884a07d28bc0c6390c2382376349d3954ccbfd
                                        • Instruction Fuzzy Hash: F52173B0B112199BDB08DF61D4997EF7BBBAB88604F10802AE402A7380DF745D17DB91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b33dcf31f8e66ab410408a1b4964da7c09b1748dfe2245f76feb73d0ca00907
                                        • Instruction ID: 321d65a96c76d04a0d89c1dc0174db35da6f25fdc21b2d94ead2046c00521efb
                                        • Opcode Fuzzy Hash: 7b33dcf31f8e66ab410408a1b4964da7c09b1748dfe2245f76feb73d0ca00907
                                        • Instruction Fuzzy Hash: 0AA1027291A3E14FD7078B78D8A46CA7F71EF86210B0A45CBD080DF193DA785989C7A6
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d63d36d727e0afe9ceeee170050d802aec85971123b6cc801bc914a616ba194f
                                        • Instruction ID: c09deb9bace842b97b4fbb25e992ad76d100436d1edd5a302f4a5257fa8b7266
                                        • Opcode Fuzzy Hash: d63d36d727e0afe9ceeee170050d802aec85971123b6cc801bc914a616ba194f
                                        • Instruction Fuzzy Hash: F7813AB0A052748FC705DF69D8906EA7FF1EF8A310F45409BE540DB362CA349C46D7A2
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1322a250c0cb2edc9042dd239fd17a35389efe6ebf78bf1341fa76247924b3b
                                        • Instruction ID: f6e5f48c6d8ee1e6caea3639016e3baef478e4d85579e86bc72282c52cca4518
                                        • Opcode Fuzzy Hash: c1322a250c0cb2edc9042dd239fd17a35389efe6ebf78bf1341fa76247924b3b
                                        • Instruction Fuzzy Hash: 12917071A00616CFCB04DF79C4905AEB7B2FF88310B55865AE905AF354EB74ED82CB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3b9899acd82c43c41101a33ed1c88f1eeb21ba0b78c18890ad8c2d54cf8b51e2
                                        • Instruction ID: 660807f967a6ab240a2690feaef7f534e52f2778574971bfeb594a12c2572ab0
                                        • Opcode Fuzzy Hash: 3b9899acd82c43c41101a33ed1c88f1eeb21ba0b78c18890ad8c2d54cf8b51e2
                                        • Instruction Fuzzy Hash: 49519CB57002218FCB09DF39D49066A7BB6FF8961071585AAE805DF3A5DF78EC42CB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 46932fc5c29b35ef90a9f22103a499b4a0897cdded4305b7b0ef378512794cac
                                        • Instruction ID: 83f730fade97492d0a74a4edaae12095debb9e5cede281287960cd7aa61d8c3a
                                        • Opcode Fuzzy Hash: 46932fc5c29b35ef90a9f22103a499b4a0897cdded4305b7b0ef378512794cac
                                        • Instruction Fuzzy Hash: 5A519D70E102199FDB09DFB8D844BDDBBB2FF88300F509559E614BB290DB78A985CB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 61b5e839b4d35e07fd3ef91b87b06874df46d5fe8f2514ae92fc21a841360374
                                        • Instruction ID: 80df32361b83fd00a07171bbdbd45f3464c4445adefa1ff961e3400688350a5d
                                        • Opcode Fuzzy Hash: 61b5e839b4d35e07fd3ef91b87b06874df46d5fe8f2514ae92fc21a841360374
                                        • Instruction Fuzzy Hash: 1931AEF270426A6FCB15967268516AB7F299F8128174B001BD7148F2D9DA7448A3E3A1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 074e22da3c15e8a4461371b2fd32d1d52a4b88b309c58e52e1a94ff27dfd1502
                                        • Instruction ID: 14758d70052bb3a7c882f51284d282f76939e68d6dd48fafd926cb89772b35a7
                                        • Opcode Fuzzy Hash: 074e22da3c15e8a4461371b2fd32d1d52a4b88b309c58e52e1a94ff27dfd1502
                                        • Instruction Fuzzy Hash: D34116B5B002189FCB04DF79D88099EBBB6FF88710B10816AE905EB364DB71DD52DB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80056f062e326203898f6cbf40be3b17f52a7d85c8fb2434408526aaa1f7db93
                                        • Instruction ID: fa752539ca614977b517cbe2ebadcd5236c6b695833643e7aa4f38609e543df7
                                        • Opcode Fuzzy Hash: 80056f062e326203898f6cbf40be3b17f52a7d85c8fb2434408526aaa1f7db93
                                        • Instruction Fuzzy Hash: 9131B474A10218DFCB04DFA9D58499EBBF6FF88310B55806AE905E7365DB30EC41CBA1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 58dd7eab8d27196d20916f571f27733ef0f88b90984aab5768548d34c826a55c
                                        • Instruction ID: 0642e574d89c42e7c4694f4804a93a9a3d6a6566c1e741bebf975f70f98efcb2
                                        • Opcode Fuzzy Hash: 58dd7eab8d27196d20916f571f27733ef0f88b90984aab5768548d34c826a55c
                                        • Instruction Fuzzy Hash: 1321767270C3704BC71A563658943EB7FA6AFC5161F84806BDA04E73C2CD289D13A3D1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a7cc746db130f1c3eb690c42868cc6b7f14783c0e5aa0264812ca318cf7abfc2
                                        • Instruction ID: 0868af2a55ea9df33eca6380eeeffa4b8babd7f65a2f3634d4e305e14f595911
                                        • Opcode Fuzzy Hash: a7cc746db130f1c3eb690c42868cc6b7f14783c0e5aa0264812ca318cf7abfc2
                                        • Instruction Fuzzy Hash: DF217271505379EFCB05267964143E77F58AF82220F52847BF948D5252C999CCA2F3E2
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a1d04a3f34e08c0252bc9b708de656bd2a4258bb227768830199fcde75411af
                                        • Instruction ID: bfe2883a44e7aee930faf3d7ba2e13cb328ca66d5138789e52885330200d66c7
                                        • Opcode Fuzzy Hash: 8a1d04a3f34e08c0252bc9b708de656bd2a4258bb227768830199fcde75411af
                                        • Instruction Fuzzy Hash: 031136707043755BEB19667568503EB2B89AB82210F8740ABEA05CB382CDD8DC53B3E2
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c76f6676ec039ca90a790a399d02a6a3c7e9d859a2517877f95c9bd380c6d86c
                                        • Instruction ID: 65f071abeb283b194d6d03997460f3bfe08fb26e622bf778c191f437dc1963b1
                                        • Opcode Fuzzy Hash: c76f6676ec039ca90a790a399d02a6a3c7e9d859a2517877f95c9bd380c6d86c
                                        • Instruction Fuzzy Hash: 552165B4B00129EBCB14DF65D850AEE7BB3EFCC311F54802AD415A7384CE7A9C969B91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8597a853c6cca1ba808ba3a6ae37aaff782019ff0327fc19b19384672b704a64
                                        • Instruction ID: cc968ff81d5f08ec3dfcf695a6be0cdcb6db438c36141c6ebc28ab08e35f4f54
                                        • Opcode Fuzzy Hash: 8597a853c6cca1ba808ba3a6ae37aaff782019ff0327fc19b19384672b704a64
                                        • Instruction Fuzzy Hash: 84218471A00128AFCB04DB55D850AEDB7B2DFC8322F51802AD519A7384CB756CD69BD1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a4aa8d88d664fb83cd9d5bf3b5a4a34d85dbd26c07f38d887d1810205716dc50
                                        • Instruction ID: 7cc10ee0ef28a2180ee87de6c7ed76120ad5315c77fba6999fe62ed792a6bc40
                                        • Opcode Fuzzy Hash: a4aa8d88d664fb83cd9d5bf3b5a4a34d85dbd26c07f38d887d1810205716dc50
                                        • Instruction Fuzzy Hash: D0211DB5A102189FCB44DF79D8449DEBBF5FF8D710B10812AE905EB324DB719942DB90
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8ab0a8749e2ab99f68e2ae84335784e92a4e678582235426c100a242ab4889a5
                                        • Instruction ID: 3d03248baed0fa5f6b1643491d9a2ea3eb3ced8cae8872ff6067eb09fdbe7d17
                                        • Opcode Fuzzy Hash: 8ab0a8749e2ab99f68e2ae84335784e92a4e678582235426c100a242ab4889a5
                                        • Instruction Fuzzy Hash: 99116070A00118AFCB04DF66D850AEEBBB3EFCC311F50802AD415A7384DE7A9C969B91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 88bbfe5b3ef9aa18f9ae4bb1ab1871dd04c899a52e42650fdea3733c9ec79205
                                        • Instruction ID: aba39fd999ebd6bd1ce123b48970b0b685adaaf55b96fde38c27de4833434905
                                        • Opcode Fuzzy Hash: 88bbfe5b3ef9aa18f9ae4bb1ab1871dd04c899a52e42650fdea3733c9ec79205
                                        • Instruction Fuzzy Hash: B5113070A00118AFCB04DF56D850AAD7BB6EFC8311F51802AD519A73C4CB7A6C969B91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a044606c3914d362dcd0277cf191c3bf8b4efdbe78308a421741e3452dfd41c2
                                        • Instruction ID: 9b3e9f7e70b1d463a04ade6017035f5655342639a503e7694d96c610e358a2c7
                                        • Opcode Fuzzy Hash: a044606c3914d362dcd0277cf191c3bf8b4efdbe78308a421741e3452dfd41c2
                                        • Instruction Fuzzy Hash: CA113075600154AFCB04CF65D854AED7FB2EF8D321F148019D45AA7285CB7A5CC5CFA0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1f1e8ee5bbdf486e622e911571d5dc8e320a483601657103ef6c0e335132fcf2
                                        • Instruction ID: 4d1caac6ea8608164dae659290a66ee1c0e5c3059ee2ce492792e41997996fdc
                                        • Opcode Fuzzy Hash: 1f1e8ee5bbdf486e622e911571d5dc8e320a483601657103ef6c0e335132fcf2
                                        • Instruction Fuzzy Hash: 812135B0C002098FDB14DFAAC481AEEFBF4FF98324F14802AD419A7200C7756941CFA1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bd5e365628629cbd5efc562e7c2ed12ed2dd8c4419e73e511b8c6d735e16f4c0
                                        • Instruction ID: 59efd52824d7acc4029d6653f8ca8d8b599dc593cb5d1f53fd98276b18fb3624
                                        • Opcode Fuzzy Hash: bd5e365628629cbd5efc562e7c2ed12ed2dd8c4419e73e511b8c6d735e16f4c0
                                        • Instruction Fuzzy Hash: 0B01D6B6B101299BDF288665D8007EFBBF6BB88311F55402BC104B7314DF759892DBE1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: da07595a7add3805fdc1ca9c22a76ca000bae5930e2e872b51c95a764c47c8d4
                                        • Instruction ID: aced363de905020191c7f3e5c9df0979091b33af0235cf0fc62c288b0d8009db
                                        • Opcode Fuzzy Hash: da07595a7add3805fdc1ca9c22a76ca000bae5930e2e872b51c95a764c47c8d4
                                        • Instruction Fuzzy Hash: 2901E172B101288BDF148AA9C8102EEB7F6FBC8315F44803AC005F7254DB799952CBA0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 289076daaa13c83fb1e5ff1f1ad9e9598c3ad2ef943c2225b2b39dc369e61478
                                        • Instruction ID: 6061c74911cd0f993099e881176c330c09c5ad07caf4f043d7c5fbff02d624d3
                                        • Opcode Fuzzy Hash: 289076daaa13c83fb1e5ff1f1ad9e9598c3ad2ef943c2225b2b39dc369e61478
                                        • Instruction Fuzzy Hash: 2B1106B1D042099FDB24DFAAC481AEEFBF4FF98324F54841AD519A7240C7756905CFA1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b522fdb1ab42b0a38fcbe8f7c2f097c89e3cfac76f54f7f10b1795c79f8ab18
                                        • Instruction ID: 922beb99e69bfe25729e83249e783597ed8435c7c271dbb54e11a2029885ef85
                                        • Opcode Fuzzy Hash: 2b522fdb1ab42b0a38fcbe8f7c2f097c89e3cfac76f54f7f10b1795c79f8ab18
                                        • Instruction Fuzzy Hash: 860184763401209F8708DA6DF89496EB7AFEBD8671355807BE605CB350CA76DC138794
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2099a7e524b70f9f2dd7667a4c08f3f9cde8b9fca1103d79c43af69539d1edb4
                                        • Instruction ID: 2f3534a859f49ec9cf0c3a52701b8f26fc7e1e4ad1227a70ce3d7e16c42b1e73
                                        • Opcode Fuzzy Hash: 2099a7e524b70f9f2dd7667a4c08f3f9cde8b9fca1103d79c43af69539d1edb4
                                        • Instruction Fuzzy Hash: 4A110D75600114AFDB04DFA5D858AEDBBB6EF8D322F148019D51AA7384CB7A5CC5CFA0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ddec44f9b5996f810f1800a21154c512a7704ec3a51317e87aa25c0d77c4badb
                                        • Instruction ID: 4ecd38660debbcc7c1136fcdde1cd60cb20c60f016cabe8afa8d4ba9e270c5b9
                                        • Opcode Fuzzy Hash: ddec44f9b5996f810f1800a21154c512a7704ec3a51317e87aa25c0d77c4badb
                                        • Instruction Fuzzy Hash: F301227170412497DB18AB6A88187DFBAF7AFC9200F60802FD005B7390CE754D428BD2
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4bcd5d2927a8abe44203da188e554350f7062c759329ad5ab81490986ce1d69
                                        • Instruction ID: 45202112d0851cb8d44c183e657724916339badd8b025fc2fd4f90b75ece9bcf
                                        • Opcode Fuzzy Hash: d4bcd5d2927a8abe44203da188e554350f7062c759329ad5ab81490986ce1d69
                                        • Instruction Fuzzy Hash: BF012BB1A1012D97EB14AA6984957EF7AF79BC8300F50402FE001F3391CE710D1397E2
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5db51b01d0508ada59e265a02c5aa2b6a7c865598e3b7c32cfc8c8fc23d017f1
                                        • Instruction ID: d5d53dcd99eaf2099c8fcc0a52dd43d0c23208af406cea8281368ad430e3b340
                                        • Opcode Fuzzy Hash: 5db51b01d0508ada59e265a02c5aa2b6a7c865598e3b7c32cfc8c8fc23d017f1
                                        • Instruction Fuzzy Hash: FA01DF7170011897EB18AA6AC8587EF7AE79FC9200F60802ED006B7390CE754D068BD2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1766825144.0000000004D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D3D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_4d3d000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ce8abb9c999dd1a199684254d39d752b6039c581524a33fa7719bf172e7a0d6a
                                        • Instruction ID: 196607fd32462524b6d81e47e1da1c4ce5ee603f0c00a879d97ed73dffac8cfe
                                        • Opcode Fuzzy Hash: ce8abb9c999dd1a199684254d39d752b6039c581524a33fa7719bf172e7a0d6a
                                        • Instruction Fuzzy Hash: 6E019E6210E3C05FE7128B259C94B52BFB4EF53224F1DC0CBD8888F1A3C2685849CB72
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1766825144.0000000004D3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D3D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_4d3d000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 884b58cdbcc6c90573c86b71980acf054c5f40310d6bbd9b4e60390a1cb458ab
                                        • Instruction ID: 2a7c761b5ee4785c944102cd8bd4d16a1afe94804649dc2aabd11aca63f27f54
                                        • Opcode Fuzzy Hash: 884b58cdbcc6c90573c86b71980acf054c5f40310d6bbd9b4e60390a1cb458ab
                                        • Instruction Fuzzy Hash: 4A0126716083009AE7208F29ECC4B67BF98EF41B25F18C41AED484B242C778E842CEB1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cb2cd53daf5f70cc2e5fda2467720c54791150904caca879e1ec4ccaa801451d
                                        • Instruction ID: 6db1794a1c4aa07f39d1d191b3305bcb23b10f9d17887a37899d7d08d92ec211
                                        • Opcode Fuzzy Hash: cb2cd53daf5f70cc2e5fda2467720c54791150904caca879e1ec4ccaa801451d
                                        • Instruction Fuzzy Hash: 35F0F6713002208BC3179A6DE8905DBBBEADFD5A61340842BF609CB300DEE98C0697E0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 47084c98e138c820d6a7ad8327451dab4cf942aa5ab5d64adf1585d3f82386a1
                                        • Instruction ID: c458054908a4788bcd7f701101e1ae1fe81d6a71d43406eec5a44e360707357d
                                        • Opcode Fuzzy Hash: 47084c98e138c820d6a7ad8327451dab4cf942aa5ab5d64adf1585d3f82386a1
                                        • Instruction Fuzzy Hash: FCF0F4B06082495FCB09DF75697022F3FA5EBC2211705086FC106CF2E5F97948C4CB91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c974c0afc387d97957701a8fd71bfa4b3f0913d974a8aec87e3538522561174c
                                        • Instruction ID: 3b6c91f025a6d2ed1a10f9d29ade5e38247de8055c966c57c5208648ba4264ee
                                        • Opcode Fuzzy Hash: c974c0afc387d97957701a8fd71bfa4b3f0913d974a8aec87e3538522561174c
                                        • Instruction Fuzzy Hash: 77F0A0733483609BC317965AFC40AD7BFAADBC56B1755807BE348C7201CABA581587E0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4397f931bbaf5db3843d1e56ae7ccbe35c8a5e8ee5dc1f014f3667ffed70be7e
                                        • Instruction ID: c3acd0acafdd4f36a09f689b396ce6ec7f5ada712cd2db85ce92c13fe83db7f7
                                        • Opcode Fuzzy Hash: 4397f931bbaf5db3843d1e56ae7ccbe35c8a5e8ee5dc1f014f3667ffed70be7e
                                        • Instruction Fuzzy Hash: 9CF0F6F064411A1ECB08DFBA696525F3F99EBC1325744082FC50ACF294FA35858097D1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a8691a4c2fa33d038a90c05ebb47515749d13e3dc5e13c7d04598dcb0eae7cfb
                                        • Instruction ID: 391b24e7c527f8cc7e2873373c36fe4b67ea19ac906f36d09abe152db746038e
                                        • Opcode Fuzzy Hash: a8691a4c2fa33d038a90c05ebb47515749d13e3dc5e13c7d04598dcb0eae7cfb
                                        • Instruction Fuzzy Hash: 86F027327083402BD3155A25E810683BBAADBC6625B10007AD208C7242C96A680287A1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: def65baa880069708462f20608057ad42430c6f3f7b674ec3b27afbd4648077e
                                        • Instruction ID: be7df2c41f4f457b90832cc714416286cb96d83df944122dc6c4c5cd19e8f5ee
                                        • Opcode Fuzzy Hash: def65baa880069708462f20608057ad42430c6f3f7b674ec3b27afbd4648077e
                                        • Instruction Fuzzy Hash: C2F0A7B130022097C3169A5EE89099BBBDEDBD4A60380882FE609CB300DFF99C0597E0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 92955d1de33fba3b0ca3533f5ca70b4225a3cd4e42cf517491cea089b57c1a8f
                                        • Instruction ID: 26d3ed4988bfcdf9528f0014d77dfcbd98e7071e8a96f7de938e32e0336a3ec9
                                        • Opcode Fuzzy Hash: 92955d1de33fba3b0ca3533f5ca70b4225a3cd4e42cf517491cea089b57c1a8f
                                        • Instruction Fuzzy Hash: B6F02060604A700AEB29152188003E72F986B86214F8300ABE982C7783D9C0C817B3E3
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4049a3bc86f1940a427fe5118a1bb4ce38fbf77f0a6bd6af5444b821d27b3cda
                                        • Instruction ID: 68688b3ce1f3d02b11040f56168ca0c749cf510dcefafde39f816ab010a37b9e
                                        • Opcode Fuzzy Hash: 4049a3bc86f1940a427fe5118a1bb4ce38fbf77f0a6bd6af5444b821d27b3cda
                                        • Instruction Fuzzy Hash: A8E0D871704248EFCB02CFB4ED506DD7FB4EB42155B5148AAD504EB101DA741F4487F1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7fa62c8058f6add212f515dfb0fec5315aeaddef77bbbcb44eb07f0f67e85ac
                                        • Instruction ID: 7c2269927d08fceebd687790533e783275bb4485b3371c8b617379d9c36c7b7b
                                        • Opcode Fuzzy Hash: d7fa62c8058f6add212f515dfb0fec5315aeaddef77bbbcb44eb07f0f67e85ac
                                        • Instruction Fuzzy Hash: 46E0D8B074520CAFC701DBB4B9011FCBFF4DB0120170005EBD808D7261D9711F419791
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3f9de58ff7604e75226b171641fd66b2a71558ec747f3c8022c3e447d02ac6d4
                                        • Instruction ID: dc79e683f59e434a41bdc61cd52852334e24c5f040993ed2019e00e565aa8ea0
                                        • Opcode Fuzzy Hash: 3f9de58ff7604e75226b171641fd66b2a71558ec747f3c8022c3e447d02ac6d4
                                        • Instruction Fuzzy Hash: DCE0CD327002145BD319AA6AEC50957F79FDBDD629B10447DD60CC7355CDB7AC02CBA0
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 79d07028674d9d108874e9e17c2a0effd3cb4adb3c25738ff38cb737a0c3b452
                                        • Instruction ID: 94f801b6da1090524874328853fb5445aab7a1d8d7ef1c964ff0bb565969c71e
                                        • Opcode Fuzzy Hash: 79d07028674d9d108874e9e17c2a0effd3cb4adb3c25738ff38cb737a0c3b452
                                        • Instruction Fuzzy Hash: 5AD02B216093309FCB1512B130003D77F5CDB46022F1700D3DE0887207C9BA8C1223C1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b4363a7f8cd22f0188f2aa719a094728b082bcbbffbf37765260cf4dcda7e5a7
                                        • Instruction ID: 3415bf07132fc46b76848b840fe155d556deef891d63f59d48650d160465e7b1
                                        • Opcode Fuzzy Hash: b4363a7f8cd22f0188f2aa719a094728b082bcbbffbf37765260cf4dcda7e5a7
                                        • Instruction Fuzzy Hash: CDE02B7B20C3685FC70A1751DC154D57F799B5B5213194067E54187771DE610C22E3F1
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ba05885bc867afbf254af5addfbf6c47df1021bb0f532e04be026b3fdd83f34
                                        • Instruction ID: 903a2fce87b348ff45d7b00dc8f71c2a84646481775130cb2c2755d24bcbbd56
                                        • Opcode Fuzzy Hash: 9ba05885bc867afbf254af5addfbf6c47df1021bb0f532e04be026b3fdd83f34
                                        • Instruction Fuzzy Hash: E9D0A77225012C6B82086619DC898AA7799E7957607908827FA0183270CE716C62A7E6
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8c55d893d2e71119c9759bc851cdedd4b548e412dabb8f35c2f771b51ac76088
                                        • Instruction ID: 96c33434796ddfe013f690c5dece31b810876b9814bb3045b26df564b858a6f7
                                        • Opcode Fuzzy Hash: 8c55d893d2e71119c9759bc851cdedd4b548e412dabb8f35c2f771b51ac76088
                                        • Instruction Fuzzy Hash: 4DD05EB0B0020CEFCB05DFA8EA4159DB7F9EB45205B5089ADD908E7200EF752F409B91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5fa3ef69c19cb42a613cc463d7764e045ada6e65bb73ff23eaa9d44342a85e84
                                        • Instruction ID: e5a4634fde2c3545462673c8b5dd62b98e9777cec54a284fe0f68aea904ba498
                                        • Opcode Fuzzy Hash: 5fa3ef69c19cb42a613cc463d7764e045ada6e65bb73ff23eaa9d44342a85e84
                                        • Instruction Fuzzy Hash: 58D05EB0A8110DFFCB04DFA8EA4159DBBF9EB44205B1045A9E808EB250EA716F009B91
                                        Memory Dump Source
                                        • Source File: 00000004.00000003.1765913872.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_3_7420000_rundll32.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b74c0de9c55bc609c06f83ec3b543164e37fd63d68d72f9863ecd2a0d29beab2
                                        • Instruction ID: 45966ceffbfe766ad9492cab1921e8d911c0d517385923ecb82477187639926b
                                        • Opcode Fuzzy Hash: b74c0de9c55bc609c06f83ec3b543164e37fd63d68d72f9863ecd2a0d29beab2
                                        • Instruction Fuzzy Hash: 4EC08CB25A42404BEB0A838804882E95B20B733204FCAA265C00054220A22A00A3E624

                                        Execution Graph

                                        Execution Coverage:10.8%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:12.1%
                                        Total number of Nodes:199
                                        Total number of Limit Nodes:15
                                        execution_graph 37012 3a95f68 37013 3a95f9c 37012->37013 37014 3a95f8c 37012->37014 37018 3a96598 37013->37018 37015 3a95f95 37014->37015 37017 3a96598 2 API calls 37014->37017 37017->37014 37019 3a965bb 37018->37019 37020 3a965cb 37018->37020 37021 3a965c4 37019->37021 37023 106f930 2 API calls 37019->37023 37024 106f930 37020->37024 37021->37014 37023->37019 37025 106f953 37024->37025 37026 106f963 37024->37026 37027 106f95c 37025->37027 37028 3a948f0 2 API calls 37025->37028 37029 3a948e3 2 API calls 37025->37029 37026->37025 37030 106f930 2 API calls 37026->37030 37036 3a948f0 37026->37036 37042 106a4b8 37026->37042 37047 106a4c8 37026->37047 37052 3a948e3 37026->37052 37058 106fab8 37026->37058 37027->37019 37028->37025 37029->37025 37030->37025 37037 3a94914 37036->37037 37039 3a94924 37036->37039 37038 3a9491d 37037->37038 37066 3a96730 37037->37066 37038->37025 37041 106f930 2 API calls 37039->37041 37041->37037 37043 106a4ed 37042->37043 37044 106a4f9 37042->37044 37043->37025 37044->37043 37045 3a948f0 2 API calls 37044->37045 37046 3a948e3 2 API calls 37044->37046 37045->37043 37046->37043 37048 106a4f9 37047->37048 37049 106a4ed 37047->37049 37048->37049 37050 3a948f0 2 API calls 37048->37050 37051 3a948e3 2 API calls 37048->37051 37049->37025 37050->37049 37051->37049 37054 3a94924 37052->37054 37055 3a94914 37052->37055 37053 3a9491d 37053->37025 37057 106f930 2 API calls 37054->37057 37055->37053 37056 3a96730 2 API calls 37055->37056 37056->37053 37057->37055 37059 106fadb 37058->37059 37060 106faeb 37058->37060 37063 106fae4 37059->37063 37105 3a90040 37059->37105 37111 3a90006 37059->37111 37061 106f930 2 API calls 37060->37061 37062 106fab8 2 API calls 37060->37062 37061->37059 37062->37059 37063->37025 37067 3a96770 37066->37067 37070 3a90510 37067->37070 37069 3a9678b 37069->37038 37071 3a90536 37070->37071 37074 4eb1360 37070->37074 37078 4eb1370 37070->37078 37071->37069 37075 4eb1382 37074->37075 37077 4eb13a5 37075->37077 37082 4eb13b3 37075->37082 37077->37071 37079 4eb1382 37078->37079 37080 4eb13a5 37079->37080 37081 4eb13b3 2 API calls 37079->37081 37080->37071 37081->37080 37083 4eb13d8 37082->37083 37087 4eb15d1 37083->37087 37096 4eb15e0 37083->37096 37084 4eb1418 37084->37077 37088 4eb1607 37087->37088 37089 4eb16f2 CreateNamedPipeW 37088->37089 37090 4eb1688 37088->37090 37093 4eb17b9 37089->37093 37094 4eb15d1 CreateNamedPipeW 37090->37094 37095 4eb15e0 CreateNamedPipeW 37090->37095 37091 4eb16e8 37091->37084 37093->37084 37094->37091 37095->37091 37097 4eb1607 37096->37097 37098 4eb16f2 CreateNamedPipeW 37097->37098 37099 4eb1688 37097->37099 37102 4eb17b9 37098->37102 37103 4eb15d1 CreateNamedPipeW 37099->37103 37104 4eb15e0 CreateNamedPipeW 37099->37104 37100 4eb16e8 37100->37084 37102->37084 37103->37100 37104->37100 37106 3a9005f 37105->37106 37109 3a90510 2 API calls 37106->37109 37117 3a90488 37106->37117 37122 3a90502 37106->37122 37107 3a900d1 37107->37063 37109->37107 37112 3a9005f 37111->37112 37114 3a90488 2 API calls 37112->37114 37115 3a90510 2 API calls 37112->37115 37116 3a90502 2 API calls 37112->37116 37113 3a900d1 37113->37063 37114->37113 37115->37113 37116->37113 37118 3a90472 37117->37118 37118->37117 37119 3a90536 37118->37119 37120 4eb1360 2 API calls 37118->37120 37121 4eb1370 2 API calls 37118->37121 37119->37107 37120->37119 37121->37119 37123 3a90472 37122->37123 37123->37122 37124 3a90536 37123->37124 37125 4eb1360 2 API calls 37123->37125 37126 4eb1370 2 API calls 37123->37126 37124->37107 37125->37124 37126->37124 37134 3a91738 37135 3a9177a 37134->37135 37136 3a91780 CryptProtectData 37134->37136 37135->37136 37137 3a917c3 37136->37137 37146 4eb5ed8 37147 4eb5f1a 37146->37147 37148 4eb5f20 WaitNamedPipeW 37146->37148 37147->37148 37149 4eb5f54 37148->37149 37150 4eb2218 37151 4eb222a 37150->37151 37152 4eb226e 37151->37152 37154 4eb266b 37151->37154 37155 4eb267e 37154->37155 37156 4eb2b00 37155->37156 37159 1067490 37155->37159 37163 1067481 37155->37163 37161 10674ba 37159->37161 37160 10674d5 37160->37155 37161->37160 37162 106f930 2 API calls 37161->37162 37162->37160 37164 10674ba 37163->37164 37165 10674d5 37164->37165 37166 106f930 2 API calls 37164->37166 37165->37155 37166->37165 37167 1060e30 37168 1060e41 37167->37168 37171 1060ecf 37168->37171 37172 1060e94 37171->37172 37173 1060ea6 37172->37173 37177 10636a0 37172->37177 37182 10636b0 37172->37182 37174 1060e7a 37179 106339d 37177->37179 37180 10633cd 37177->37180 37178 1063739 37178->37174 37179->37174 37180->37177 37180->37179 37187 106e5e3 37180->37187 37184 10636c6 37182->37184 37183 1063764 37183->37174 37184->37183 37186 106e5e3 2 API calls 37184->37186 37185 1063739 37185->37174 37186->37185 37188 106e614 37187->37188 37189 106e62e 37187->37189 37188->37189 37192 106eaa8 37188->37192 37196 106ea99 37188->37196 37189->37178 37194 106eace 37192->37194 37193 106eb06 37193->37189 37194->37193 37200 106eb50 37194->37200 37197 106eaa1 37196->37197 37198 106eb06 37197->37198 37199 106eb50 2 API calls 37197->37199 37198->37189 37199->37198 37201 106eb8e 37200->37201 37208 106f788 37201->37208 37202 106ee2f 37203 106edb7 37203->37202 37212 3a90ad0 37203->37212 37217 3a90a22 37203->37217 37223 3a90a48 37203->37223 37209 106f7b3 37208->37209 37210 106f7ac 37208->37210 37209->37203 37210->37209 37211 106f930 2 API calls 37210->37211 37211->37209 37213 3a90a73 37212->37213 37215 3a90af2 37212->37215 37214 3a90510 2 API calls 37213->37214 37216 3a90a85 37214->37216 37215->37203 37216->37203 37218 3a909aa 37217->37218 37220 3a90a2a 37217->37220 37218->37203 37219 3a909ee 37219->37203 37220->37219 37221 3a90510 2 API calls 37220->37221 37222 3a90a85 37221->37222 37222->37203 37224 3a90a6d 37223->37224 37225 3a90510 2 API calls 37224->37225 37226 3a90a85 37225->37226 37226->37203 37138 4eb0fbc 37140 4eb0b50 37138->37140 37139 4eb108c 37139->37139 37140->37139 37141 3a96730 2 API calls 37140->37141 37141->37140 37127 54b2a40 37128 54b2a9a 37127->37128 37129 54b2af9 RegDisablePredefinedCache 37128->37129 37130 54b2adc 37128->37130 37129->37130 37131 4eb4360 37132 4eb43b4 ConnectNamedPipe 37131->37132 37133 4eb43f0 37132->37133 37133->37133 37142 4eb0540 37143 4eb0593 CreateProcessAsUserW 37142->37143 37145 4eb0624 37143->37145 37227 4eb5d10 37228 4eb5d2e 37227->37228 37230 4eb5d47 37228->37230 37233 4eb5e5f 37228->37233 37232 4eb5e5f 2 API calls 37232->37230 37235 4eb5e7d 37233->37235 37238 54b0290 37235->37238 37243 54b02a0 37235->37243 37239 54b02a0 37238->37239 37248 54b02f0 37239->37248 37252 54b02e4 37239->37252 37244 54b02b3 37243->37244 37246 54b02f0 CreateFileA 37244->37246 37247 54b02e4 CreateFileA 37244->37247 37245 4eb5d70 37245->37232 37246->37245 37247->37245 37250 54b034e 37248->37250 37249 54b03c3 CreateFileA 37251 54b0425 37249->37251 37250->37249 37250->37250 37254 54b02ef CreateFileA 37252->37254 37255 54b0425 37254->37255

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 131 4eb15e0-4eb1666 140 4eb1668-4eb166a 131->140 141 4eb1671-4eb167d 131->141 140->141 143 4eb1688-4eb168a 141->143 144 4eb167f-4eb1686 141->144 146 4eb1698-4eb16c0 143->146 144->143 145 4eb168c-4eb1693 144->145 147 4eb16f2-4eb174a 145->147 148 4eb1695 145->148 151 4eb16c9 146->151 152 4eb16c2-4eb16c7 146->152 154 4eb174c-4eb174f 147->154 155 4eb1752-4eb17b7 CreateNamedPipeW 147->155 148->146 153 4eb16ce-4eb16e2 151->153 152->153 162 4eb16e3 call 4eb15d1 153->162 163 4eb16e3 call 4eb15e0 153->163 154->155 158 4eb17b9-4eb17bf 155->158 159 4eb17c0-4eb17e1 155->159 156 4eb16e8-4eb16ef 158->159 162->156 163->156
                                        APIs
                                        • CreateNamedPipeW.KERNEL32(00000000,?,?,?,?,?,00000001,00000004), ref: 04EB17A4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CreateNamedPipe
                                        • String ID: 4Ldq$d/jq
                                        • API String ID: 2489174969-1600507530
                                        • Opcode ID: b9b0487ae7482dde47041f91731404f28340531095c1fbe726e807aa8584b66d
                                        • Instruction ID: 59d65171962b327de5e8c1dbeb28067f92c08883754f447007f1701a1c946106
                                        • Opcode Fuzzy Hash: b9b0487ae7482dde47041f91731404f28340531095c1fbe726e807aa8584b66d
                                        • Instruction Fuzzy Hash: F961AE70A003099FDB14DFA9C854BDEBBF5FF88310F18846AE918AB291D774A905CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 495 4eb0540-4eb0591 496 4eb059c-4eb05a0 495->496 497 4eb0593-4eb0599 495->497 498 4eb05a8-4eb05bd 496->498 499 4eb05a2-4eb05a5 496->499 497->496 500 4eb05cb-4eb0622 CreateProcessAsUserW 498->500 501 4eb05bf-4eb05c8 498->501 499->498 502 4eb062b-4eb0653 500->502 503 4eb0624-4eb062a 500->503 501->500 503->502
                                        APIs
                                        • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 04EB060F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CreateProcessUser
                                        • String ID:
                                        • API String ID: 2217836671-0
                                        • Opcode ID: 7fa937cdb08d6643eef2408fee17ed003ba8f8b09095ec0f56e45add1f704b8d
                                        • Instruction ID: e8d8615ccd9d08d2608a740bd51d1b76e4b86f87e8647aedfa117308bf1395c7
                                        • Opcode Fuzzy Hash: 7fa937cdb08d6643eef2408fee17ed003ba8f8b09095ec0f56e45add1f704b8d
                                        • Instruction Fuzzy Hash: 48413476900209DFCF10CFA9C880ADEBBF6FF88314F14842AE958A7250D775A955DF90
                                        APIs
                                        • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03A917AE
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3006935977.0000000003A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 03A90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_3a90000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CryptDataProtect
                                        • String ID:
                                        • API String ID: 3091777813-0
                                        • Opcode ID: 5cfc1aa72bc2f78f47183a7fa7ca0fbd3955c3e0671c2e8b564a8749950ccc4f
                                        • Instruction ID: 784733bc66ce852cfa3d38a86511fe7a2221099018e6ae069de95e2815f0ce6e
                                        • Opcode Fuzzy Hash: 5cfc1aa72bc2f78f47183a7fa7ca0fbd3955c3e0671c2e8b564a8749950ccc4f
                                        • Instruction Fuzzy Hash: 2F2139B680024A9FDF10CF9AC944ADEBBF5FF48310F14841AE914A7210D335A555DFA1
                                        APIs
                                        • CryptProtectData.CRYPT32(?,00000000,?,?,?,?,?), ref: 03A917AE
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3006935977.0000000003A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 03A90000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_3a90000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CryptDataProtect
                                        • String ID:
                                        • API String ID: 3091777813-0
                                        • Opcode ID: 6c2d6456ae1844e21b0dfa06ef00dba5585a4017a5b5e2f8c69ada9c182ab327
                                        • Instruction ID: 0fdf32ef9d9f788251c7d28734b7105598dda6e080547f95a65a2edf6436d920
                                        • Opcode Fuzzy Hash: 6c2d6456ae1844e21b0dfa06ef00dba5585a4017a5b5e2f8c69ada9c182ab327
                                        • Instruction Fuzzy Hash: EE2107B680024A9FDF10CF9AC844ADEBBF5FF88310F14841AE919A7210D779A555DFA1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2989749484.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1060000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1dea03ee56d0ba6e20da5ef0b45c18595c1bf4a6936cfdb287f3745279c11cc9
                                        • Instruction ID: 789e9d9a844a63fe86a7d8599f754f57f7a7ba76b716114b143f65b643807b71
                                        • Opcode Fuzzy Hash: 1dea03ee56d0ba6e20da5ef0b45c18595c1bf4a6936cfdb287f3745279c11cc9
                                        • Instruction Fuzzy Hash: 6FB18C25540942CBCB0B7B7494945ACBBECFEC2331B4CCA9BD8965F387DA266441C6E3

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 273 54b02e4-54b02ed 274 54b0339-54b034c 273->274 275 54b02ef-54b0335 273->275 276 54b034e-54b0373 274->276 277 54b03a0-54b0423 CreateFileA 274->277 275->274 276->277 280 54b0375-54b0377 276->280 284 54b042c-54b046a 277->284 285 54b0425-54b042b 277->285 282 54b039a-54b039d 280->282 283 54b0379-54b0383 280->283 282->277 286 54b0387-54b0396 283->286 287 54b0385 283->287 292 54b047a 284->292 293 54b046c-54b0470 284->293 285->284 286->286 288 54b0398 286->288 287->286 288->282 295 54b047b 292->295 293->292 294 54b0472 293->294 294->292 295->295
                                        APIs
                                        • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 054B040D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3015677880.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_54b0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID: 4Ldq
                                        • API String ID: 823142352-18754375
                                        • Opcode ID: 2998c707568379b11abda071740e908af69174f83f41158a3dfc0301dc108b15
                                        • Instruction ID: 9261b098ac213bdd2aa29d9443e95177b3749a0e5ba9671ed8aaab177561c9d5
                                        • Opcode Fuzzy Hash: 2998c707568379b11abda071740e908af69174f83f41158a3dfc0301dc108b15
                                        • Instruction Fuzzy Hash: FD514CB1D002498FEB10CFA9C989BDEBBF1FB48304F14816AE809AB351D7B59845CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 296 54b02f0-54b034c 297 54b034e-54b0373 296->297 298 54b03a0-54b0423 CreateFileA 296->298 297->298 301 54b0375-54b0377 297->301 305 54b042c-54b046a 298->305 306 54b0425-54b042b 298->306 303 54b039a-54b039d 301->303 304 54b0379-54b0383 301->304 303->298 307 54b0387-54b0396 304->307 308 54b0385 304->308 313 54b047a 305->313 314 54b046c-54b0470 305->314 306->305 307->307 309 54b0398 307->309 308->307 309->303 316 54b047b 313->316 314->313 315 54b0472 314->315 315->313 316->316
                                        APIs
                                        • CreateFileA.KERNEL32(?,?,?,?,?,00000001,00000004), ref: 054B040D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3015677880.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_54b0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CreateFile
                                        • String ID: 4Ldq
                                        • API String ID: 823142352-18754375
                                        • Opcode ID: ba6b7de0e812462fe5a8c68a7d89ff2aa7fbb1b1240227c526d2d54253a09c74
                                        • Instruction ID: 40eaf46754c88ffde0ae093958fe0d0d7d767b1847562b735506b49d5fd2c0c3
                                        • Opcode Fuzzy Hash: ba6b7de0e812462fe5a8c68a7d89ff2aa7fbb1b1240227c526d2d54253a09c74
                                        • Instruction Fuzzy Hash: 814139B1D002599FDB10CFA9C948BDEBBF2BB48304F14816AE809AB351D7B59845CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 317 54b2a40-54b2acb 323 54b2acd-54b2ada 317->323 324 54b2adc-54b2af4 317->324 323->324 327 54b2af9-54b2b28 RegDisablePredefinedCache 323->327 325 54b2bb6-54b2be0 324->325 337 54b2b6d 325->337 338 54b2be2 325->338 329 54b2b2a-54b2b30 327->329 330 54b2b31-54b2b4c call 54b2908 327->330 329->330 336 54b2b51-54b2b69 330->336 336->337 339 54b2b78 337->339 340 54b2b6f 337->340 342 54b2bb4 338->342 343 54b2be4-54b2bf6 338->343 339->342 340->339 342->325
                                        APIs
                                        • RegDisablePredefinedCache.ADVAPI32 ref: 054B2B11
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3015677880.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_54b0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CacheDisablePredefined
                                        • String ID: `Qdq
                                        • API String ID: 1885667121-1368359825
                                        • Opcode ID: 9d6fa58e19f2b11430e74cec8153da9a04a9de82777548344a8b35bdbf87b0fb
                                        • Instruction ID: 99624dfec3f707fbdc6911615c330494bb0b78cc344e15be05f7d77097c87aa6
                                        • Opcode Fuzzy Hash: 9d6fa58e19f2b11430e74cec8153da9a04a9de82777548344a8b35bdbf87b0fb
                                        • Instruction Fuzzy Hash: D1314774E042089BEB14DFA9D948BDEBBB6AF48314F14842AD805B7394DBB46845CF61

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 484 4eb0539-4eb0591 485 4eb059c-4eb05a0 484->485 486 4eb0593-4eb0599 484->486 487 4eb05a8-4eb05bd 485->487 488 4eb05a2-4eb05a5 485->488 486->485 489 4eb05cb-4eb0622 CreateProcessAsUserW 487->489 490 4eb05bf-4eb05c8 487->490 488->487 491 4eb062b-4eb0653 489->491 492 4eb0624-4eb062a 489->492 490->489 492->491
                                        APIs
                                        • CreateProcessAsUserW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000000,?,?), ref: 04EB060F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: CreateProcessUser
                                        • String ID:
                                        • API String ID: 2217836671-0
                                        • Opcode ID: 1906bc71be69d81077151c9c2206433e28b290286c21e395d2fae07754db228b
                                        • Instruction ID: 9b3b27e64a3fc2947767370999ab28745d264a9bb22c161fb6013a8ee27b82fc
                                        • Opcode Fuzzy Hash: 1906bc71be69d81077151c9c2206433e28b290286c21e395d2fae07754db228b
                                        • Instruction Fuzzy Hash: 3D413476900209DFCF10CFA9C880ADEBBF6FF88324F14852AE958A7250D775A955DF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 506 4eb4354-4eb43ee ConnectNamedPipe 508 4eb43f0-4eb43f6 506->508 509 4eb43f7-4eb4439 506->509 508->509 513 4eb443b 509->513 514 4eb4443 509->514 513->514 515 4eb4444 514->515 515->515
                                        APIs
                                        • ConnectNamedPipe.KERNEL32(00000000), ref: 04EB43D8
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: ConnectNamedPipe
                                        • String ID:
                                        • API String ID: 2191148154-0
                                        • Opcode ID: a954d9b3a28489126fb574d74cb88371d18427e0c53cdedfca42cb844d805496
                                        • Instruction ID: d2f73b0ea2c68e11fa6068f87c822033ce3603700e97bc1bb936e8616d6110e1
                                        • Opcode Fuzzy Hash: a954d9b3a28489126fb574d74cb88371d18427e0c53cdedfca42cb844d805496
                                        • Instruction Fuzzy Hash: 702125B0D002599FCB14CFA9D584BDEBFF5AF48314F248069E849AB351DB74A906CF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 583 4eb4360-4eb43ee ConnectNamedPipe 585 4eb43f0-4eb43f6 583->585 586 4eb43f7-4eb4439 583->586 585->586 590 4eb443b 586->590 591 4eb4443 586->591 590->591 592 4eb4444 591->592 592->592
                                        APIs
                                        • ConnectNamedPipe.KERNEL32(00000000), ref: 04EB43D8
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: ConnectNamedPipe
                                        • String ID:
                                        • API String ID: 2191148154-0
                                        • Opcode ID: 001f1ae0610690e6373c4e3fd4afc63df05be47b9dc09c1dbb041b6bfe234d0c
                                        • Instruction ID: e68ede58240e275fcff92e08e8640065416300a43acd26cb1cf173b19595e585
                                        • Opcode Fuzzy Hash: 001f1ae0610690e6373c4e3fd4afc63df05be47b9dc09c1dbb041b6bfe234d0c
                                        • Instruction Fuzzy Hash: F92115B1D002589FCB14CF9AD584BDEBBF5AF48314F148069E848B7391DB74A905CFA1
                                        APIs
                                        • WaitNamedPipeW.KERNEL32(00000000), ref: 04EB5F3F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: NamedPipeWait
                                        • String ID:
                                        • API String ID: 3146367894-0
                                        • Opcode ID: 83d0c2f71a6c29da0fb4422900d6ff9d5789c35e2f2783021128c6b82bd8e2da
                                        • Instruction ID: 06a686a1eb8d2d90b29bb73399154e39d3b72c7d1bf17f5deef23db5c02ceb24
                                        • Opcode Fuzzy Hash: 83d0c2f71a6c29da0fb4422900d6ff9d5789c35e2f2783021128c6b82bd8e2da
                                        • Instruction Fuzzy Hash: C02144B68002098FCB10CF9AC444AEEFBB4EB48324F14842ED469A7201C379A545CFA1
                                        APIs
                                        • WaitNamedPipeW.KERNEL32(00000000), ref: 04EB5F3F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.3014539058.0000000004EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EB0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_4eb0000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: NamedPipeWait
                                        • String ID:
                                        • API String ID: 3146367894-0
                                        • Opcode ID: bab2d2dbf8774228b272fd0dcf9daa3aaf8ec52892ef0e085ca8a89c7279d86a
                                        • Instruction ID: 5143b565cf500535f697c767d55c631443d3342c2fe5ea041449ec41873c7071
                                        • Opcode Fuzzy Hash: bab2d2dbf8774228b272fd0dcf9daa3aaf8ec52892ef0e085ca8a89c7279d86a
                                        • Instruction Fuzzy Hash: 962136B6C002098FDB10CF9AC444BEEFBF4EB48324F14842ED469A7240C779A545CFA1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2986954177.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_b5d000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a848e33769e63961a366e20cdf1e66af329708256b30c72ad77942ea14cde961
                                        • Instruction ID: 1289d8b9e739f03d6adac3571527db9b7feb9beb751ac33a3530edff1e241d35
                                        • Opcode Fuzzy Hash: a848e33769e63961a366e20cdf1e66af329708256b30c72ad77942ea14cde961
                                        • Instruction Fuzzy Hash: 802145B6504240DFCB25DF14C9C0B26BFA5FB98321F20C6E9EC090B256C336D84ACBA1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2986954177.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_b5d000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                        • Instruction ID: 22091bd043b75175ceaccf73d6046b37a0fcfe5a74b6b607ac5d91630fab0885
                                        • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                                        • Instruction Fuzzy Hash: 1E11AF76504280CFCB16CF10D9C4B16BFA2FB98324F2486E9DC094B656C33AD85ACBA1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2986954177.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_b5d000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3ab12c02cc5ecb8debced214f805a9675516cc83076cfbf97a37cfb722cae7aa
                                        • Instruction ID: 20f883d61ee26902437a58b073b0de444f428097fe210f5a8203a146bb9b5127
                                        • Opcode Fuzzy Hash: 3ab12c02cc5ecb8debced214f805a9675516cc83076cfbf97a37cfb722cae7aa
                                        • Instruction Fuzzy Hash: 1D01F7715043409AE7304E25C8C0B67BFD8DF41325F1CC6DAED494A2C2C679984AD6B1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2986954177.0000000000B5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B5D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_b5d000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a95ae1660299616c66ed60889caf80c6e44b5a0a8156c837695c8f2bcdfd6da3
                                        • Instruction ID: 1eaba6cd5dfc8b110182875f9a12d728bed072487b460caa1a86b20cff4349e7
                                        • Opcode Fuzzy Hash: a95ae1660299616c66ed60889caf80c6e44b5a0a8156c837695c8f2bcdfd6da3
                                        • Instruction Fuzzy Hash: B901406150D3C05EE7128B258894B52BFB4DF53225F1CC1DBDD888F1E3C2695849C772
                                        APIs
                                        • RtlGetVersion.NTDLL(0000009C), ref: 01064DBE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2989749484.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1060000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: Version
                                        • String ID: `Qdq
                                        • API String ID: 1889659487-1368359825
                                        • Opcode ID: 4813ad1e046866a44bea48f5fe9147b05bcdc48a73d2b696772cc7c53100faff
                                        • Instruction ID: 4c0da7093eb39e6aee6dc665b3dd382d16dba44f87dd64da316c8c1336e8b8a4
                                        • Opcode Fuzzy Hash: 4813ad1e046866a44bea48f5fe9147b05bcdc48a73d2b696772cc7c53100faff
                                        • Instruction Fuzzy Hash: DC212375900228DFEB60DF59CD44B9AFBB9FB05314F1082D9E60CA7690C7756A88CF92

                                        Execution Graph

                                        Execution Coverage:9.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:5
                                        Total number of Limit Nodes:1
                                        execution_graph 20624 7ffd9b288014 20626 7ffd9b28801d 20624->20626 20625 7ffd9b288082 20626->20625 20627 7ffd9b2880f6 SetProcessMitigationPolicy 20626->20627 20628 7ffd9b288152 20627->20628
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ($x(t
                                        • API String ID: 0-3188275639
                                        • Opcode ID: 6dd46b7c17ab092551fb13de95689db3afcc0eb4164404bf5ca4512a34d0304b
                                        • Instruction ID: 76c5413ca7e8d1d10e37fc737a7e558c3aa266517028230999cce0041e6b162b
                                        • Opcode Fuzzy Hash: 6dd46b7c17ab092551fb13de95689db3afcc0eb4164404bf5ca4512a34d0304b
                                        • Instruction Fuzzy Hash: 36B21C7190E7CA4FE3B79BA488226A57FD0EF56314F0505FEC4899F1F3DA186A068352
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9a514332acdabb0847ec3864a37a1d446a60934d09d76f64f12df149717d6673
                                        • Instruction ID: 60f78ccf91ace1ad61a9ed6ef41133bb094a0ec447add227cd1828410b17aed3
                                        • Opcode Fuzzy Hash: 9a514332acdabb0847ec3864a37a1d446a60934d09d76f64f12df149717d6673
                                        • Instruction Fuzzy Hash: 7EE25230A0961D8FEBA9DB68C864BA877F1FF58300F5541B9D40DD72A6DE35AE81CB40

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1394 7ffd9b596be3-7ffd9b596bee 1395 7ffd9b596c91-7ffd9b596c97 1394->1395 1396 7ffd9b596bf4-7ffd9b596c0c 1394->1396 1397 7ffd9b596c9d-7ffd9b596ca5 1395->1397 1398 7ffd9b5972ee-7ffd9b597301 1395->1398 1396->1395 1404 7ffd9b596c12-7ffd9b596c6b 1396->1404 1399 7ffd9b596ca7-7ffd9b596cb2 1397->1399 1400 7ffd9b596ced-7ffd9b596cf5 1397->1400 1406 7ffd9b596c6c-7ffd9b596c78 1399->1406 1407 7ffd9b596cb4-7ffd9b596ce6 1399->1407 1400->1398 1402 7ffd9b596cfb-7ffd9b596d74 1400->1402 1425 7ffd9b596d7a-7ffd9b596ebc 1402->1425 1426 7ffd9b5972e1-7ffd9b5972e8 1402->1426 1404->1406 1407->1400 1448 7ffd9b596ec3-7ffd9b596f5a 1425->1448 1426->1398 1426->1402 1452 7ffd9b596f5c-7ffd9b596f5e 1448->1452 1453 7ffd9b596f60-7ffd9b596f61 1448->1453 1454 7ffd9b596f68-7ffd9b596f75 1452->1454 1453->1454 1455 7ffd9b596f77-7ffd9b596f8f 1454->1455 1456 7ffd9b596fab 1454->1456 1461 7ffd9b596fad 1455->1461 1462 7ffd9b596f91-7ffd9b596fa6 1455->1462 1457 7ffd9b596faf-7ffd9b596fb2 1456->1457 1458 7ffd9b596fc5-7ffd9b596fc8 1457->1458 1459 7ffd9b596fb4-7ffd9b596fc1 1457->1459 1464 7ffd9b596fca-7ffd9b596fcb 1458->1464 1465 7ffd9b596fd2-7ffd9b596ffb 1458->1465 1459->1458 1466 7ffd9b596fc3 1459->1466 1461->1457 1462->1448 1464->1465 1471 7ffd9b597002-7ffd9b597099 1465->1471 1466->1458 1475 7ffd9b59709b-7ffd9b59709d 1471->1475 1476 7ffd9b59709f-7ffd9b5970a0 1471->1476 1477 7ffd9b5970a7-7ffd9b5970b4 1475->1477 1476->1477 1478 7ffd9b5970b6-7ffd9b5970ce 1477->1478 1479 7ffd9b5970ea 1477->1479 1487 7ffd9b5970ec 1478->1487 1488 7ffd9b5970d0-7ffd9b5970e5 1478->1488 1480 7ffd9b5970ee-7ffd9b5970f1 1479->1480 1481 7ffd9b5970f3-7ffd9b597100 1480->1481 1482 7ffd9b597104-7ffd9b597107 1480->1482 1481->1482 1489 7ffd9b597102 1481->1489 1485 7ffd9b597109-7ffd9b59710a 1482->1485 1486 7ffd9b597111-7ffd9b59716f call 7ffd9b595ef0 1482->1486 1485->1486 1496 7ffd9b5971e0-7ffd9b5971f2 1486->1496 1497 7ffd9b597171-7ffd9b597174 1486->1497 1487->1480 1488->1471 1489->1482 1499 7ffd9b5971f5-7ffd9b5971fc 1496->1499 1497->1499 1500 7ffd9b597176-7ffd9b5971b8 call 7ffd9b5960c8 call 7ffd9b5960d8 call 7ffd9b595f00 1497->1500 1501 7ffd9b597338-7ffd9b598209 call 7ffd9b597428 * 2 1499->1501 1502 7ffd9b5971fd 1499->1502 1515 7ffd9b597223-7ffd9b597227 1500->1515 1522 7ffd9b5971ba-7ffd9b5971c5 1500->1522 1504 7ffd9b5971fe-7ffd9b59721f 1502->1504 1504->1515 1518 7ffd9b597229-7ffd9b59724a 1515->1518 1518->1504 1526 7ffd9b59724c-7ffd9b597277 call 7ffd9b595f08 1518->1526 1529 7ffd9b5971cb-7ffd9b5971dd 1522->1529 1530 7ffd9b59727c-7ffd9b5972ae 1522->1530 1526->1530 1529->1518 1534 7ffd9b5971df 1529->1534 1534->1496
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dc91237d3c812a551a2d719124b6af6cbd1cc651b630aa0e54e8177b3206fbe1
                                        • Instruction ID: 205b8f3eb88000ee086a7da16d13089009e35c5e2eb98662d964df3835563287
                                        • Opcode Fuzzy Hash: dc91237d3c812a551a2d719124b6af6cbd1cc651b630aa0e54e8177b3206fbe1
                                        • Instruction Fuzzy Hash: 98425731B1DA4A4FEBAAEB288465AB477E1FFA4340F4440BED44DC31B7DE28B9458741

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1541 7ffd9b596521-7ffd9b596554 call 7ffd9b594a90 call 7ffd9b590c40 * 2 1549 7ffd9b59655a-7ffd9b596568 1541->1549 1550 7ffd9b5972ee-7ffd9b597301 1541->1550 1552 7ffd9b59656a-7ffd9b59656c 1549->1552 1553 7ffd9b59656e-7ffd9b59657d 1549->1553 1554 7ffd9b596580-7ffd9b596582 1552->1554 1553->1554 1556 7ffd9b596588-7ffd9b5965a4 1554->1556 1557 7ffd9b5966c2-7ffd9b5966c5 1554->1557 1556->1557 1573 7ffd9b5965aa-7ffd9b5965bc 1556->1573 1558 7ffd9b5966cb-7ffd9b5966d6 1557->1558 1559 7ffd9b596800-7ffd9b596807 1557->1559 1563 7ffd9b5966d8-7ffd9b596720 1558->1563 1564 7ffd9b596722-7ffd9b596730 1558->1564 1561 7ffd9b596897-7ffd9b59689e 1559->1561 1562 7ffd9b59680d-7ffd9b596814 1559->1562 1566 7ffd9b5968a9-7ffd9b5968bc 1561->1566 1567 7ffd9b5968a0-7ffd9b5968a7 1561->1567 1562->1561 1568 7ffd9b59681a-7ffd9b596824 1562->1568 1563->1564 1564->1559 1581 7ffd9b5968cd-7ffd9b5968d5 1566->1581 1582 7ffd9b5968be-7ffd9b5968c3 1566->1582 1567->1566 1571 7ffd9b5968e6-7ffd9b5968ed 1567->1571 1568->1571 1584 7ffd9b59682a-7ffd9b596873 1568->1584 1575 7ffd9b596b51-7ffd9b596b58 1571->1575 1576 7ffd9b5968f3-7ffd9b5968fa 1571->1576 1579 7ffd9b59660a-7ffd9b596618 1573->1579 1580 7ffd9b5965be-7ffd9b5965cf 1573->1580 1575->1550 1585 7ffd9b596b5e-7ffd9b596b65 1575->1585 1576->1575 1583 7ffd9b596900-7ffd9b596903 1576->1583 1594 7ffd9b596619-7ffd9b596695 1579->1594 1580->1594 1598 7ffd9b5965d1-7ffd9b5965db 1580->1598 1589 7ffd9b5968db-7ffd9b5968df 1581->1589 1590 7ffd9b597341-7ffd9b598209 call 7ffd9b597428 * 2 1581->1590 1582->1581 1587 7ffd9b596905-7ffd9b596907 1583->1587 1588 7ffd9b59690c-7ffd9b59691a 1583->1588 1585->1550 1593 7ffd9b596b6b-7ffd9b596b7d 1585->1593 1599 7ffd9b5969ba-7ffd9b5969bd 1587->1599 1611 7ffd9b59691c 1588->1611 1612 7ffd9b59691e 1588->1612 1589->1571 1595 7ffd9b596bc9-7ffd9b596be1 1593->1595 1596 7ffd9b596b7f-7ffd9b596b9c 1593->1596 1649 7ffd9b596698-7ffd9b5966b6 1594->1649 1613 7ffd9b59732f-7ffd9b597340 1596->1613 1614 7ffd9b596ba2-7ffd9b596bc7 1596->1614 1604 7ffd9b5965e1-7ffd9b596608 1598->1604 1605 7ffd9b597302-7ffd9b59731c 1598->1605 1607 7ffd9b5969c6-7ffd9b5969d4 1599->1607 1608 7ffd9b5969bf-7ffd9b5969c1 1599->1608 1604->1579 1659 7ffd9b59731d-7ffd9b597325 1605->1659 1631 7ffd9b5969d6 1607->1631 1632 7ffd9b5969d8 1607->1632 1615 7ffd9b596a75-7ffd9b596a7b 1608->1615 1618 7ffd9b596920-7ffd9b596923 1611->1618 1612->1618 1613->1590 1614->1595 1623 7ffd9b596b2d-7ffd9b596b2f 1615->1623 1624 7ffd9b596a81-7ffd9b596a83 1615->1624 1628 7ffd9b596925-7ffd9b59692b 1618->1628 1629 7ffd9b59692d-7ffd9b596938 1618->1629 1623->1575 1633 7ffd9b596b31-7ffd9b596b39 1623->1633 1624->1623 1635 7ffd9b596a89-7ffd9b596b2b 1624->1635 1639 7ffd9b5969a8-7ffd9b5969b8 1628->1639 1640 7ffd9b59693a-7ffd9b596957 1629->1640 1641 7ffd9b596984-7ffd9b5969a5 1629->1641 1643 7ffd9b5969da-7ffd9b5969dd 1631->1643 1632->1643 1633->1575 1644 7ffd9b596b3b-7ffd9b596b4d 1633->1644 1635->1575 1639->1599 1640->1659 1660 7ffd9b59695d-7ffd9b596982 1640->1660 1641->1639 1651 7ffd9b5969e7-7ffd9b5969f2 1643->1651 1652 7ffd9b5969df-7ffd9b5969e5 1643->1652 1644->1575 1673 7ffd9b5966b7 1649->1673 1674 7ffd9b5966b8-7ffd9b5966c0 1649->1674 1663 7ffd9b596a3e-7ffd9b596a60 1651->1663 1664 7ffd9b5969f4-7ffd9b596a11 1651->1664 1662 7ffd9b596a63-7ffd9b596a73 1652->1662 1676 7ffd9b597326-7ffd9b59732e 1659->1676 1660->1641 1662->1615 1663->1662 1664->1676 1677 7ffd9b596a17-7ffd9b596a3c 1664->1677 1673->1674 1674->1557 1674->1649 1676->1613 1677->1663
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf9993d35845f0963b0af5835797849265c454504d3a07461631b5657088c0a6
                                        • Instruction ID: 8ae9afdcad2cad64020005d4e7ee130de4aa622d4262e9de2ff5980c02c9a994
                                        • Opcode Fuzzy Hash: bf9993d35845f0963b0af5835797849265c454504d3a07461631b5657088c0a6
                                        • Instruction Fuzzy Hash: 7E225831B0EA4A4FE7F69B6844742B437E1EF55380F9601BAD88DC71E7DD28A9068341

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1693 7ffd9b59776c-7ffd9b59778c 1695 7ffd9b5977d6-7ffd9b5977e6 1693->1695 1696 7ffd9b59778e-7ffd9b5977aa 1693->1696 1702 7ffd9b5977e8-7ffd9b5977ea 1695->1702 1703 7ffd9b5977ec-7ffd9b5977fa 1695->1703 1697 7ffd9b597bb8-7ffd9b597bd6 call 7ffd9b590c40 * 2 1696->1697 1698 7ffd9b5977b0-7ffd9b5977ce call 7ffd9b590c40 * 2 1696->1698 1713 7ffd9b597bdc-7ffd9b597be3 1697->1713 1714 7ffd9b597ce2-7ffd9b597ced 1697->1714 1715 7ffd9b597a4e-7ffd9b597a6c call 7ffd9b590c40 * 2 1698->1715 1716 7ffd9b5977d4-7ffd9b5977d5 1698->1716 1706 7ffd9b5977fd-7ffd9b597812 1702->1706 1703->1706 1717 7ffd9b597818-7ffd9b59783c call 7ffd9b597380 * 2 1706->1717 1718 7ffd9b597814-7ffd9b597816 1706->1718 1719 7ffd9b597be5-7ffd9b597bf4 1713->1719 1720 7ffd9b597bf6-7ffd9b597bf8 1713->1720 1739 7ffd9b597a96-7ffd9b597ab4 call 7ffd9b590c40 * 2 1715->1739 1740 7ffd9b597a6e-7ffd9b597a78 1715->1740 1716->1695 1722 7ffd9b59783f-7ffd9b597854 1717->1722 1718->1722 1719->1720 1732 7ffd9b597bfa 1719->1732 1725 7ffd9b597bff-7ffd9b597c23 1720->1725 1734 7ffd9b597856-7ffd9b597858 1722->1734 1735 7ffd9b59785a-7ffd9b59787e call 7ffd9b597380 * 2 1722->1735 1736 7ffd9b597c25-7ffd9b597c42 1725->1736 1737 7ffd9b597c6f-7ffd9b597c7d 1725->1737 1732->1725 1743 7ffd9b597881-7ffd9b597896 1734->1743 1735->1743 1749 7ffd9b597c48-7ffd9b597c6d 1736->1749 1750 7ffd9b597cee-7ffd9b597d67 1736->1750 1737->1714 1765 7ffd9b597aba-7ffd9b597ac5 1739->1765 1766 7ffd9b597b6b-7ffd9b597b76 1739->1766 1741 7ffd9b597a7a-7ffd9b597a8a 1740->1741 1742 7ffd9b597a8c 1740->1742 1752 7ffd9b597a8e-7ffd9b597a8f 1741->1752 1742->1752 1761 7ffd9b597898-7ffd9b59789a 1743->1761 1762 7ffd9b59789c-7ffd9b5978b4 call 7ffd9b597380 1743->1762 1749->1737 1771 7ffd9b597d69-7ffd9b597dad 1750->1771 1772 7ffd9b597db0-7ffd9b597e06 1750->1772 1752->1739 1767 7ffd9b5978c3-7ffd9b5978d1 1761->1767 1762->1767 1781 7ffd9b597ac7-7ffd9b597ac9 1765->1781 1782 7ffd9b597acb-7ffd9b597ada 1765->1782 1777 7ffd9b597b78-7ffd9b597b7a 1766->1777 1778 7ffd9b597b7c-7ffd9b597b8b 1766->1778 1779 7ffd9b5978d7-7ffd9b5978e5 1767->1779 1780 7ffd9b5978d3-7ffd9b5978d5 1767->1780 1771->1772 1801 7ffd9b597e08-7ffd9b597e09 1772->1801 1802 7ffd9b597e0c-7ffd9b597e30 1772->1802 1784 7ffd9b597b8e-7ffd9b597b90 1777->1784 1778->1784 1785 7ffd9b5978e8-7ffd9b5978f1 1779->1785 1780->1785 1786 7ffd9b597add-7ffd9b597b18 1781->1786 1782->1786 1784->1714 1793 7ffd9b597b96-7ffd9b597ba8 1784->1793 1804 7ffd9b5978f8-7ffd9b5978ff 1785->1804 1795 7ffd9b597b1b-7ffd9b597b21 1786->1795 1799 7ffd9b597b23-7ffd9b597b2b 1795->1799 1800 7ffd9b597b34-7ffd9b597b3c 1795->1800 1805 7ffd9b597b3d-7ffd9b597b3e 1799->1805 1806 7ffd9b597b2d-7ffd9b597b32 1799->1806 1800->1805 1807 7ffd9b597b4e 1800->1807 1801->1802 1820 7ffd9b597e62-7ffd9b597e6b 1802->1820 1821 7ffd9b597e32-7ffd9b597e41 1802->1821 1804->1715 1809 7ffd9b597905-7ffd9b59790c 1804->1809 1810 7ffd9b597b43-7ffd9b597b4d call 7ffd9b5973b8 1805->1810 1806->1810 1812 7ffd9b597b54-7ffd9b597b69 1807->1812 1809->1715 1814 7ffd9b597912-7ffd9b597929 1809->1814 1810->1812 1812->1766 1812->1795 1825 7ffd9b59792b-7ffd9b59793d 1814->1825 1826 7ffd9b59795e-7ffd9b597969 1814->1826 1823 7ffd9b597e47-7ffd9b597e61 1821->1823 1824 7ffd9b597e43-7ffd9b597e44 1821->1824 1824->1823 1830 7ffd9b59793f-7ffd9b597941 1825->1830 1831 7ffd9b597943-7ffd9b597951 1825->1831 1833 7ffd9b59796b-7ffd9b59796d 1826->1833 1834 7ffd9b59796f-7ffd9b59797e 1826->1834 1836 7ffd9b597954-7ffd9b597957 1830->1836 1831->1836 1835 7ffd9b597981-7ffd9b597983 1833->1835 1834->1835 1837 7ffd9b597a38-7ffd9b597a4a 1835->1837 1838 7ffd9b597989-7ffd9b5979a0 1835->1838 1836->1826 1837->1715 1838->1837 1843 7ffd9b5979a6-7ffd9b5979c3 1838->1843 1846 7ffd9b5979c5-7ffd9b5979cd 1843->1846 1847 7ffd9b5979cf 1843->1847 1848 7ffd9b5979d1-7ffd9b5979d3 1846->1848 1847->1848 1848->1837 1850 7ffd9b5979d5-7ffd9b5979df 1848->1850 1851 7ffd9b5979ed-7ffd9b5979f5 1850->1851 1852 7ffd9b5979e1-7ffd9b5979eb call 7ffd9b594568 1850->1852 1853 7ffd9b5979f7-7ffd9b597a1c call 7ffd9b596018 1851->1853 1854 7ffd9b597a23-7ffd9b597a36 call 7ffd9b5973a8 1851->1854 1852->1715 1852->1851 1853->1854 1854->1715
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e5fb8f1a5cdeb4c6aeb3c63fac7f762d5d7de5b2ef6df3c4f9b0e2d84720f0d
                                        • Instruction ID: 703f4d05754a15ff021d52390ea4b2b28c376c42f432aa6eae65522c1f0639fd
                                        • Opcode Fuzzy Hash: 9e5fb8f1a5cdeb4c6aeb3c63fac7f762d5d7de5b2ef6df3c4f9b0e2d84720f0d
                                        • Instruction Fuzzy Hash: 7C12B631B0EE4E4BE7EA976884756B973E2EF94340F96407AD44DC71F3DE28AA058341

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3016744708.00007FFD9B280000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B280000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b280000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID: MitigationPolicyProcess
                                        • String ID:
                                        • API String ID: 1088084561-0
                                        • Opcode ID: 33ce9bc21b996c7064147901505d7aad375f9544928635f1e29b919d6a69fc05
                                        • Instruction ID: 35bda18ae9b5af0c590065afda3b7852f50d5e309f100ce803088d1e16bb5ba6
                                        • Opcode Fuzzy Hash: 33ce9bc21b996c7064147901505d7aad375f9544928635f1e29b919d6a69fc05
                                        • Instruction Fuzzy Hash: 84414831D0CB598FDB29AFA88C4A9F97BE0EF55311F04017FE449C3192DE78A8468B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1862 7ffd9b59000a-7ffd9b59008e 1872 7ffd9b5900d8-7ffd9b5900dd 1862->1872 1873 7ffd9b590090-7ffd9b5900d7 1862->1873 1874 7ffd9b5900de 1872->1874 1875 7ffd9b5900df-7ffd9b590100 1872->1875 1873->1872 1874->1875 1881 7ffd9b590102-7ffd9b590121 1875->1881 1882 7ffd9b590124-7ffd9b59013c 1875->1882 1881->1882 1886 7ffd9b59013e-7ffd9b59015d 1882->1886 1887 7ffd9b590160-7ffd9b59017e 1882->1887 1886->1887 1890 7ffd9b59019a-7ffd9b5901a5 1887->1890 1891 7ffd9b590180-7ffd9b590198 1887->1891 1895 7ffd9b5901ab-7ffd9b5901b4 1890->1895 1896 7ffd9b59023e-7ffd9b590272 1890->1896 1891->1890 1898 7ffd9b5901b6-7ffd9b5901c3 1895->1898 1899 7ffd9b5901cd-7ffd9b5901d8 1895->1899 1916 7ffd9b5902ee-7ffd9b5902f0 1896->1916 1917 7ffd9b590274 1896->1917 1898->1899 1906 7ffd9b5901c5-7ffd9b5901cb 1898->1906 1900 7ffd9b5901da-7ffd9b5901f7 1899->1900 1901 7ffd9b590224-7ffd9b590230 1899->1901 1907 7ffd9b5901fd-7ffd9b590222 1900->1907 1908 7ffd9b5904e2-7ffd9b59053f 1900->1908 1901->1896 1906->1899 1907->1901 1936 7ffd9b59054b-7ffd9b590552 1908->1936 1937 7ffd9b590541-7ffd9b59054a 1908->1937 1918 7ffd9b5902f1-7ffd9b5902fa 1916->1918 1920 7ffd9b590276-7ffd9b59027a 1917->1920 1921 7ffd9b5902ba-7ffd9b5902c6 1917->1921 1925 7ffd9b5902fc-7ffd9b5902fe 1918->1925 1926 7ffd9b590300-7ffd9b590301 1918->1926 1927 7ffd9b5902eb-7ffd9b5902ec 1920->1927 1928 7ffd9b59027c-7ffd9b590281 1920->1928 1923 7ffd9b5902c8-7ffd9b5902ca 1921->1923 1924 7ffd9b5902cc-7ffd9b5902da 1921->1924 1931 7ffd9b5902dd-7ffd9b5902f0 1923->1931 1924->1931 1933 7ffd9b590311-7ffd9b59032e 1925->1933 1929 7ffd9b590302-7ffd9b59030e 1926->1929 1927->1916 1928->1929 1930 7ffd9b590283-7ffd9b59028e 1928->1930 1929->1933 1934 7ffd9b5902ff 1930->1934 1935 7ffd9b590290-7ffd9b59029f 1930->1935 1931->1918 1946 7ffd9b590330-7ffd9b590332 1933->1946 1947 7ffd9b590334-7ffd9b590342 1933->1947 1934->1926 1935->1918 1948 7ffd9b5902a1-7ffd9b5902a6 1935->1948 1942 7ffd9b59055e-7ffd9b590569 1936->1942 1943 7ffd9b590554-7ffd9b59055d 1936->1943 1949 7ffd9b590345-7ffd9b590362 1946->1949 1947->1949 1951 7ffd9b5902b0-7ffd9b5902b6 1948->1951 1955 7ffd9b590368-7ffd9b590376 1949->1955 1956 7ffd9b590364-7ffd9b590366 1949->1956 1953 7ffd9b5902bc-7ffd9b5902c6 1951->1953 1954 7ffd9b590400-7ffd9b59041e 1951->1954 1953->1923 1953->1924 1964 7ffd9b5904bd-7ffd9b5904df 1954->1964 1965 7ffd9b590424-7ffd9b59042e 1954->1965 1957 7ffd9b590379-7ffd9b59038f 1955->1957 1956->1957 1962 7ffd9b5903a6-7ffd9b5903ad 1957->1962 1963 7ffd9b590391-7ffd9b5903a4 1957->1963 1971 7ffd9b5903b4-7ffd9b5903c7 1962->1971 1963->1962 1973 7ffd9b5903cd-7ffd9b5903d0 1963->1973 1967 7ffd9b590430-7ffd9b590432 1965->1967 1968 7ffd9b590434-7ffd9b590442 1965->1968 1970 7ffd9b590445-7ffd9b590462 1967->1970 1968->1970 1977 7ffd9b590468-7ffd9b590476 1970->1977 1978 7ffd9b590464-7ffd9b590466 1970->1978 1971->1973 1974 7ffd9b5903e7-7ffd9b5903fa 1973->1974 1975 7ffd9b5903d2-7ffd9b5903e5 1973->1975 1974->1954 1975->1954 1975->1974 1979 7ffd9b590479-7ffd9b590496 1977->1979 1978->1979 1983 7ffd9b590498-7ffd9b59049a 1979->1983 1984 7ffd9b59049c-7ffd9b5904aa 1979->1984 1985 7ffd9b5904ad-7ffd9b5904b6 1983->1985 1984->1985 1985->1964
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cf0d61a924368cbf461df0b67f2a21a19da1fce96ab24e7c0b2b070ac52f6252
                                        • Instruction ID: f2acbc314a7d86badab081bea60cb4caa1c4936c2feef6615f9407b5545e898e
                                        • Opcode Fuzzy Hash: cf0d61a924368cbf461df0b67f2a21a19da1fce96ab24e7c0b2b070ac52f6252
                                        • Instruction Fuzzy Hash: 13120531B0EA4E4FE7EAE76C88656B537E1EF59700F8904BAD44DC71A3DD18E9428341

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1987 7ffd9b59c550-7ffd9b59c66a 2002 7ffd9b59c686-7ffd9b59c68d 1987->2002 2003 7ffd9b59c66c-7ffd9b59c672 1987->2003 2004 7ffd9b59c68e-7ffd9b59c6d9 2002->2004 2003->2004 2005 7ffd9b59c674-7ffd9b59c685 2003->2005 2011 7ffd9b59c758-7ffd9b59c76a 2004->2011 2012 7ffd9b59c6db-7ffd9b59c6f9 2004->2012 2005->2002 2015 7ffd9b59c786-7ffd9b59c7c9 2011->2015 2016 7ffd9b59c76c-7ffd9b59c785 2011->2016 2025 7ffd9b59c7e6-7ffd9b59c82a 2015->2025 2026 7ffd9b59c7cc-7ffd9b59c7e5 2015->2026 2016->2015 2030 7ffd9b59c846-7ffd9b59c862 2025->2030 2031 7ffd9b59c82c-7ffd9b59c845 2025->2031 2026->2025 2035 7ffd9b59c87e-7ffd9b59c8c2 2030->2035 2036 7ffd9b59c864-7ffd9b59c87d 2030->2036 2031->2030 2048 7ffd9b59c8de-7ffd9b59c915 2035->2048 2049 7ffd9b59c8c4-7ffd9b59c951 2035->2049 2036->2035 2064 7ffd9b59c917 2048->2064 2052 7ffd9b59c957-7ffd9b59c965 2049->2052 2053 7ffd9b59c967-7ffd9b59c986 2052->2053 2054 7ffd9b59c9ab-7ffd9b59c9ba 2052->2054 2060 7ffd9b59c98d-7ffd9b59c9a9 2053->2060 2059 7ffd9b59c9bc-7ffd9b59c9ef 2054->2059 2054->2060 2069 7ffd9b59ca35-7ffd9b59ca50 2059->2069 2070 7ffd9b59c9f1-7ffd9b59ca33 2059->2070 2060->2054 2068 7ffd9b59c922-7ffd9b59c950 2064->2068 2068->2052 2070->2069
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f23a9280150fb684c6e9a68cfa7e559c83c79aa02c2c72bbcfbaa2b34f840dc1
                                        • Instruction ID: fa6e51773e671c180376c8fd3aabd8af2cf946d32c36f3869e48b6c8b450c0ce
                                        • Opcode Fuzzy Hash: f23a9280150fb684c6e9a68cfa7e559c83c79aa02c2c72bbcfbaa2b34f840dc1
                                        • Instruction Fuzzy Hash: 25D14A13B0D56B4BE365FF7DA8F28F93BA0DF4122870901B7D489CA0DBDD1876864285
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 939b792f852ebcd3b8b37d6073f2f99399c64e0fb191d052416cb5b31570bb9f
                                        • Instruction ID: 374b582ca5fe24de64b70a1586d00a8cc26383aa121850352b70d8747843d413
                                        • Opcode Fuzzy Hash: 939b792f852ebcd3b8b37d6073f2f99399c64e0fb191d052416cb5b31570bb9f
                                        • Instruction Fuzzy Hash: F3E13A61B0EA8E4FFBE6DB6888686B437E1EF55300F5901F9D45CC72EBDD25A9028341
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4bad237a9f153319c35b0704d1872e4bbefac869c421c0ec643418af099eafdb
                                        • Instruction ID: a9a90c0dd6029e4bfee8ceb9605948e89b6fe50fe5076a41c43c9ab149859b63
                                        • Opcode Fuzzy Hash: 4bad237a9f153319c35b0704d1872e4bbefac869c421c0ec643418af099eafdb
                                        • Instruction Fuzzy Hash: 22C10813A0F7D65FE7A29BBD94B54D07FB0EF12A2471E06F7C0D48B0A7D914A9868381
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 98383beb7eec95f5fbbb93326468ac7cc3dc19a296e9ff12088a7a8efaa29feb
                                        • Instruction ID: 3948cf749f19c31ea0bc53ef1dfe4be3846e4f5823ffa704c74662a70c401557
                                        • Opcode Fuzzy Hash: 98383beb7eec95f5fbbb93326468ac7cc3dc19a296e9ff12088a7a8efaa29feb
                                        • Instruction Fuzzy Hash: 8DC14972B0EB4A4BEBEAEB6894618B537E1EF50310B54007DD84E87193ED15FA16C780
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 69f6f35dca035d83324386fd77aa91319d44cec482ad80c4e0e32b4d64cdf586
                                        • Instruction ID: 04a189b695cf8eb88ea014c11a1bcb88f8103ecaf4c79a81ca54f078998278d4
                                        • Opcode Fuzzy Hash: 69f6f35dca035d83324386fd77aa91319d44cec482ad80c4e0e32b4d64cdf586
                                        • Instruction Fuzzy Hash: 9CA13A30A0E74D4FD7AADBA898656A87BE1EF45304F0501BED44DD71E3CA35AD06CB81
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 658f146dc57415c418079a0cc0fac9d4acf59f28007a6cf78856965c28712e1a
                                        • Instruction ID: bf6e73c9b8388239ade6041256005d12f571db3885ec1f60cf1d8d84981adc51
                                        • Opcode Fuzzy Hash: 658f146dc57415c418079a0cc0fac9d4acf59f28007a6cf78856965c28712e1a
                                        • Instruction Fuzzy Hash: F7A16C34609B098FDEDCEF59D0A1A6573E2FF58704B6509ACD01ACB296CF25F942CB04
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9e9a83f8f6b635f1d1a2f71dd08d654fffd201bcedcf6a886f5370e37c8ef416
                                        • Instruction ID: c9c323eb9c564f5d2ebe6fb786bb6f12429689342efa33e8d379d2f5bccb45de
                                        • Opcode Fuzzy Hash: 9e9a83f8f6b635f1d1a2f71dd08d654fffd201bcedcf6a886f5370e37c8ef416
                                        • Instruction Fuzzy Hash: D6815034709A4A8FDBDDEF58C4A0AA573F2FF99304B6505A9D06DCB297CA25E843C740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b383e11a16b0674c1abfb09a81567cac3b8033d6882c384fb9c5892c877f8578
                                        • Instruction ID: d74ab21cda9ad83cc4dd69adcaf85a3989576294e6f49f6b89355e35df2ceda2
                                        • Opcode Fuzzy Hash: b383e11a16b0674c1abfb09a81567cac3b8033d6882c384fb9c5892c877f8578
                                        • Instruction Fuzzy Hash: 6F71FE70719A0E8FEBF9EB58C4A1BA533E1FF58701F954478E44EC72A2DE64E9018740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e2303f4c5735c3503cb3e88daed276de476871e4f7ce2d8dadce8d8c43f9fe0
                                        • Instruction ID: a2a3faafe120a0e4df40afcd6572ece80e2c71c6a5bbd68918e3de0768c152de
                                        • Opcode Fuzzy Hash: 2e2303f4c5735c3503cb3e88daed276de476871e4f7ce2d8dadce8d8c43f9fe0
                                        • Instruction Fuzzy Hash: 0C718831B1AD0F4AE7FA97A480706BD62E2EF94344F96053AD41EC21F3DF386A428640
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3c2d40d28242fd242c52c5346839ea9d7a333806fce0fe6309ec1fbc57dcf7d0
                                        • Instruction ID: 1d4c778a1e9a7449e3432df413a43ddcc36cb72092e672ef4b88fbc54c935cf2
                                        • Opcode Fuzzy Hash: 3c2d40d28242fd242c52c5346839ea9d7a333806fce0fe6309ec1fbc57dcf7d0
                                        • Instruction Fuzzy Hash: E9516B72F0EA4E8FEBA5DBA8A8719A977D1FF84340F05007AD45DA31F3DE2569028341
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5725a0059ca704d0ca1f98898fc3a7d89232f8cd172956313d3efdf057391ec8
                                        • Instruction ID: dae53dabe589c2bcb70e6b0914bf881abc07e53629dbb258d1171edcbc899c5c
                                        • Opcode Fuzzy Hash: 5725a0059ca704d0ca1f98898fc3a7d89232f8cd172956313d3efdf057391ec8
                                        • Instruction Fuzzy Hash: F4618420B1990E8FEBE9EB6C84A5BA973E2EF98700F5541F4D41DC72ABCD24AD418741
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d12933c29c1452f320bd81faff0ccc749d2baf3ddfe6f43e5f7a49ba3dec86c9
                                        • Instruction ID: 7199373d1acc6064e353fbd613ad35310f9f26c1c1034bb6a2f6c31032ae5703
                                        • Opcode Fuzzy Hash: d12933c29c1452f320bd81faff0ccc749d2baf3ddfe6f43e5f7a49ba3dec86c9
                                        • Instruction Fuzzy Hash: 7461FB21B0EA8B0FE7A79B6884705B83BF1EF46340F9901FAD44DCB1EBDD1869468341
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7bf140bc758595fcc98e9604ffe1bb67b8470c6acc959702f92ba2027797a5dd
                                        • Instruction ID: fe8541d1fdb648a630d1becde81c7ee2536f3f63991f913601fd2790af7f076a
                                        • Opcode Fuzzy Hash: 7bf140bc758595fcc98e9604ffe1bb67b8470c6acc959702f92ba2027797a5dd
                                        • Instruction Fuzzy Hash: AC51B171719A4E8FDFD9DF68D8A0A6537A1FF69314B1501A9D81DCB2E2CB35E902CB00
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74eb19781803edd1b77e4f2565c32f35d1f5abb980a526f914abd3c6b9f6e75d
                                        • Instruction ID: 558ae3c53212b9f7b4155d49eb8aaf0a7eb9b6e43f5da6b76fb3888fbfe6b39c
                                        • Opcode Fuzzy Hash: 74eb19781803edd1b77e4f2565c32f35d1f5abb980a526f914abd3c6b9f6e75d
                                        • Instruction Fuzzy Hash: E051C57270DA894FDBD9DF688464A6577E2FF64310B4900ADD49EC72A7DE26F802C780
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9586180a0b97f878dc796c4c4b5a9a1b52b862feb80d1ad9365597d301438c6
                                        • Instruction ID: f9442c44c130290f813085ba6cd63749ac2852f64903d35c40d5cac88dfaddfe
                                        • Opcode Fuzzy Hash: f9586180a0b97f878dc796c4c4b5a9a1b52b862feb80d1ad9365597d301438c6
                                        • Instruction Fuzzy Hash: 35417612B1E94E0FE7D9EB2C58B5AB437D1EF98240B9441B6D44DC32DBEC18B9424382
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b11a7b8f952604afe9025cb8f84955d064b711d626dcfb0ce0595864172b7aab
                                        • Instruction ID: 5f0604c7059b7c249aacab5c57b2babc718a6028c837c012523a002ba4d83ba4
                                        • Opcode Fuzzy Hash: b11a7b8f952604afe9025cb8f84955d064b711d626dcfb0ce0595864172b7aab
                                        • Instruction Fuzzy Hash: 8D41F531B1994E8BFBE6DF5884A4A6533E2FF94340F9545B9C41DC31ABDE28BD028740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1bfeeb48f2f05de3bb470452c7cdbbbda89fc5978521f46ca49a0b5722ba512a
                                        • Instruction ID: cc97cb2536b3ae840b00e0b71d632e1ced9cac0f33abc796e10c2f03971a80d6
                                        • Opcode Fuzzy Hash: 1bfeeb48f2f05de3bb470452c7cdbbbda89fc5978521f46ca49a0b5722ba512a
                                        • Instruction Fuzzy Hash: 8841C771B0DA0C8FDBE5EBAC94A85A977E1EF69305B05017EE409D72E2DE25AC018741
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d7e35a1474faeee37ca5b49420b906282a50d7e728ee6a9d54f71a93a2418bfc
                                        • Instruction ID: 7c04aeb8b531c3e02f61215a45b0d5419c20bf14d011e3e3afd7d48a0a3b08bb
                                        • Opcode Fuzzy Hash: d7e35a1474faeee37ca5b49420b906282a50d7e728ee6a9d54f71a93a2418bfc
                                        • Instruction Fuzzy Hash: 694193B1609B4D8FEBD5DF28C8A4AA537A1FF59314B5505ADD42EC72E2CB31E912CB00
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5436cf308e718007a1c16fd100e0c77ab929f627ef23e3322545841ce0a2976b
                                        • Instruction ID: 0b13db9f82abb05557e343accd6f16d5216d7b37a24b5db3c9862d4a2fe173f7
                                        • Opcode Fuzzy Hash: 5436cf308e718007a1c16fd100e0c77ab929f627ef23e3322545841ce0a2976b
                                        • Instruction Fuzzy Hash: EB41E671B0EA8A4FEBD6DB6C48686A437E2FF98340F5900B9D45CC72E7DE25A801C740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6f540f557ecd0bcb4659fb785e4a75101ccbb3933095fec5748d821103af362d
                                        • Instruction ID: c4ec02927d25008e68d812dfa9c7fbb7346a3c4a6d3e0ba60ec1230300f5fd13
                                        • Opcode Fuzzy Hash: 6f540f557ecd0bcb4659fb785e4a75101ccbb3933095fec5748d821103af362d
                                        • Instruction Fuzzy Hash: AD217E31A0EB8E4FD7E69B759820995BBE1FF85320B1501BBD44DC31E3DB28A902C341
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50b842b5160cefaa5c49a48e84aba7748adaf10c9a2591adb25c0a4ce209c71f
                                        • Instruction ID: 89a04bf212700bef02d1c08638ccfe42c9e018a4d51fb9230756a715d6abf762
                                        • Opcode Fuzzy Hash: 50b842b5160cefaa5c49a48e84aba7748adaf10c9a2591adb25c0a4ce209c71f
                                        • Instruction Fuzzy Hash: 0621B211F2AA6E0FF7E6AB7C487527873D2EF58255B8500B6D81DC32A7DD18AD424341
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 057e1c1384532b673aebb6c8b7ef66b79d90c406c3352155a5b79908348f4e58
                                        • Instruction ID: a59e3488166418b48ed46bf5d0179f890c0196486f5c79e8c92cd32d74021a5e
                                        • Opcode Fuzzy Hash: 057e1c1384532b673aebb6c8b7ef66b79d90c406c3352155a5b79908348f4e58
                                        • Instruction Fuzzy Hash: BC21CB62B0AD4D4FEBB9EE5C44A5A7533E1DBA4390745017ED41DC72ABEC15AE014780
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab8a311be59977e5e0a2e78422ddc4b6397d130a772acfaddfa50e0192bc9124
                                        • Instruction ID: 1c7b6cf200a94deadc8696c90e897dc0b7f1d2ad11440186662732bf87df7f56
                                        • Opcode Fuzzy Hash: ab8a311be59977e5e0a2e78422ddc4b6397d130a772acfaddfa50e0192bc9124
                                        • Instruction Fuzzy Hash: 2D210820B0EA8A0FE7BA9798447477966A2DF85340F8680B7C40DD71F3CF18AA058351
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9303b99f039ddd183b4e1b59eef4d53621f9671a0323a9abcae5be99a9ca009
                                        • Instruction ID: 8f30fca85d45a2673c0045dac7155f8968e5789cb69944cbbeae3068c7bbc62f
                                        • Opcode Fuzzy Hash: b9303b99f039ddd183b4e1b59eef4d53621f9671a0323a9abcae5be99a9ca009
                                        • Instruction Fuzzy Hash: 7B21941260F7D65FE3A79BBC98B54987F71EF0391874E05F7C5848B0A3DD1429858351
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a41f255b89a58102cb5628898ff63324696affced8339f2300fb8a45c00b3f76
                                        • Instruction ID: 54e7f5684c4288c6874cd8e1122b707ab8ce62ad6df03adf882c1a3ad3db674c
                                        • Opcode Fuzzy Hash: a41f255b89a58102cb5628898ff63324696affced8339f2300fb8a45c00b3f76
                                        • Instruction Fuzzy Hash: C031D431F0EA0A0BF7A6BBA4C4263B426E1EB55311FC6847AC50DD33E7DC2C6A494751
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c6bdd92f9fa4a9dc2a96d400b209ef0db491e829ed8ebb0e7f0a9e7b08b09667
                                        • Instruction ID: 13954b6c051d13db5873ab863356e0e3240cf649381fbfae316637591bad8089
                                        • Opcode Fuzzy Hash: c6bdd92f9fa4a9dc2a96d400b209ef0db491e829ed8ebb0e7f0a9e7b08b09667
                                        • Instruction Fuzzy Hash: 3911063060CA484FE7D5DB28C4A8AB277E1FF99345B1401FED88DC72A6DE259940C740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 252563adc3487521734412f8618500e133763cc09cfac7d931b6525caa0197c2
                                        • Instruction ID: d036cda67523194eebe760064f15d32b3ca6d3717926da13b5d23c16999b7d20
                                        • Opcode Fuzzy Hash: 252563adc3487521734412f8618500e133763cc09cfac7d931b6525caa0197c2
                                        • Instruction Fuzzy Hash: 6511B231719D084FE7D8EB28D468A76B3E1EF98355B1405BED84DC72B6DE25A940C740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6db85531e8d9f37bb499e603d3c96363468f58ff897b8806f93681836ae26574
                                        • Instruction ID: ebf604cdec3766d62b64d114332a5564c1b2f6550d6ba503a7366b26455178bd
                                        • Opcode Fuzzy Hash: 6db85531e8d9f37bb499e603d3c96363468f58ff897b8806f93681836ae26574
                                        • Instruction Fuzzy Hash: 8911ED50F1EA4A0FF7DAAB7C14A05B12BE2EF9625478900FAD44CC30ABDC2CCD468340
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0dc8d4f2823c21e8ceaf1b842374f15fdd7319ecfbb80e0898f6a9bbc4538083
                                        • Instruction ID: c2debd2fd84e8f973f7ac80c45523c2b052d90431c94e7dc01ac7253c0cc7b97
                                        • Opcode Fuzzy Hash: 0dc8d4f2823c21e8ceaf1b842374f15fdd7319ecfbb80e0898f6a9bbc4538083
                                        • Instruction Fuzzy Hash: 54118EB2A0DB4C8FDFA1DFA4A8A45AC7BA2FF55340B4500AAE159D31B3DB2569008B01
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 054869d5be7cced93f585a15d9ddf1cf0c4125a259d1988d0e528a78c58d712f
                                        • Instruction ID: 57f4c61cbf64df05ad5b51db3562cccea171de4028fefa381b73025702742cad
                                        • Opcode Fuzzy Hash: 054869d5be7cced93f585a15d9ddf1cf0c4125a259d1988d0e528a78c58d712f
                                        • Instruction Fuzzy Hash: 361108A3A0FA8E1FE7A2977858B9160BBA1FF55600B8602BFD049830A3DA096D518351
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 55bc006e676052de620c47d2ef215d8a78e0629f0b79a4e84eda59250687a930
                                        • Instruction ID: 7adc768241c3a92c655cd7d94862eac8a391a013d558e27e3a4fde48f569858b
                                        • Opcode Fuzzy Hash: 55bc006e676052de620c47d2ef215d8a78e0629f0b79a4e84eda59250687a930
                                        • Instruction Fuzzy Hash: E4118231B09B0C8FEFA9DEAC94A856873D1FF5970470501BEE449D72E6DE25AC01CB41
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7183f12b8832c4f5d2499aa2d19bd268347b5d58bb1b5497d828ad1dd874937b
                                        • Instruction ID: 82fffeaafb8ddff49a9681eff53162ca17e4ef12b77965999d6fae93c68fb9af
                                        • Opcode Fuzzy Hash: 7183f12b8832c4f5d2499aa2d19bd268347b5d58bb1b5497d828ad1dd874937b
                                        • Instruction Fuzzy Hash: CD118131B09A494FEBD9EF688060A6577E2FF68300B5540E8C44DCB297DE36E945C780
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 746fabd1a3c1ddefd4813ad14b23e68868da9dc58d88ac57e31b92d0db9e7537
                                        • Instruction ID: 0aead4e8b706ba6a757bf4e356934448bfe5455eec2af96307183c0d79b15816
                                        • Opcode Fuzzy Hash: 746fabd1a3c1ddefd4813ad14b23e68868da9dc58d88ac57e31b92d0db9e7537
                                        • Instruction Fuzzy Hash: 4B118E31B09A494FEBD9EF688060A6577E2FF68300B5540E8C44DCB297DE36E945C780
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: add2376548cab3ced2081ba78eec9df0a5261fb4d684408135144e1cb2053b8f
                                        • Instruction ID: 79756d66c0d6569788ee188798c6c5e75b89275936febbcfcc5dff56b18d609d
                                        • Opcode Fuzzy Hash: add2376548cab3ced2081ba78eec9df0a5261fb4d684408135144e1cb2053b8f
                                        • Instruction Fuzzy Hash: CE01A13070890C0FE6E8EA2CD428A6573E2EF98355F5401BED84DC32B5DA16AD418740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9650af7d2af7c014b87d602fe003fc37727628cb6fe3a45bbd43f3d41ca0791d
                                        • Instruction ID: e27ceeb513902ae0fbe77ea5ed54efccc68a19de01ae388fd3b0b039e4aeda82
                                        • Opcode Fuzzy Hash: 9650af7d2af7c014b87d602fe003fc37727628cb6fe3a45bbd43f3d41ca0791d
                                        • Instruction Fuzzy Hash: E8016D51B2AD4F0BF7E9A7BD14B56B656E2EF94254BD500BAD40CC319BDC2CD9418340
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6e73c1e4fd62635ecee6ba219e508f574dbbfd12dffd02b81fbd3512ed6e5747
                                        • Instruction ID: b2dbb3b6e402ecee90444e78c048de82522b8ed756bde84757af89d71fd337c1
                                        • Opcode Fuzzy Hash: 6e73c1e4fd62635ecee6ba219e508f574dbbfd12dffd02b81fbd3512ed6e5747
                                        • Instruction Fuzzy Hash: 77017122B1AD0D4FE7AAFBBC446927C63D2FF98251B55057AD00DC32A7DD28A8468340
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d2fd58fd4611faadd4c5d0c24cf080b436980fe4f70deb79a02582e040fa70d
                                        • Instruction ID: 7cbfadb63b2dcdc932be8cb0c2d25fe3981b3a4a5432eb7510130f9f09f79944
                                        • Opcode Fuzzy Hash: 3d2fd58fd4611faadd4c5d0c24cf080b436980fe4f70deb79a02582e040fa70d
                                        • Instruction Fuzzy Hash: F001D462B0EB8E1FD7968E7C40A91A03F91DF5626031901FBC48DDB1F3E81598058B40
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d4ebea8ab4f35ea3f0752b42c315706fd4362b917e3df4d1d4609abb4e6514c6
                                        • Instruction ID: 12ec5ebf48c81b11b4d992cdf0c0896baff63259046269362b5778617d0ca664
                                        • Opcode Fuzzy Hash: d4ebea8ab4f35ea3f0752b42c315706fd4362b917e3df4d1d4609abb4e6514c6
                                        • Instruction Fuzzy Hash: D401C43160DA880FD7D6962854685A17FE1EF96214B4901EBD488C71B3DA155D418345
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ecded96d4ce5542bf8aca33864b2d0037f656b8ff6394c350eb17c603cdc4f8d
                                        • Instruction ID: 5dad99b5d6a437f64058252edf5af669dd0fd88ff2718d125b65628d94a5c8d2
                                        • Opcode Fuzzy Hash: ecded96d4ce5542bf8aca33864b2d0037f656b8ff6394c350eb17c603cdc4f8d
                                        • Instruction Fuzzy Hash: 9601D622B1DD8F4BFBE69B5894A066533E2EF64740B9181B9D41DC319AED25BE024380
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1d22d5eedd82d182b37fbcfe3d2c8c094eb65dbce02efb0e371c2bfb9550733
                                        • Instruction ID: ce06afedcb827dd915eb81183d3dcbb30c1c50af11e429838f4136f6b7f3e21a
                                        • Opcode Fuzzy Hash: c1d22d5eedd82d182b37fbcfe3d2c8c094eb65dbce02efb0e371c2bfb9550733
                                        • Instruction Fuzzy Hash: 8D01D424F1990B46FBFD936944B177961E2EF88341F5A817DC40DC21EADD289E808242
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 51ad52e6214a6b327c35ced59354c8491adc43fde5e855bae2c9647694cf399b
                                        • Instruction ID: 3b8fed61eb304d97de36a59a8dc466fca8e0a3b8f66c4a12068179b7cd0099f8
                                        • Opcode Fuzzy Hash: 51ad52e6214a6b327c35ced59354c8491adc43fde5e855bae2c9647694cf399b
                                        • Instruction Fuzzy Hash: FF012D74A08A5D8FDB69EF18C8A96A9B7F0FB54301F5102AEC41AD32A1CF341A85DF41
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 54cdb4229b6152dd99106a214f71af018d50e680d4b512d687265637c6d176a5
                                        • Instruction ID: 8c1e7085648a0da553afd64c2cb6b321ddb04c01bab5568400b27a7356cb9234
                                        • Opcode Fuzzy Hash: 54cdb4229b6152dd99106a214f71af018d50e680d4b512d687265637c6d176a5
                                        • Instruction Fuzzy Hash: 84019375A0A95C9FDBE4EB1CC898E9877F1EF28340F8541E5E04DD3272DE30A9818B00
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d401a6078165a9640544be972c6289b7cb4454246769df3f5f2b6a137d7c50dc
                                        • Instruction ID: 3b28c83f0e5a4d1c0127b0c62eb833d34e744ec765b472d9414c721e0a64d3e4
                                        • Opcode Fuzzy Hash: d401a6078165a9640544be972c6289b7cb4454246769df3f5f2b6a137d7c50dc
                                        • Instruction Fuzzy Hash: D5F0DC34B0D24A0FEB5DAA84A8663FC3282DF45314F800079C96E876D3DD2A68178782
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2bdcadaa20cead30344f3a4258282c622ca9183b9043236f7037829db7c5c51d
                                        • Instruction ID: 5df201f8b9e8b97054d33e46da761a2f6a0f499b5661a667b540c002f63bc046
                                        • Opcode Fuzzy Hash: 2bdcadaa20cead30344f3a4258282c622ca9183b9043236f7037829db7c5c51d
                                        • Instruction Fuzzy Hash: F9E09BB114E50C6FA61CAA55AC079F7379CE747134F01111FE18E85012F166B5238295
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dd9fc222ab8b76f847dc0ffea65fead7fd810a5c5707711613f83c39e1d210a0
                                        • Instruction ID: fcf9c702d4f80a41fc3631b11d884386c8d941c9f87308046141acef12931dcf
                                        • Opcode Fuzzy Hash: dd9fc222ab8b76f847dc0ffea65fead7fd810a5c5707711613f83c39e1d210a0
                                        • Instruction Fuzzy Hash: 8CF0813180A749AFC712EF68D454CD57BA0EF0231871502AAD05AC70A3DB25B559CB85
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1470d2d049ecd1efe9b33a386f2577eec19b69d0a0550686bec07312e543cb5d
                                        • Instruction ID: f3d88965ca9c4dad2356b5778cc517cb23c247c2f89e1ea6a5a487f4fd5a4158
                                        • Opcode Fuzzy Hash: 1470d2d049ecd1efe9b33a386f2577eec19b69d0a0550686bec07312e543cb5d
                                        • Instruction Fuzzy Hash: 1101FB71E1551D8EEBE8EB6888A97FCB3B1EF54305F4100FAC10DD21A2DE342AC08B00
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 63d5af3c2190e6e443c5aa0d14049e5850cafb9f45ec397febe5dc66fc23a5b9
                                        • Instruction ID: 0f2a988e54b6426fc6db8789353af7ba561bbc71b58d79e3313873b7dadb07a6
                                        • Opcode Fuzzy Hash: 63d5af3c2190e6e443c5aa0d14049e5850cafb9f45ec397febe5dc66fc23a5b9
                                        • Instruction Fuzzy Hash: 04F0E52190E99A0FDBB7936C44684607FA0EB2631030A01DAC458CB1B3E8089C95C3C1
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dddf1ce3d6ad94ddd889aeffcbddecfa4d0f6b2cc7d070672bf2d649d81b46d2
                                        • Instruction ID: ad061ee9ee62a48b0a4ea22df6fd9803f0e7c08f4896caedab1f09e7dcacb716
                                        • Opcode Fuzzy Hash: dddf1ce3d6ad94ddd889aeffcbddecfa4d0f6b2cc7d070672bf2d649d81b46d2
                                        • Instruction Fuzzy Hash: FBF0303640A69C9FCB46DBA4D4618D67BB0EE56310B0501C7E049CB052E7219A5ACB82
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5a31645294cb5d61391897d7b5bc0db9fde82df7b068e1c436445b21d21d8c79
                                        • Instruction ID: 864827d5e1b2906ddc213ef4aebd794fc934a687d4e9a55742bcccfb7b9fd703
                                        • Opcode Fuzzy Hash: 5a31645294cb5d61391897d7b5bc0db9fde82df7b068e1c436445b21d21d8c79
                                        • Instruction Fuzzy Hash: 04E0D82110F3E45FDB539B788868CE13F60EE1322034941EFD485CF0B3E5158689C752
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ec8aa1da0beed477a8ec507bef0fdeb37c2bf20b08961227cce722eced117e2b
                                        • Instruction ID: df38b8fcda2c2de2a12d2ecc8b1320c408d3703f81974fa9edd2ee8378dc1cf7
                                        • Opcode Fuzzy Hash: ec8aa1da0beed477a8ec507bef0fdeb37c2bf20b08961227cce722eced117e2b
                                        • Instruction Fuzzy Hash: 81F02732E05A898FD7147F7484255E5BA71FF44208F5040BDE91DC729AED389A108740
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fe6697991a6c9ae0123c2fc0d2cd7780a7cab552973fd7aeb34bd7142a5001ae
                                        • Instruction ID: 14e34d498cf86d8c827ea67f3f326072dac85c6fb4040daba26afcd2256964ab
                                        • Opcode Fuzzy Hash: fe6697991a6c9ae0123c2fc0d2cd7780a7cab552973fd7aeb34bd7142a5001ae
                                        • Instruction Fuzzy Hash: E9E0DF21A0EC9D0FDBB6A66C64649A837A0DF1530434B019AD808C72A7D804CD8183C0
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ad8db5d766200b2fafb96fdcd946eb0c74e3bbac5683040754c68fd4f9044c7b
                                        • Instruction ID: 850fbf95a5aa58007fa1d77ba58a005acfbc026d6e890f37259e65a1acea009e
                                        • Opcode Fuzzy Hash: ad8db5d766200b2fafb96fdcd946eb0c74e3bbac5683040754c68fd4f9044c7b
                                        • Instruction Fuzzy Hash: D3C04C11B5D82E4F95A8A26D34656B891C1DB8866178551F2E80CD229EDC095D9207C1
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 62d8667b0afa894287522d3fa35655d2c5f79d1fe297768bd266c19a5c4951b3
                                        • Instruction ID: e7b376a2a0f1e9b65825509c9851cae04d87f975eecc61a32a32081fc90b048e
                                        • Opcode Fuzzy Hash: 62d8667b0afa894287522d3fa35655d2c5f79d1fe297768bd266c19a5c4951b3
                                        • Instruction Fuzzy Hash: 08C09B10F1AD5E46F166EBA5447117D2162AF8C600B924435D00D851A7CD3C67015645
                                        Memory Dump Source
                                        • Source File: 00000008.00000002.3022552749.00007FFD9B590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_8_2_7ffd9b590000_ScreenConnect.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0e17a258f943b5e37a66f28f127649145118b44775f0f13e6f5e6f6f53623775
                                        • Instruction ID: 54e49226a70fbcea6e07bd7309923dbbd1a9301065cd09642c547a8f3bb78cae
                                        • Opcode Fuzzy Hash: 0e17a258f943b5e37a66f28f127649145118b44775f0f13e6f5e6f6f53623775
                                        • Instruction Fuzzy Hash: 52A00200F0FD6E45E0B766D5002117D51514F59600A625175D00D951B7CD2D6B425296